Data Verification andPrivacy-respecting User Remuneration in Mobile Crowd Sensing
暂无分享,去创建一个
Athanasios Giannetsos | Panos Papadimitratos | Stylianos Gisdakis | Panos Papadimitratos | S. Gisdakis | A. Giannetsos
[1] Hans-Peter Kriegel,et al. A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise , 1996, KDD.
[2] Bruno Blanchet,et al. Automatic proof of strong secrecy for security protocols , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[3] Károly Farkas,et al. Participatory sensing based real-time public transport information service , 2014, 2014 IEEE International Conference on Pervasive Computing and Communication Workshops (PERCOM WORKSHOPS).
[4] Ramachandran Ramjee,et al. PRISM: platform for remote sensing using smartphones , 2010, MobiSys '10.
[5] Bin Guo,et al. From participatory sensing to Mobile Crowd Sensing , 2014, 2014 IEEE International Conference on Pervasive Computing and Communication Workshops (PERCOM WORKSHOPS).
[6] Panos Papadimitratos,et al. On the optimal allocation of adversarial resources , 2012, MiSeNet '12.
[7] Deborah Estrin,et al. Examining micro-payments for participatory sensing data collections , 2010, UbiComp.
[8] Panagiotis Papadimitratos,et al. Secure and Privacy-Preserving Smartphone-Based Traffic Information Systems , 2015, IEEE Transactions on Intelligent Transportation Systems.
[9] Philippe Smets,et al. The Combination of Evidence in the Transferable Belief Model , 1990, IEEE Trans. Pattern Anal. Mach. Intell..
[10] Felix C. Freiling,et al. Location privacy in urban sensing networks: research challenges and directions [Security and Privacy in Emerging Wireless Networks] , 2010, IEEE Wireless Communications.
[11] Leo Breiman,et al. Random Forests , 2001, Machine Learning.
[12] Panagiotis Papadimitratos,et al. Trustworthy People-Centric Sensing: Privacy, security and user incentives road-map , 2014, 2014 13th Annual Mediterranean Ad Hoc Networking Workshop (MED-HOC-NET).
[13] Chen-Khong Tham,et al. Fairness and social welfare in incentivizing participatory sensing , 2012, 2012 9th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON).
[14] Claudio Soriente,et al. Extended Capabilities for a Privacy-Enhanced Participatory Sensing Infrastructure (PEPSI) , 2013, IEEE Transactions on Information Forensics and Security.
[15] Panagiotis Papadimitratos,et al. SPPEAR: security & privacy-preserving architecture for participatory-sensing applications , 2014, WiSec '14.
[16] Panagiotis Papadimitratos,et al. Allocating adversarial resources in wireless networks , 2013, 21st European Signal Processing Conference (EUSIPCO 2013).
[17] Richard M. Karp,et al. Reducibility Among Combinatorial Problems , 1972, 50 Years of Integer Programming.
[18] Miguel A. Labrador,et al. P-Sense: A participatory sensing system for air pollution monitoring and control , 2011, 2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops).
[19] Emiliano Miluzzo,et al. Tapping into the Vibe of the city using VibN, a continuous sensing application for smartphones , 2011, SCI '11.
[20] Salil S. Kanhere,et al. IncogniSense: An anonymity-preserving reputation framework for participatory sensing applications , 2012, 2012 IEEE International Conference on Pervasive Computing and Communications.
[21] Demetrios Zeinalipour-Yazti,et al. Crowdsourcing with Smartphones , 2012, IEEE Internet Computing.
[22] Luc Anselin,et al. Spatial Statistical Analysis and Geographic Information Systems , 1992 .
[23] Levente Buttyán,et al. RANBAR: RANSAC-based resilient aggregation in sensor networks , 2006, SASN '06.
[24] Ioannis Krontiris,et al. Monetary incentives in participatory sensing using multi-attributive auctions , 2012, Int. J. Parallel Emergent Distributed Syst..
