Towards privacy preserving AI based composition framework in edge networks using fully homomorphic encryption
暂无分享,去创建一个
Xun Yi | Mohammed Atiquzzaman | Mohammad Saidur Rahman | Ibrahim Khalil | X. Yi | Mohammed Atiquzzaman | I. Khalil
[1] Karin Bernsmed,et al. A Server-side Approach to Privacy Policy Matching , 2011, 2011 Sixth International Conference on Availability, Reliability and Security.
[2] Dongxi Liu,et al. Local Differential Privacy for Deep Learning , 2019, IEEE Internet of Things Journal.
[3] Albert Y. Zomaya,et al. Composition-Driven IoT Service Provisioning in Distributed Edges , 2018, IEEE Access.
[4] Thomas Risse,et al. Selecting skyline services for QoS-based web service composition , 2010, WWW '10.
[5] Muhammad Asif,et al. Automatic Number Plate Recognition System for Vehicle Identification Using Optical Character Recognition , 2009, 2009 International Conference on Education Technology and Computer.
[6] Ivan Damgård,et al. Publicly Auditable Secure Multi-Party Computation , 2014, SCN.
[7] John Mylopoulos,et al. Hierarchical hippocratic databases with minimal disclosure for virtual organizations , 2006, The VLDB Journal.
[8] Ismaeel Al Ridhawi,et al. Workflow-Net Based Service Composition Using Mobile Edge Nodes , 2017, IEEE Access.
[9] Sanjay Ghemawat,et al. MapReduce: simplified data processing on large clusters , 2008, CACM.
[10] Nei Kato,et al. New Perspectives on Future Smart FiWi Networks: Scalability, Reliability, and Energy Efficiency , 2016, IEEE Communications Surveys & Tutorials.
[11] Craig Gentry,et al. (Leveled) Fully Homomorphic Encryption without Bootstrapping , 2014, ACM Trans. Comput. Theory.
[12] Barbara Carminati,et al. A Privacy-Preserving Approach for Web Service Selection and Provisioning , 2011, 2011 IEEE International Conference on Web Services.
[13] Phongphun Kijsanayothin,et al. Privacy and Recovery in Composite Web Service Transactions , 2010 .
[14] Ibrahim Khalil,et al. Privacy-preserving Data clustering in Cloud Computing based on Fully Homomorphic Encryption , 2017, PACIS.
[15] I. V. Ramakrishnan,et al. A Framework for Building Privacy-Conscious Composite Web Services , 2006, 2006 IEEE International Conference on Web Services (ICWS'06).
[16] Dijiang Huang,et al. MoSeC: Mobile-Cloud Service Composition , 2015, 2015 3rd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering.
[17] Ibrahim Khalil,et al. Real-time Secure Health Surveillance for Smarter Health Communities , 2019, IEEE Communications Magazine.
[18] Craig Gentry,et al. A fully homomorphic encryption scheme , 2009 .
[19] Albert Y. Zomaya,et al. Service Selection for Composition in Mobile Edge Computing Systems , 2018, 2018 IEEE International Conference on Web Services (ICWS).
[20] Zhisheng Niu,et al. Tasks scheduling and resource allocation in heterogeneous cloud for delay-bounded mobile edge computing , 2017, 2017 IEEE International Conference on Communications (ICC).
[21] Xun Yi,et al. Towards secure big data analytic for cloud-enabled applications with fully homomorphic encryption , 2020, J. Parallel Distributed Comput..
[22] Tarik Taleb,et al. On Multi-Access Edge Computing: A Survey of the Emerging 5G Network Edge Cloud Architecture and Orchestration , 2017, IEEE Communications Surveys & Tutorials.
[23] Albert Y. Zomaya,et al. Privacy-preserving anomaly detection in the cloud for quality assured decision-making in smart cities , 2019, J. Parallel Distributed Comput..
[24] Giancarlo Fortino,et al. Evaluating Critical Security Issues of the IoT World: Present and Future Challenges , 2018, IEEE Internet of Things Journal.
[25] MengChu Zhou,et al. Security and trust issues in Fog computing: A survey , 2018, Future Gener. Comput. Syst..
[26] Michael Mrissa,et al. Privacy-Aware DaaS Services Composition , 2011, DEXA.
[27] Nei Kato,et al. Energy Consumption Minimization for FiWi Enhanced LTE-A HetNets with UE Connection Constraint , 2016, IEEE Communications Magazine.
[28] Nicola Zannone,et al. Privacy-Aware Web Service Composition and Ranking , 2013, Int. J. Web Serv. Res..
[29] Weisong Shi,et al. Edge Computing: Vision and Challenges , 2016, IEEE Internet of Things Journal.
[30] Xiang Chen,et al. Security in Mobile Edge Caching with Reinforcement Learning , 2018, IEEE Wireless Communications.
[31] Rodrigo Roman,et al. Mobile Edge Computing, Fog et al.: A Survey and Analysis of Security Threats and Challenges , 2016, Future Gener. Comput. Syst..
[32] Hong Ji,et al. Combinational Auction-Based Service Provider Selection in Mobile Edge Computing Networks , 2017, IEEE Access.
[33] Peter Richtárik,et al. Federated Learning: Strategies for Improving Communication Efficiency , 2016, ArXiv.
[34] Ibrahim Khalil,et al. Privacy preserving service selection using fully homomorphic encryption scheme on untrusted cloud service platform , 2019, Knowl. Based Syst..
[35] Ismail Hakki Toroslu,et al. A Semantic-Based User Privacy Protection Framework for Web Services , 2003, ITWP.