A Hybrid Privacy Protection Scheme in Cyber-Physical Social Networks
暂无分享,去创建一个
Wanlei Zhou | Sancheng Peng | Shui Yu | Youyang Qu | Longxiang Gao | Wanlei Zhou | Longxiang Gao | Youyang Qu | Shui Yu | Sancheng Peng
[1] Takuya Maekawa,et al. How Well Can a User’s Location Privacy Preferences be Determined Without Using GPS Location Data? , 2017, IEEE Transactions on Emerging Topics in Computing.
[2] Jiguo Yu,et al. Follow But No Track: Privacy Preserved Profile Publishing in Cyber-Physical Social Systems , 2017, IEEE Internet of Things Journal.
[3] David C. Parkes,et al. On non-cooperative location privacy: a game-theoretic analysis , 2009, CCS.
[4] Tianqing Zhu,et al. Silence is Golden: Enhancing Privacy of Location-Based Services by Content Broadcasting and Active Caching in Wireless Vehicular Networks , 2016, IEEE Transactions on Vehicular Technology.
[5] Ulrik Brandes,et al. Investigating Link Inference in Partially Observable Networks: Friendship Ties and Interaction , 2016, IEEE Transactions on Computational Social Systems.
[6] Sanming Zhou,et al. Networking for Big Data: A Survey , 2017, IEEE Communications Surveys & Tutorials.
[7] Qian Zhang,et al. Privacy Preservation for Context Sensing on Smartphone , 2016, IEEE/ACM Transactions on Networking.
[8] Cynthia Dwork,et al. Differential Privacy , 2006, ICALP.
[9] Dr B Santhosh Kumar Santhosh Balan,et al. Closeness : A New Privacy Measure for Data Publishing , 2022 .
[10] Yan Zheng,et al. Anonymous Authentication for Trustworthy Pervasive Social Networking , 2015, IEEE Transactions on Computational Social Systems.
[11] Xiaohui Liang,et al. PIF: A Personalized Fine-Grained Spam Filtering Scheme With Privacy Preservation in Mobile Social Networks , 2015, IEEE Transactions on Computational Social Systems.
[12] George J. Pappas,et al. Diffusing private data over networks , 2015, 2016 American Control Conference (ACC).
[13] Shui Yu,et al. Big data set privacy preserving through sensitive attribute-based grouping , 2017, 2017 IEEE International Conference on Communications (ICC).
[14] Ting Yu,et al. Mining frequent graph patterns with differential privacy , 2013, KDD.
[15] Yuqing Mao,et al. Web of Credit: Adaptive Personalized Trust Network Inference From Online Rating Data , 2016, IEEE Transactions on Computational Social Systems.
[16] Ashwin Machanavajjhala,et al. l-Diversity: Privacy Beyond k-Anonymity , 2006, ICDE.
[17] Andrew W. Moore,et al. Reinforcement Learning: A Survey , 1996, J. Artif. Intell. Res..
[18] Wanlei Zhou,et al. Improving Data Utility through Game Theory in Personalized Differential Privacy , 2018, 2018 IEEE International Conference on Communications (ICC).
[19] Hwee Pink Tan,et al. Markov Decision Processes With Applications in Wireless Sensor Networks: A Survey , 2015, IEEE Communications Surveys & Tutorials.
[20] Xu Chen,et al. When Social Network Meets Mobile Cloud: A Social Group Utility Approach for Optimizing Computation Offloading in Cloudlet , 2016, IEEE Access.
[21] Frank Stajano,et al. Location Privacy in Pervasive Computing , 2003, IEEE Pervasive Comput..
[22] Hai Liu,et al. Spatiotemporal correlation-aware dummy-based privacy protection scheme for location-based services , 2017, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.
[23] Suman Nath,et al. MaskIt: privately releasing user context streams for personalized mobile applications , 2012, SIGMOD Conference.
[24] Rong Zheng,et al. Efficient algorithms for K-anonymous location privacy in participatory sensing , 2012, 2012 Proceedings IEEE INFOCOM.
[25] K. J. Ray Liu,et al. An anti-jamming stochastic game for cognitive radio networks , 2011, IEEE Journal on Selected Areas in Communications.
[26] Josep Domingo-Ferrer,et al. Privacy-Preserving Vehicular Communication Authentication with Hierarchical Aggregation and Fast Response , 2015, IEEE Transactions on Computers.
[27] Liang Xiao,et al. FuzzyDP: Fuzzy-based big data publishing against inquiry attacks , 2017, 2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[28] Yuguang Fang,et al. Protecting Location Privacy for Task Allocation in Ad Hoc Mobile Cloud Computing , 2018, IEEE Transactions on Emerging Topics in Computing.
[29] Shaojie Tang,et al. Adaptive Influence Maximization in Dynamic Social Networks , 2015, IEEE/ACM Transactions on Networking.
[30] Pierangela Samarati,et al. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression , 1998 .
[31] Shui Yu,et al. Big Privacy: Challenges and Opportunities of Privacy Study in the Age of Big Data , 2016, IEEE Access.
[32] Carmela Troncoso,et al. Protecting location privacy: optimal strategy against localization attacks , 2012, CCS.
[33] Amit P. Sheth,et al. Physical-Cyber-Social Computing: An Early 21st Century Approach , 2013, IEEE Intelligent Systems.
[34] Qian Xu,et al. Security-Aware Waveforms for Enhancing Wireless Communications Privacy in Cyber-Physical Systems via Multipath Receptions , 2017, IEEE Internet of Things Journal.
[35] Wenbo He,et al. KIPDA: k-indistinguishable privacy-preserving data aggregation in wireless sensor networks , 2011, 2011 Proceedings IEEE INFOCOM.