Anonymization techniques for privacy preserving data publishing: A comprehensive survey

A Majeed, S Lee - IEEE access, 2020 - ieeexplore.ieee.org
Anonymization is a practical solution for preserving user's privacy in data publishing. Data
owners such as hospitals, banks, social network (SN) service providers, and insurance …

Privacy-preserving blockchain-based federated learning for IoT devices

Y Zhao, J Zhao, L Jiang, R Tan, D Niyato… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
Home appliance manufacturers strive to obtain feedback from users to improve their
products and services to build a smart home system. To help manufacturers develop a smart …

Link prediction adversarial attack via iterative gradient attack

J Chen, X Lin, Z Shi, Y Liu - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Increasing deep neural networks are applied in solving graph evolved tasks, such as node
classification and link prediction. However, the vulnerability of deep models can be revealed …

A ε-sensitive indistinguishable scheme for privacy preserving

L Zhang, M Chen, D Liu, L He, C Wang, Y Sun… - Wireless networks, 2020 - Springer
In general, continuous queries in location-based service usually point to a predetermined
destination, as the destination usually means the most sensitive point for a user, the process …

[PDF][PDF] Machine learning data detection poisoning attacks using resource schemes multi-linear regression

K Ganesan - Neural, Parallel, & Scientific Computations, 2020 - dynamicpublishers.org
Machine learning methods become more and more popular. The purpose of using these
methods is to become more and more popular network security components such as …

Overview of Security of Virtual Mobile Networks

I Ahmad, I Harjula, J Pinola - arXiv preprint arXiv:2007.08871, 2020 - arxiv.org
5G is enabling different services over the same physical infrastructure through the concepts
and technologies of virtualization, softwarization, slicing and cloud computing. Virtual Mobile …

[PDF][PDF] Lili He, Chao Wang, Yue Sun & Bin Wang

L Zhang, M Chen, D Liu - researchgate.net
In general, continuous queries in location-based service usually point to a predetermined
destination, as the destination usually means the most sensitive point for a user, the process …