Complementing IoT services through software defined networking and edge computing: A comprehensive survey

W Rafique, L Qi, I Yaqoob, M Imran… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
Millions of sensors continuously produce and transmit data to control real-world
infrastructures using complex networks in the Internet of Things (IoT). However, IoT devices …

Privacy-preserving localization for underwater sensor networks via deep reinforcement learning

J Yan, Y Meng, X Yang, X Luo… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Underwater sensor networks (USNs) are envisioned to enable a large variety of marine
applications. Such applications require accurate position information of sensor nodes …

Towards accurate and privacy-preserving localization using anchor quality assessment in Internet of Things

F Zuo, Y Li, G Wang, X He - Future Generation Computer Systems, 2023 - Elsevier
Crowdsourced localization plays a significant role for the applications in Internet of Things.
Even though existing studies have proposed privacy-preserving localization algorithms to …

Broad learning-based localization for underwater sensor networks with stratification compensation

J Yan, M Yi, X Yang, X Luo… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
Localization is an indispensable service for underwater sensor networks (USNs). Generally,
the convex optimization method is adopted to solve the localization problem. However, the …

Privacy preserving solution for the asynchronous localization of underwater sensor networks

H Zhao, J Yan, X Luo, X Gua - IEEE/CAA Journal of Automatica …, 2020 - ieeexplore.ieee.org
Location estimation of underwater sensor networks (USNs) has become a critical
technology, due to its fundamental role in the sensing, communication and control of ocean …

Towards trusted node selection using blockchain for crowdsourced abnormal data detection

X He, H Yang, G Wang, J Yu - Future Generation Computer Systems, 2022 - Elsevier
Node selection plays an important role to design and implement the crowdsourced
abnormal data detection system with the purpose of completing complex tasks to meet the …

Resilient participant selection under vulnerability induced colluding attacks for crowdsourcing

G Wang, Y Xu, J He, J Pan, F Zuo… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
This paper investigates the problem of participant selection considering colluding attacks for
crowdsourcing. Compared with existing work, a practical vulnerability-induced colluding …

Privacy-preserving indoor localization based on inner product encryption in a cloud environment

Z Wang, Y Xu, Y Yan, Y Zhang, Z Rao… - Knowledge-Based …, 2022 - Elsevier
How to utilize the resource-rich cloud to provide scalable indoor localization service to solve
the problem of limited user equipment resources while preventing privacy leakage has …

To hide private position information in localization for internet of underwater things

J Yan, Y Meng, X Luo, X Guan - IEEE Internet of Things Journal, 2021 - ieeexplore.ieee.org
Privacy-preserving localization for Internet of Underwater Things (IoUT) plays a fundamental
role in the sensing, communication and control of ocean environments. However, the unique …

Resilient privacy-preserving distributed localization against dishonest nodes in Internet of Things

X Shi, F Tong, WA Zhang, L Yu - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Existing distributed localization methods rarely consider the location privacy preservation
problem, which however is nonnegligible. Regarding location privacy, typical solutions rely …