[25] Leslie G. Valiant,et al. The Complexity of Computing the Permanent , 1979, Theor. Comput. Sci..
[26] Naphtali Rishe,et al. Safe cities. A participatory sensing approach , 2012, 37th Annual IEEE Conference on Local Computer Networks.
[27] Glenn Shafer,et al. A Mathematical Theory of Evidence , 2020, A Mathematical Theory of Evidence.
[28] Josh Benaloh,et al. Dense Probabilistic Encryption , 1999 .
[29] Danny Dolev,et al. On the Security of Public Key Protocols (Extended Abstract) , 1981, FOCS.
[30] Jerome H. Saltzer,et al. The protection of information in computer systems , 1975, Proc. IEEE.
[31] Daniel Krajzewicz,et al. Recent Development and Applications of SUMO - Simulation of Urban MObility , 2012 .
[32] P. Smets. Data fusion in the transferable belief model , 2000, Proceedings of the Third International Conference on Information Fusion.
[33] Andrew T. Campbell,et al. Bewell: A smartphone application to monitor, model and promote wellbeing , 2011, PervasiveHealth 2011.
[34] Sivan Toledo,et al. VTrack: accurate, energy-aware road traffic delay estimation using mobile phones , 2009, SenSys '09.
[35] Francisco Herrera,et al. A Survey of Discretization Techniques: Taxonomy and Empirical Analysis in Supervised Learning , 2013, IEEE Transactions on Knowledge and Data Engineering.
[36] Tassos Dimitriou,et al. Moving Advanced Safety to the Cloud: Some Outcomes of SafeCity Project , 2012, Future Security.
[37] Roger Wattenhofer,et al. Ikarus: large-scale participatory sensing at high altitudes , 2011, HotMobile '11.
[38] Zhendong Ma,et al. Privacy in inter-vehicular networks: Why simple pseudonym change is not enough , 2010, 2010 Seventh International Conference on Wireless On-demand Network Systems and Services (WONS).
[39] David A. Wagner,et al. Resilient aggregation in sensor networks , 2004, SASN '04.
[40] G. N. Lance,et al. Mixed-Data Classificatory Programs I - Agglomerative Systems , 1967, Aust. Comput. J..
[41] Dominic Wörner,et al. When your sensor earns money: exchanging data for cash with Bitcoin , 2014, UbiComp Adjunct.
[42] Yang Zhang,et al. CarTel: a distributed mobile sensor computing system , 2006, SenSys '06.
[43] Shonali Krishnaswamy,et al. Mining data streams: a review , 2005, SGMD.
[44] Panagiotis Papadimitratos,et al. SHIELD: a data verification framework for participatory sensing systems , 2015, WISEC.
[45] Panagiotis Papadimitratos,et al. SEROSA: SERvice oriented security architecture for Vehicular Communications , 2013, 2013 IEEE Vehicular Networking Conference.
[46] Ricardo J. G. B. Campello,et al. Generalized external indexes for comparing data partitions with overlapping categories , 2010, Pattern Recognit. Lett..
[47] Neeli R. Prasad,et al. People-centric sensing in assistive healthcare: Privacy challenges and directions , 2011, Secur. Commun. Networks.
[48] Miguel A. Labrador,et al. On Sensor Data Verification for Participatory Sensing Systems , 2013, J. Networks.
[49] R. E. Kalman,et al. A New Approach to Linear Filtering and Prediction Problems , 2002 .
[50] Wei Cheng,et al. ARTSense: Anonymous reputation and trust in participatory sensing , 2013, 2013 Proceedings IEEE INFOCOM.
[51] Cyrus Shahabi,et al. TAPAS: Trustworthy privacy-aware participatory sensing , 2012, Knowledge and Information Systems.
[52] João Gama,et al. A survey on concept drift adaptation , 2014, ACM Comput. Surv..
[53] Minho Shin,et al. AnonySense: A system for anonymous opportunistic sensing , 2011, Pervasive Mob. Comput..