Context-Aware Privacy Preservation in Network Caching: An Information Theoretic Approach
暂无分享,去创建一个
Seyed Pooya Shariatpanahi | Ahmad Khonsari | Abolfazl Diyanat | Aresh Dadlani | Seyedeh Bahereh Hassanpour | S. P. Shariatpanahi | Aresh Dadlani | A. Khonsari | Abolfazl Diyanat
[1] Xun Cao,et al. In-Network Caching: An Efficient Content Distribution Strategy for Mobile Networks , 2019, IEEE Wireless Communications.
[2] Gan Zheng,et al. Optimization of Hybrid Cache Placement for Collaborative Relaying , 2017, IEEE Communications Letters.
[3] Rick S. Blum,et al. A Survey of Caching Techniques in Cellular Networks: Research Issues and Challenges in Content Placement and Delivery Strategies , 2018, IEEE Communications Surveys & Tutorials.
[4] Neri Merhav,et al. Relations between entropy and error probability , 1994, IEEE Trans. Inf. Theory.
[5] Zhenyu Na,et al. Probabilistic Caching Placement in the Presence of Multiple Eavesdroppers , 2018, Wirel. Commun. Mob. Comput..
[6] Leandros Maglaras,et al. Security and Privacy in Fog Computing: Challenges , 2017, IEEE Access.
[7] Seyed Pooya Shariatpanahi,et al. A Dummy-Based Approach for Preserving Source Rate Privacy , 2016, IEEE Transactions on Information Forensics and Security.
[8] Giacomo Verticale,et al. An Open Privacy-Preserving and Scalable Protocol for a Network-Neutrality Compliant Caching , 2019, ICC 2019 - 2019 IEEE International Conference on Communications (ICC).
[9] Aylin Yener,et al. Device-to-Device Secure Coded Caching , 2018, IEEE Transactions on Information Forensics and Security.
[10] Seyed Pooya Shariatpanahi,et al. Hybrid Coded Caching in Cellular Networks with D2D-Enabled Mobile Users , 2019, 2019 IEEE 30th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC).
[11] Zheng Chen,et al. Probabilistic Caching in Wireless D2D Networks: Cache Hit Optimal Versus Throughput Optimal , 2016, IEEE Communications Letters.
[12] Xiaojiang Du,et al. Preserving Location Privacy in Mobile Edge Computing , 2018, ICC 2019 - 2019 IEEE International Conference on Communications (ICC).
[13] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[14] Bing Chen,et al. Data Security and Privacy-Preserving in Edge Computing Paradigm: Survey and Open Issues , 2018, IEEE Access.