Fractal Intelligent Privacy Protection in Online Social Network Using Attribute-Based Encryption Schemes
暂无分享,去创建一个
Shuai Liu | Wenjia Li | Dingzhu Du | Wei Wei | Wenjia Li | Shuai Liu | Wei Wei | Dingzhu Du
[1] Bin Zhou,et al. Holes Detection in Anisotropic Sensornets: Topological Methods , 2012, Int. J. Distributed Sens. Networks.
[2] Refik Molva,et al. Safebook: A privacy-preserving online social network leveraging on real-life trust , 2009, IEEE Communications Magazine.
[3] Refik Molva,et al. On the Security and Feasibility of Safebook: A Distributed Privacy-Preserving Online Social Network , 2009, PrimeLife.
[4] Ronald E. Leenes. Context Is Everything Sociality and Privacy in Online Social Network Sites , 2009, PrimeLife.
[5] Houbing Song,et al. Imperfect Information Dynamic Stackelberg Game Based Resource Allocation Using Hidden Markov for Cloud Computing , 2018, IEEE Transactions on Services Computing.
[6] R. Kalaiselvi,et al. SCALABLE AND SECURE SHARING OF PERSONAL HEALTH RECORDS IN CLOUD COMPUTING , 2016 .
[7] Peiyi Shen,et al. Combined Energy Minimization for Image Reconstruction from Few Views , 2012 .
[8] Jie Wu,et al. Stability-Optimal Grouping Strategy of Peer-to-Peer Systems , 2011, IEEE Transactions on Parallel and Distributed Systems.
[9] Alexandros André Chaaraoui,et al. Visual privacy protection methods: A survey , 2015, Expert Syst. Appl..
[10] Zhongzhi Shi,et al. Editorial: Track on Intelligent Computing and Applications , 2014 .
[11] G. Loewenstein,et al. Privacy and human behavior in the age of information , 2015, Science.
[12] Fatos Xhafa,et al. Intelligent computing in large-scale systems , 2015, Knowl. Eng. Rev..
[13] De-Shuang Huang. Special issue on advanced intelligent computing theories and applications , 2015, Neurocomputing.
[14] Umit Topaloglu,et al. Social network analysis of biomedical research collaboration networks in a CTSA institution , 2014, J. Biomed. Informatics.
[15] Vinod Vokkarane,et al. A Study of Online Social Network Privacy Via the TAPE Framework , 2015, IEEE Journal of Selected Topics in Signal Processing.
[16] Song Guo,et al. Big Data Meet Green Challenges: Greening Big Data , 2016, IEEE Systems Journal.
[17] Jiantao Zhou,et al. Distributional Fractal Creating Algorithm in Parallel Environment , 2013, Int. J. Distributed Sens. Networks.
[18] Qing Tian,et al. Cross-heterogeneous-database age estimation through correlation representation learning , 2017, Neurocomputing.
[19] L. Wang,et al. GI/Geom/1 queue based on communication model for mesh networks , 2014, Int. J. Commun. Syst..
[20] Yi-Bing Lin,et al. Network security management with traffic pattern clustering , 2014, Soft Comput..
[21] Jun Li,et al. SOUP: an online social network by the people, for the people , 2015, SIGCOMM 2015.
[22] Ian Flood,et al. Predicting Owner's Contingency for Transportation Construction Projects Using Intelligent Computing Techniques , 2009 .
[23] Yu Xue,et al. A self-adaptive artificial bee colony algorithm based on global best for global optimization , 2017, Soft Computing.
[24] Gang Chen,et al. Supporting Privacy Protection in Personalized Web Search , 2014, IEEE Transactions on Knowledge and Data Engineering.
[25] Wei Wei,et al. Research and Simulation of Queue Management Algorithms in Ad Hoc Networks Under DDoS Attack , 2017, IEEE Access.
[26] Nicholas Christakis,et al. The Taste for Privacy: An Analysis of College Student Privacy Settings in an Online Social Network , 2008, J. Comput. Mediat. Commun..
[27] Gulshan Kumar,et al. Network security – an updated perspective , 2014 .
[28] Sayyed Mohsen Allameh,et al. Online Social Network , 2012 .
[29] Amar Dhand,et al. Leadership in neurology: A social network analysis , 2014, Annals of neurology.
[30] Yong Qi,et al. Information Potential Fields Navigation in Wireless Ad-Hoc Sensor Networks , 2011, Sensors.
[31] Hari M. Srivastava,et al. A Local Fractional Integral Inequality on Fractal Space Analogous to Anderson’s Inequality , 2014 .
[32] Song Guo,et al. Big Data Meet Green Challenges: Big Data Toward Green Applications , 2016, IEEE Systems Journal.
[33] Jing Zhang,et al. A Bijection between Lattice-Valued Filters and Lattice-Valued Congruences in Residuated Lattices , 2013 .
