MAPP: A Modular Arithmetic Algorithm for Privacy Preserving in IoT
暂无分享,去创建一个
[1] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[2] M. Tahar Kechadi,et al. CupCarbon: a multi-agent and discrete event wireless sensor network design and simulation tool , 2014, SimuTools.
[3] Anis Laouiti,et al. VANet security challenges and solutions: A survey , 2017, Veh. Commun..
[4] Ji Zhang,et al. NSSSD: A new semantic hierarchical storage for sensor data , 2016, 2016 IEEE 20th International Conference on Computer Supported Cooperative Work in Design (CSCWD).
[5] Douglas R. Stinson,et al. Cryptography: Theory and Practice , 1995 .
[6] Wei Wang,et al. A Survey of Body Sensor Networks , 2013, Sensors.
[7] Zheng Yan,et al. A Review on Privacy-Preserving Data Mining , 2014, 2014 IEEE International Conference on Computer and Information Technology.
[8] Alberto Eduardo Cerpa. Sensor Networks Challenges for Intelligent Buildings , 2006 .
[9] Chris Clifton,et al. Privacy preserving data mining over vertically partitioned data , 2004 .
[10] Qi Wang,et al. Random-data perturbation techniques and privacy-preserving data mining , 2005, Knowledge and Information Systems.
[11] Pallavi Sharma,et al. A Coherent Technique for Privacy Preservation in Data Mining Using Classification , 2016 .
[12] Marimuthu Palaniswami,et al. Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..
[13] Jing Wang,et al. Automatic text summarization using fuzzy inference , 2016, 2016 22nd International Conference on Automation and Computing (ICAC).
[14] Md. Zakirul Alam Bhuiyan,et al. A Survey on Deep Learning in Big Data , 2017, 22017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC).
[15] Bang Wang,et al. Effective placement of femtocell base stations in commercial buildings , 2014, 2014 Sixth International Conference on Ubiquitous and Future Networks (ICUFN).
[16] M. Castro,et al. Data Randomization , 2008 .
[17] Thomas A. Henzinger,et al. The Embedded Systems Design Challenge , 2006, FM.
[18] Mehdi Gheisari,et al. An Evaluation of Proposed Systems of Sensor Datas Storage in Total Data Parameter , 2012 .
[19] Qi Wang,et al. On the privacy preserving properties of random data perturbation techniques , 2003, Third IEEE International Conference on Data Mining.
[20] Steven Barker. Data and Applications Security XXII, 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security , 2008 .
[21] Xiaolin Zhang,et al. Research on privacy preserving classification data mining based on random perturbation , 2010, 2010 International Conference on Information, Networking and Automation (ICINA).
[22] Lei Yang,et al. A multi-cloud based privacy-preserving data publishing scheme for the internet of things , 2016, ACSAC.
[23] Md Zakirul Alam Bhuiyan,et al. Maintaining the Balance between Privacy and Data Integrity in Internet of Things , 2017, ICMSS '17.
[24] Seyed Mojtaba Hosseini Bamakan,et al. Ramp loss K-Support Vector Classification-Regression; a robust and sparse multi-class approach to the intrusion detection problem , 2017, Knowl. Based Syst..
[25] Anirban Basu,et al. Privacy-friendly secure bidding scheme for demand response in smart grid , 2015, 2015 IEEE First International Smart Cities Conference (ISC2).