Privacy-preserving bin-packing with differential privacy

T Li, Z Erkin, RL Lagendijk - IEEE Open Journal of Signal …, 2022 - ieeexplore.ieee.org
With the emerging of e-commerce, package theft is at a high level: It is reported that 1.7
million packages are stolen or lost every day in the US in 2020, which costs $25 million …

A Privacy-Preserving and Research-Utilizable Trajectory Generator via Deep Generative Approach

X Sun, T Wo - 2023 6th International Conference on …, 2023 - ieeexplore.ieee.org
Large-scale trajectory data is critical for a smart city to improve the efficiency of a
transportation system. However, the release of original trajectory data violates privacy …

Privacy-preserving categorization of mobile applications based on large-scale usage data

Y He, C Wang, G Xu, W Lian, H Xian, W Wang - Information Sciences, 2020 - Elsevier
Categorization of mobile applications (apps) according to their functionalities is essential for
app stores in maintaining a huge quantity of apps efficiently and securely. The problem in …

An edge trajectory protection approach using blockchain

M Wang, G Li, Y Zhang, K Gai, M Qiu - … 2021, Tokyo, Japan, August 14–16 …, 2021 - Springer
With the popularity of edge-based trajectory applications, application providers have
accumulated a large amount of user trajectory data. However, direct use of trajectory data …

[引用][C] Secured multi-party data release on cloud for big data privacy-preserving using fusion learning

D Dangi - Turkish Journal of Computer and Mathematics …, 2021

GAN-based Differential Privacy Trajectory Data Publishing with Sensitive Label

L Yao, Y Zhang, Z Zheng, G Wu - 2022 8th International …, 2022 - ieeexplore.ieee.org
With the development of location awareness technology, trajectory data is easy to be
collected and applied to urban transportation, mobile medical care, etc. However, trajectory …

Fuzzy vault‐based three‐factor authentication and key exchange for 5G‐integrated wireless sensor networks

J Sun, Q Jiang, J Ma, Q Cheng, CL I… - Transactions on …, 2021 - Wiley Online Library
The integration of the wireless sensor networks (WSNs) and the advanced 5G networks has
greatly enriched applications of the Internet of Things. However, the open access to sensor …

Quality & Privacy in User-generated Big Data: Algorithms & Techniques

M Katsomallos - 2021 - hal.science
Sensors, portable devices, and location-based services, generate massive amounts of geo-
tagged, and/or location-and user-related data on a daily basis. The manipulation of such …

A Novel Privacy Preserving Real-Time Navigation

Y Deng, L Zhang, J Li, B Wang - Available at SSRN 4696986 - papers.ssrn.com
With the increasing number of private cars and connected cars, drivers urgently need a more
intelligent driving environment to cope with the complex traffic environment. The Internet of …

[引用][C] Preserving privacy in software defined car environments

Y Li - 2022