[34] Yunhao Liu,et al. Challenges, Designs, and Performances of Large-Scale Open-P2SP Content Distribution , 2013, IEEE Transactions on Parallel and Distributed Systems.
[35] Yan Liu,et al. On the source switching problem of Peer-to-Peer streaming , 2010, J. Parallel Distributed Comput..
[36] László Gyarmati,et al. Measuring user behavior in online social networks , 2010, IEEE Network.
[37] Jin Wang,et al. Mutual Verifiable Provable Data Auditing in Public Cloud Storage , 2015 .
[38] Jiantao Zhou,et al. Fractal property of generalized M-set with rational number exponent , 2013, Appl. Math. Comput..
[39] Wei Wei,et al. Gradient-driven parking navigation using a continuous information potential field based on wireless sensor network , 2017, Inf. Sci..
[40] John Keeney,et al. Multilevel pattern mining architecture for automatic network monitoring in heterogeneous wireless communication networks , 2016, China Communications.
[41] Quanyan Zhu,et al. Game theory meets network security and privacy , 2013, CSUR.
[42] Julián Salas,et al. A data driven anonymization system for information rich online social network graphs , 2016, Expert Syst. Appl..
[43] Chengwen Xing,et al. Performance Analysis of DF Cooperative Diversity System With OSTBC Over Spatially Correlated Nakagami-$m$ Fading Channels , 2014, IEEE Transactions on Vehicular Technology.
[44] Vitoantonio Bevilacqua,et al. Genetic Algorithm and Neural Network Based Classification in Microarray Data Analysis with Biological Validity Assessment , 2006, ICIC.
[45] Jinsong Wu,et al. Green wireless communications: from concept to reality [Industry Perspectives] , 2012, IEEE Wireless Communications.
[46] Jiang-She Zhang,et al. Big data analytics enabled by feature extraction based on partial independence , 2017, Neurocomputing.
[47] Stefano Chessa,et al. SIDEMAN: Service Discovery in Mobile Social Networks , 2016, Ad Hoc Sens. Wirel. Networks.
[48] Dan Guo. Privacy Protection in E-commerce: Identity-based Anonymous Privacy Agent , 2014 .
[49] 李振华,et al. Offline Downloading in China: A Comparative Study , 2015, ACM/SIGCOMM Internet Measurement Conference.
[50] Jiantao Zhou,et al. Distribution of primary additional errors in fractal encoding method , 2014, Multimedia Tools and Applications.
[51] Yunhao Liu,et al. Towards Network-level Efficiency for Cloud Storage Services , 2014, Internet Measurement Conference.
[52] Joon S. Park,et al. Trusted Online Social Network (OSN) services with optimal data management , 2014, Comput. Secur..
[53] Richard Van Noorden. Online collaboration: Scientists and the social network , 2014, Nature.
[54] Xi Chen,et al. Privacy Issues and Solutions in Social Network Sites , 2012, IEEE Technology and Society Magazine.
[55] Johan Bollen,et al. Twitter mood predicts the stock market , 2010, J. Comput. Sci..
[56] Tania Rabesandratana. Europe. E.U. privacy protection bill would hamper research, scientists warn. , 2014, Science.
[57] Yuxiang Wang,et al. Construction of Tree Network with Limited Delivery Latency in Homogeneous Wireless Sensor Networks , 2014, Wirel. Pers. Commun..
[58] Gang Liu,et al. Towards Cost-Effective Cloud Downloading with Tencent Big Data , 2015, Journal of Computer Science and Technology.
[59] Xiaochun Cheng,et al. Numeric characteristics of generalized M-set with its asymptote , 2014, Appl. Math. Comput..
[60] Cliff Lampe,et al. Cultivating Social Resources on Social Network Sites: Facebook Relationship Maintenance Behaviors and Their Role in Social Capital Processes , 2014, J. Comput. Mediat. Commun..
[61] Minjie Zhang,et al. A belief propagation-based method for task allocation in open and dynamic cloud environments , 2017, Knowl. Based Syst..
[62] Jinsong Wu,et al. New Constructions of Codebooks Nearly Meeting the Welch Bound With Equality , 2014, IEEE Transactions on Information Theory.
[63] Zhi-Li Zhang,et al. Coarse-grained cloud synchronization mechanism design may lead to severe traffic overuse , 2013 .
[64] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[65] Joel J. P. C. Rodrigues,et al. Exploring Social Networks and Improving Hypertext Results for Cloud Solutions , 2016, Mob. Networks Appl..
[66] Che-Hung Liu,et al. Evaluating and selecting the biometrics in network security , 2015, Secur. Commun. Networks.
[67] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[68] Bobby Bhattacharjee,et al. Persona: an online social network with user-defined privacy , 2009, SIGCOMM '09.
[69] Na Li,et al. Preserving Relation Privacy in Online Social Network Data , 2011, IEEE Internet Computing.