Trust-aware routing protocol for mobile crowdsensing environments

KZ Ghafoor, L Kong, AS Sadiq… - … -IEEE Conference on …, 2018 - ieeexplore.ieee.org
Link quality, trust management and energy efficiency are considered as main factors that
affect the performance and lifetime of Mobile CrowdSensing (MCS). Routing packets toward …

Persistent traffic measurement through vehicle-to-infrastructure communications

H Huang, YE Sun, S Chen, H Xu… - 2017 IEEE 37th …, 2017 - ieeexplore.ieee.org
Measuring point traffic volume and point-to-point traffic volume in a road system has
important applications in transportation engineering. The connected vehicle technologies …

Data loss and reconstruction of location differential privacy protection based on edge computing

W Jing, Q Miao, H Song, X Chen - IEEE Access, 2019 - ieeexplore.ieee.org
With the development of the Internet of Things (IoT), the delay caused by network
transmission has led to low data processing efficiency. The emergence of edge computing …

Privacy-aware task data management using TPR*-Tree for trajectory-based crowdsourcing

Y Li, BS Shin - The Journal of Supercomputing, 2018 - Springer
Spatial crowdsourcing is a promising architecture for collecting various types of data online
with the aid of participants' powerful mobile devices. However, it is also associated with …

A verifiable sealed-bid multi-qualitative-attribute based auction scheme in the semi-honest model

W Shi, W Wei, J Wang, Q Zhao, Z Lin, H Wang - IEEE access, 2016 - ieeexplore.ieee.org
Recently, several privacy-preserving auction schemes are proposed for protecting the bid
privacy and securing the auction. In this paper, a sealed-bid auction scheme focusing on …

Compressive sensing based on homomorphic encryption and attack classification using machine learning algorithm in WSN security

S Ifzarne, I Hafidi, N Idrissi - … of the 3rd International Conference on …, 2020 - dl.acm.org
Data protection is essential for sensitive applications using Wireless Sensor Networks like
health monitoring or video surveillance. WSN are deployed generally in harsh environment …

Drone-based wireless relay using online tensor update

Y Xie, XY Liu, L Kong, F Wu, G Chen… - 2016 IEEE 22nd …, 2016 - ieeexplore.ieee.org
In the wireless communication, there are many cases where the transmission path is
obstructed by unknown objects. With the rapid development of the drone technology in …

Privacy-preserving compressive sensing for traffic estimation

J Li, W Guo, Z Ma, X Meng, Y Yang… - 2019 IEEE Global …, 2019 - ieeexplore.ieee.org
Traffic estimation is a popular approach to acquire traffic conditions in urban areas. At
present, using the traffic data to realize the low-cost traffic estimation has already been …

Differentially private matrix completion via distributed matrix factorization

H Zhou, XY Liu, C Fu, C Shang… - 2018 17th IEEE …, 2018 - ieeexplore.ieee.org
Recovering a decentralized low-rank matrix from an incomplete set of its entries is one of
great research interests. Privacy makes our issue difficult. In this paper, we propose a novel …

DeepOpp: Context-aware mobile access to social media content on underground metro systems

D Wu, DI Arkhipov, T Przepiorka, Q Liu… - 2017 IEEE 37th …, 2017 - ieeexplore.ieee.org
Accessing online social media content on underground metro systems is a challenge due to
the fact that passengers often lose connectivity for large parts of their commute. As the oldest …