An Improved Pillar K-Means Based Protocol for Privacy-Preserving Location Monitoring in Wireless Sensor Network
暂无分享,去创建一个
[1] Xiaodong Lin,et al. SPOC: A Secure and Privacy-Preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency , 2013, IEEE Transactions on Parallel and Distributed Systems.
[2] Yuval Elovici,et al. Online Social Networks: Threats and Solutions , 2013, IEEE Communications Surveys & Tutorials.
[3] Jie Wu,et al. Cost-Aware SEcure Routing (CASER) Protocol Design for Wireless Sensor Networks , 2015, IEEE Transactions on Parallel and Distributed Systems.
[4] Shafiullah Khan,et al. Intrusion Detection Systems in Wireless Sensor Networks: A Review , 2013, Int. J. Distributed Sens. Networks.
[5] Kewei Sha,et al. Noname Manuscript No. (will Be Inserted by the Editor) Multipath Routing Techniques in Wireless Sensor Networks: a Survey , 2022 .
[6] Wade Trappe,et al. Enhancing Source-Location Privacy in Sensor Network Routing , 2005, ICDCS.
[7] Katina Michael,et al. Location and tracking of mobile devices: Überveillance stalks the streets , 2013, Comput. Law Secur. Rev..
[8] Lin Yao,et al. Protecting source–location privacy based on multirings in wireless sensor networks , 2015, Concurr. Comput. Pract. Exp..
[9] Chi-Yin Chow,et al. A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks , 2011, IEEE Transactions on Mobile Computing.
[10] Mianxiong Dong,et al. Achieving Source Location Privacy and Network Lifetime Maximization Through Tree-Based Diversionary Routing in Wireless Sensor Networks , 2014, IEEE Access.
[11] Kirankumar B. Balavalad,et al. A Privacy-Preserving Location Monitoring System for WSNs with Blocking Misbehaving Users in Anonymity Networks , 2014 .
[12] Shusen Yang,et al. A survey on the ietf protocol suite for the internet of things: standards, challenges, and opportunities , 2013, IEEE Wireless Communications.
[13] Sajal K. Das,et al. Using data mules to preserve source location privacy in Wireless Sensor Networks , 2014, Pervasive Mob. Comput..
[14] Eran Halperin,et al. Identifying Personal Genomes by Surname Inference , 2013, Science.
[15] Jie Gao,et al. Is random walk truly memoryless — Traffic analysis and source location privacy under random walks , 2013, 2013 Proceedings IEEE INFOCOM.
[16] Lin Yao,et al. Protecting the sink location privacy in wireless sensor networks , 2012, Personal and Ubiquitous Computing.
[17] Edith C. H. Ngai,et al. On providing location privacy for mobile sinks in wireless sensor networks , 2013, Wirel. Networks.
[18] M. Kumar,et al. Cluster based Location privacy in Wireless Sensor Networks against a universal adversary , 2013, 2013 International Conference on Information Communication and Embedded Systems (ICICES).
[19] Ozgur Koray Sahingoz,et al. Mobile networking with UAVs: Opportunities and challenges , 2013, 2013 International Conference on Unmanned Aircraft Systems (ICUAS).
[20] Xiuzhen Cheng,et al. Target Counting in Wireless Sensor Networks , 2014 .
[21] Sajjad Haider Shami,et al. Evolution of Communication Technologies for Smart Grid applications , 2013 .
[22] Sung-Woon Lee,et al. Security Concerns of Identity Authentication and Context Privacy Preservation in uHealthcare System , 2013, 2013 14th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing.
[23] Yasushi Kiyoki,et al. A pillar algorithm for K-means optimization by distance maximization for initial centroid designation , 2009, 2009 IEEE Symposium on Computational Intelligence and Data Mining.
[24] Guohong Cao,et al. Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System , 2013, IEEE Transactions on Mobile Computing.
[25] Marco Zennaro,et al. Successful deployment of a Wireless Sensor Network for precision agriculture in Malawi , 2012, NESEA.
[26] Manjusha Pandey,et al. Privacy Provisioning in Wireless Sensor Networks , 2014, Wirel. Pers. Commun..