Over the past years, the emergence of intelligent networks empowered by machine learning techniques has brought great facilitates to different aspects of human life. However, using …
W Wang, Y Wang, P Duan, T Liu… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
With the rapid development of the Internet of Things (IoT) and the rapid popularization of 5 G networks, the data that needs to be processed in Mobile Crowdsourcing (MCS) system is …
Privacy-preserving online multi-task assignment is a crucial aspect of spatial crowdsensing on untrusted platforms, where multiple real-time tasks are allocated to appropriate workers …
H Wang, E Wang, Y Yang, J Wu… - IEEE INFOCOM 2022 …, 2022 - ieeexplore.ieee.org
Recently, the growing popularity of Spatial Crowd-sourcing (SC), allowing untrusted platforms to obtain a great quantity of information about workers and tasks' locations, has …
W Cheng, R Wen, H Huang, W Miao, C Wang - Neurocomputing, 2022 - Elsevier
With the development of location-based applications, more and more trajectory data are collected. Trajectory data often contains users' sensitive information, and direct release it …
H Wang, G Han, W Lai, Y Hou… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
With a growing demand for the development of smart ocean projects, the Internet of Underwater Things (IoUT) integrating multiple networks will gradually become the …
H Wang, G Han, Y Hou, M Guizani… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
The Internet of Underwater Things (IoUT) gradually becomes the future direction of ocean. Many devices, which are called the sources, are deployed in the sea to fulfill scientific …
F Algarni, MA Khan, W Alawad… - IEEE Journal of Selected …, 2023 - ieeexplore.ieee.org
Sensing devices, high-performance networking, and privacy preservation algorithms have important roles to play in remotely sensed environmental data in smart cities. The data …
F Ye, Y Zheng, X Fu, B Luo, X Du… - Transactions on …, 2022 - Wiley Online Library
Cloud forensics has become increasingly critical in cloud computing security in recent years. A fundamental problem in cloud forensics is how to safely and effectively obtain, preserve …