暂无分享,去创建一个
[1] Sajal K. Das,et al. Fast track article: Secure data aggregation in wireless sensor networks: A watermark based authentication supportive approach , 2008 .
[2] Qi Wang,et al. On the privacy preserving properties of random data perturbation techniques , 2003, Third IEEE International Conference on Data Mining.
[3] Ja-Ling Wu,et al. A Novel Privacy Preserving Location-Based Service Protocol With Secret Circular Shift for K-NN Search , 2013, IEEE Transactions on Information Forensics and Security.
[4] Ibrahim Khalil,et al. Wavelet based steganographic technique to protect household confidential information and seal the transmitted smart grid readings , 2015, Inf. Syst..
[5] Chi-Yin Chow,et al. A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks , 2011, IEEE Transactions on Mobile Computing.
[6] Antonella Molinaro,et al. Privacy-Preserving Forwarding Using Homomorphic Encryption for Information-Centric Wireless Ad Hoc Networks , 2019, IEEE Communications Letters.
[7] Hayrettin Koymen,et al. Compression of digital biomedical signals , 2006 .
[8] Ayman Ibaida,et al. Resilient to shared spectrum noise scheme for protecting cognitive radio smart grid readings - BCH based steganographic approach , 2016, Ad Hoc Networks.
[9] Sajal K. Das,et al. Privacy preservation in wireless sensor networks: A state-of-the-art survey , 2009, Ad Hoc Networks.
[10] Biswanath Mukherjee,et al. Wireless sensor network survey , 2008, Comput. Networks.
[11] Wenliang Du,et al. Deriving private information from randomized data , 2005, SIGMOD '05.
[12] Jiguo Yu,et al. A Privacy Preserving Communication Protocol for IoT Applications in Smart Homes , 2016, 2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI).
[13] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[14] Ling Liu,et al. Location Privacy in Mobile Systems: A Personalized Anonymization Model , 2005, 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05).
[15] Ephraim Feig,et al. Fast algorithms for the discrete cosine transform , 1992, IEEE Trans. Signal Process..
[16] Jeannie R. Albrecht,et al. Smart * : An Open Data Set and Tools for Enabling Research in Sustainable Homes , 2012 .
[17] Ben Y. Zhao,et al. Preserving Location Privacy in Geosocial Applications , 2014, IEEE Transactions on Mobile Computing.
[18] N. Ahmed,et al. Discrete Cosine Transform , 1996 .
[19] P. Yip,et al. Discrete Cosine Transform: Algorithms, Advantages, Applications , 1990 .
[20] Samir Kumar Bandyopadhyay,et al. DCT Domain Encryption in LSB Steganography , 2013, 2013 5th International Conference on Computational Intelligence and Communication Networks.
[21] Shankar Vembu,et al. Chemical gas sensor drift compensation using classifier ensembles , 2012 .
[22] Yi Mu,et al. Improving Privacy and Security in Decentralized Ciphertext-Policy Attribute-Based Encryption , 2015, IEEE Transactions on Information Forensics and Security.
[23] Sencun Zhu,et al. SDAP: a secure hop-by-Hop data aggregation protocol for sensor networks , 2006, MobiHoc '06.
[24] Azizol Abdullah,et al. AES and ECC Mixed for ZigBee Wireless Sensor Security , 2011 .
[25] Bin Yang,et al. Study on Security of Wireless Sensor Network Based on ZigBee Standard , 2009, 2009 International Conference on Computational Intelligence and Security.
[26] Xiaodong Lin,et al. A Lightweight Conditional Privacy-Preservation Protocol for Vehicular Traffic-Monitoring Systems , 2013, IEEE Intelligent Systems.
[27] Wenbo He,et al. KIPDA: k-indistinguishable privacy-preserving data aggregation in wireless sensor networks , 2011, 2011 Proceedings IEEE INFOCOM.
[28] N. Vongurai,et al. Frequency-Based Steganography Using 32x32 Interpolated Quantization Table and Discrete Cosine Transform , 2012, 2012 Fourth International Conference on Computational Intelligence, Modelling and Simulation.
[29] ASHWIN MACHANAVAJJHALA,et al. L-diversity: privacy beyond k-anonymity , 2006, 22nd International Conference on Data Engineering (ICDE'06).
[30] Shekhar Verma,et al. Secure data aggregation in wireless sensor networks using homomorphic encryption , 2015 .
[31] Kun Liu,et al. Random projection-based multiplicative data perturbation for privacy preserving distributed data mining , 2006, IEEE Transactions on Knowledge and Data Engineering.
[32] Niels Provos,et al. Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..
[33] Jimeng Sun,et al. Hiding in the Crowd: Privacy Preservation on Evolving Streams through Correlation Tracking , 2007, 2007 IEEE 23rd International Conference on Data Engineering.
[34] Ibrahim Khalil,et al. Robust privacy preservation and authenticity of the collected data in cognitive radio network - Walsh-Hadamard based steganographic approach , 2015, Pervasive Mob. Comput..
[35] Robert H. Deng,et al. Attribute-Based Encryption With Verifiable Outsourced Decryption , 2013, IEEE Transactions on Information Forensics and Security.
[36] L. Zheng. ZigBee Wireless Sensor Network in Industrial Applications , 2006, 2006 SICE-ICASE International Joint Conference.
[37] Xiaohui Liang,et al. UDP: Usage-Based Dynamic Pricing With Privacy Preservation for Smart Grid , 2013, IEEE Transactions on Smart Grid.
[38] D. Vasumathi,et al. A reversible data embedding scheme for MPEG-4 video using non-zero AC coefficients of DCT , 2013, 2013 IEEE International Conference on Computational Intelligence and Computing Research.
[39] Saed Alrabaee,et al. Aggregation function using Homomorphic encryption in participating sensing application , 2014, 2014 6th International Conference on Computer Science and Information Technology (CSIT).