Context Sensing System Analysis for Privacy Preservation Based on Game Theory †
暂无分享,去创建一个
Shengling Wang | Rongfang Bie | Kai Lin | Junqi Guo | Weiman Sun | Luyun Li
[1] Qian Zhang,et al. A stochastic game for privacy preserving context sensing on mobile phone , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.
[2] Yingshu Li,et al. Truthful Incentive Mechanisms for Social Cost Minimization in Mobile Crowdsourcing Systems , 2016, Sensors.
[3] Xiaojun Shan,et al. Subsidizing to disrupt a terrorism supply chain—a four-player game , 2014, J. Oper. Res. Soc..
[4] Rachel A. Davidson,et al. Modeling Insurer‐Homeowner Interactions in Managing Natural Disaster Risk , 2014, Risk analysis : an official publication of the Society for Risk Analysis.
[5] Dan Boneh,et al. Location Privacy via Private Proximity Testing , 2011, NDSS.
[6] Wenbo He,et al. KIPDA: k-indistinguishable privacy-preserving data aggregation in wireless sensor networks , 2011, 2011 Proceedings IEEE INFOCOM.
[7] Dirk Westhoff,et al. Concealed Data Aggregation for Reverse Multicast Traffic in Sensor Networks: Encryption, Key Distribution, and Routing Adaptation , 2006, IEEE Transactions on Mobile Computing.
[8] Minho Shin,et al. AnonySense: A system for anonymous opportunistic sensing , 2011, Pervasive Mob. Comput..
[9] Rachel A. Davidson,et al. Modeling the integrated roles of insurance and retrofit in managing natural disaster risk: a multi-stakeholder perspective , 2014, Natural Hazards.
[10] Xiaolei Dong,et al. An Efficient Privacy Preserving Data Aggregation Scheme with Constant Communication Overheads for Wireless Sensor Networks , 2011, IEEE Communications Letters.
[11] Zhipeng Cai,et al. FakeMask: A Novel Privacy Preserving Approach for Smartphones , 2016, IEEE Transactions on Network and Service Management.
[12] Yang Gao,et al. An incentive mechanism with privacy protection in mobile crowdsourcing systems , 2016, Comput. Networks.
[13] Suman Nath,et al. MaskIt: privately releasing user context streams for personalized mobile applications , 2012, SIGMOD Conference.
[14] Rong Zheng,et al. Efficient algorithms for K-anonymous location privacy in participatory sensing , 2012, 2012 Proceedings IEEE INFOCOM.
[15] Vicki M. Bier,et al. Balancing Terrorism and Natural Disasters - Defensive Strategy with Endogenous Attacker Effort , 2007, Oper. Res..