Privacy-aware smart city: A case study in collaborative filtering recommender systems
暂无分享,去创建一个
Kim-Kwang Raymond Choo | Ruoming Jin | Chi Cheng | Feng Zhang | Victor E. Lee | Lijun Dong | Michele Maasberg | Saurabh Garg | R. Jin | S. Garg | Michele Maasberg | Lijun Dong | Feng Zhang | Chi Cheng
[1] Benjamin C. M. Fung,et al. Secure Two-Party Differentially Private Data Release for Vertically Partitioned Data , 2014, IEEE Transactions on Dependable and Secure Computing.
[2] Jemal H. Abawajy,et al. A trajectory privacy-preserving scheme based on query exchange in mobile social networks , 2018, Soft Comput..
[3] Albert Y. Zomaya,et al. Parallel Processing of Dynamic Continuous Queries over Streaming Data Flows , 2015, IEEE Transactions on Parallel and Distributed Systems.
[4] Alfredo De Santis,et al. A triadic closure and homophily-based recommendation system for online social networks , 2015, World Wide Web.
[5] Pierangela Samarati,et al. Protecting Respondents' Identities in Microdata Release , 2001, IEEE Trans. Knowl. Data Eng..
[6] Albert Y. Zomaya,et al. Big Data Privacy in the Internet of Things Era , 2014, IT Professional.
[7] Shiyan Hu,et al. A Computing Perspective on Smart City [Guest Editorial] , 2016, IEEE Trans. Computers.
[8] Chris Clifton,et al. Privacy Preserving Data Mining (Advances in Information Security) , 2005 .
[9] Viggo Kann,et al. Maximum Bounded H-Matching is MAX SNP-Complete , 1994, Inf. Process. Lett..
[10] Chunming Rong,et al. Fast algorithms to evaluate collaborative filtering recommender systems , 2016, Knowl. Based Syst..
[11] Min Wang,et al. A Parallel Adaboost-Backpropagation Neural Network for Massive Image Dataset Classification , 2016, Scientific Reports.
[12] Kim-Kwang Raymond Choo,et al. Privacy-Preserving-Outsourced Association Rule Mining on Vertically Partitioned Databases , 2016, IEEE Transactions on Information Forensics and Security.
[13] Aniello Castiglione,et al. Efficient k-NN query over encrypted data in cloud with limited key-disclosure and offline data owner , 2017, Comput. Secur..
[14] Qi Wang,et al. Random-data perturbation techniques and privacy-preserving data mining , 2005, Knowledge and Information Systems.
[15] Jemal H. Abawajy,et al. Privacy Preserving Social Network Data Publication , 2016, IEEE Communications Surveys & Tutorials.
[16] Albert Y. Zomaya,et al. Privacy-Knowledge Modeling for the Internet of Things: A Look Back , 2016, Computer.
[17] Ciprian Dobre,et al. Controlling and filtering users data in Intelligent Transportation System , 2018, Future Gener. Comput. Syst..
[18] Silvia Rossi,et al. An Architecture for a Mobility Recommender System in Smart Cities , 2016, EUSPN/ICTH.
[19] Laurence T. Yang,et al. Privacy Preserving Deep Computation Model on Cloud for Big Data Feature Learning , 2016, IEEE Transactions on Computers.
[20] Kun Liu,et al. Random projection-based multiplicative data perturbation for privacy preserving distributed data mining , 2006, IEEE Transactions on Knowledge and Data Engineering.
[21] Jemal H. Abawajy,et al. Privacy-preserving multi-hop profile-matching protocol for proximity mobile social networks , 2017, Future Gener. Comput. Syst..
[22] Camille Rosenthal-Sabroux,et al. Recommendations to Improve the Smartness of a City , 2014 .
[23] Meikang Qiu,et al. Privacy Protection for Preventing Data Over-Collection in Smart City , 2016, IEEE Transactions on Computers.
[24] Albert Y. Zomaya,et al. A Parallel File System with Application-Aware Data Layout Policies for Massive Remote Sensing Image Processing in Digital Earth , 2015, IEEE Transactions on Parallel and Distributed Systems.
[25] Jennifer Golbeck,et al. Computing and Applying Trust in Web-based Social Networks , 2005 .
[26] Hans-Peter Kriegel,et al. A Fast Parallel Clustering Algorithm for Large Spatial Databases , 1999, Data Mining and Knowledge Discovery.
[27] Tsuyoshi Takagi,et al. Secure and controllable k-NN query over encrypted cloud data with key confidentiality , 2016, J. Parallel Distributed Comput..
[28] Charles Elkan,et al. Differential privacy based on importance weighting , 2013, Machine Learning.
[29] Christian Esposito,et al. Trust management for distributed heterogeneous systems by using linguistic term sets and hierarchies, aggregation operators and mechanism design , 2017, Future Gener. Comput. Syst..
[30] Rongxing Lu,et al. Securing the Internet of Things in a Quantum World , 2017, IEEE Communications Magazine.
[31] Albert Y. Zomaya,et al. Distribution Based Workload Modelling of Continuous Queries in Clouds , 2017, IEEE Transactions on Emerging Topics in Computing.
[32] Agusti Solanas,et al. The pursuit of citizens' privacy: a privacy-aware smart city is possible , 2013, IEEE Communications Magazine.
[33] ASHWIN MACHANAVAJJHALA,et al. L-diversity: privacy beyond k-anonymity , 2006, 22nd International Conference on Data Engineering (ICDE'06).