When machine learning meets privacy: A survey and outlook

B Liu, M Ding, S Shaham, W Rahayu… - ACM Computing …, 2021 - dl.acm.org
The newly emerged machine learning (eg, deep learning) methods have become a strong
driving force to revolutionize a wide range of industries, such as smart healthcare, financial …

Synergy of big data and 5G wireless networks: opportunities, approaches, and challenges

N Zhang, P Yang, J Ren, D Chen… - IEEE Wireless …, 2018 - ieeexplore.ieee.org
This article presents the synergistic and complementary features of big data and 5G wireless
networks. An overview of their interplay is provided first, including big-data-driven …

Delay-minimization routing for heterogeneous VANETs with machine learning based mobility prediction

Y Tang, N Cheng, W Wu, M Wang… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Establishing and maintaining end-to-end connections in a vehicular ad hoc network
(VANET) is challenging due to the high vehicle mobility, dynamic inter-vehicle spacing, and …

Privacy enhancing technologies for solving the privacy-personalization paradox: Taxonomy and survey

N Kaaniche, M Laurent, S Belguith - Journal of Network and Computer …, 2020 - Elsevier
Personal data are often collected and processed in a decentralized fashion, within different
contexts. For instance, with the emergence of distributed applications, several providers are …

Joint task assignment, transmission, and computing resource allocation in multilayer mobile edge computing systems

P Wang, C Yao, Z Zheng, G Sun… - IEEE Internet of Things …, 2018 - ieeexplore.ieee.org
In this paper, we propose a multilayer data flow processing system, ie, EdgeFlow, to
integrally utilize the computing capacity throughout the whole network, ie, the cloud center …

Efficient identity-based provable multi-copy data possession in multi-cloud storage

J Li, H Yan, Y Zhang - IEEE Transactions on Cloud Computing, 2019 - ieeexplore.ieee.org
To increase the availability and durability of the outsourced data, many customers store
multiple copies on multiple cloud servers. To guarantee the integrity of multi-copies, some …

Identity-based privacy preserving remote data integrity checking for cloud storage

J Li, H Yan, Y Zhang - IEEE Systems Journal, 2020 - ieeexplore.ieee.org
Although cloud storage service enables people easily maintain and manage amounts of
data with lower cost, it cannot ensure the integrity of people's data. In order to audit the …

Privacy-preserving reputation management for edge computing enhanced mobile crowdsensing

L Ma, X Liu, Q Pei, Y Xiang - IEEE Transactions on Services …, 2018 - ieeexplore.ieee.org
Mobile crowdsensing (MCS) has gained popularity for its potential to leverage individual
mobile devices to sense, collect, and analyze data instead of deploying sensors. As the …

Enabling AI in future wireless networks: A data life cycle perspective

DC Nguyen, P Cheng, M Ding… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
Recent years have seen rapid deployment of mobile computing and Internet of Things (IoT)
networks, which can be mostly attributed to the increasing communication and sensing …

Location privacy and its applications: A systematic study

B Liu, W Zhou, T Zhu, L Gao, Y Xiang - IEEE access, 2018 - ieeexplore.ieee.org
This paper surveys the current research status of location privacy issues in mobile
applications. The survey spans five aspects of study: the definition of location privacy …