Community structure-based trilateral stackelberg game model for privacy protection
暂无分享,去创建一个
Jing Zhang | Pei-Wei Tsai | Li Xu | Pei-wei Tsai | Jing Zhang | Li Xu
[1] Chang Wen Chen,et al. SSPA-LBS: Scalable and Social-Friendly Privacy-Aware Location-Based Services , 2019, IEEE Transactions on Multimedia.
[2] Jacques Periaux,et al. Constraints handling in Nash/Adjoint optimization methods for multi-objective aerodynamic design , 2014 .
[3] Lin Zhang,et al. Cyber-Physical-Social Aware Privacy Preserving in Location-Based Service , 2018, IEEE Access.
[4] Marco Gruteser,et al. USENIX Association , 1992 .
[5] Fengyuan Xu,et al. A Geo-Indistinguishable Location Perturbation Mechanism for Location-Based Services Supporting Frequent Queries , 2017, IEEE Transactions on Information Forensics and Security.
[6] H. Vincent Poor,et al. Community-Structured Evolutionary Game for Privacy Protection in Social Networks , 2018, IEEE Transactions on Information Forensics and Security.
[7] Ninghui Li,et al. t-Closeness: Privacy Beyond k-Anonymity and l-Diversity , 2007, 2007 IEEE 23rd International Conference on Data Engineering.
[8] Murat Kantarcioglu,et al. Expanding Access to Large-Scale Genomic Data While Promoting Privacy: A Game Theoretic Approach. , 2017, American journal of human genetics.
[9] Hua Wang,et al. Enhanced P-Sensitive K-Anonymity Models for Privacy Preserving Data Publishing , 2008, Trans. Data Priv..
[10] Richeng Jin,et al. Leveraging Spatial Diversity for Privacy-Aware Location-Based Services in Mobile Networks , 2018, IEEE Transactions on Information Forensics and Security.
[11] Reza Shokri,et al. Privacy Games: Optimal User-Centric Data Obfuscation , 2014, Proc. Priv. Enhancing Technol..
[12] Shuigeng Zhou,et al. A novel privacy preserving method for data publication , 2019, Inf. Sci..
[13] Xianbin Wang,et al. Three-Stage Stackelberg Game for Defending Against Full-Duplex Active Eavesdropping Attacks in Cooperative Communication , 2018, IEEE Transactions on Vehicular Technology.
[14] Ming Zhang,et al. New evolutionary game model of the regional governance of haze pollution in China , 2018, Applied Mathematical Modelling.
[15] Carmela Troncoso,et al. Protecting location privacy: optimal strategy against localization attacks , 2012, CCS.
[16] T. Vicsek,et al. Uncovering the overlapping community structure of complex networks in nature and society , 2005, Nature.
[17] Adam Wierzbicki,et al. Verifying social network models of Wikipedia knowledge community , 2016, Inf. Sci..
[18] Gang Kou,et al. A review on trust propagation and opinion dynamics in social networks and group decision making frameworks , 2019, Inf. Sci..
[19] Zhili Tang,et al. Natural laminar flow shape optimization in transonic regime with competitive Nash game strategy , 2017 .
[20] Hai Liu,et al. An incentive mechanism for K-anonymity in LBS privacy protection based on credit mechanism , 2016, Soft Computing.
[21] Xingyi Zhang,et al. A Mixed Representation-Based Multiobjective Evolutionary Algorithm for Overlapping Community Detection , 2017, IEEE Transactions on Cybernetics.
[22] Raymond Chi-Wing Wong,et al. (α, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing , 2006, KDD '06.
[23] Carmela Troncoso,et al. Privacy Games Along Location Traces , 2016, ACM Trans. Priv. Secur..
[24] Stephen P. Boyd,et al. Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.
[25] Ashwin Machanavajjhala,et al. l-Diversity: Privacy Beyond k-Anonymity , 2006, ICDE.
[26] Chen Wang,et al. ILLIA: Enabling $k$ -Anonymity-Based Privacy Preserving Against Location Injection Attacks in Continuous LBS Queries , 2018, IEEE Internet of Things Journal.
[27] Zhili Tang,et al. Solving Stackelberg equilibrium for multi objective aerodynamic shape optimization , 2019, Applied Mathematical Modelling.
[28] Min Chen,et al. Blind Filtering at Third Parties: An Efficient Privacy-Preserving Framework for Location-Based Services , 2018, IEEE Transactions on Mobile Computing.
[29] S. Sitharama Iyengar,et al. Query-Aware User Privacy Protection for LBS over Query-Feature-based Attacks , 2018, 2018 IEEE Symposium on Computers and Communications (ISCC).
[30] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[31] Ling Liu,et al. Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms , 2008, IEEE Transactions on Mobile Computing.
[32] Jun Dong,et al. Distributed optimization using virtual and real game strategies for multi-criterion aerodynamic design , 2008 .
[33] Lei Li,et al. Cognitive Approach for Location Privacy Protection , 2018, IEEE Access.