Anomalies detection through smartphone sensors: A review

M Krichen - IEEE Sensors Journal, 2021 - ieeexplore.ieee.org
With smartphones being so ubiquitous, more connected and largely fitted with several types
of sensors such as GPS, microphones, cameras, magnetometers, accelerometers, etc; there …

[HTML][HTML] Poisoning attacks and countermeasures in intelligent networks: Status quo and prospects

C Wang, J Chen, Y Yang, X Ma, J Liu - Digital Communications and …, 2022 - Elsevier
Over the past years, the emergence of intelligent networks empowered by machine learning
techniques has brought great facilitates to different aspects of human life. However, using …

A triple real-time trajectory privacy protection mechanism based on edge computing and blockchain in mobile crowdsourcing

W Wang, Y Wang, P Duan, T Liu… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
With the rapid development of the Internet of Things (IoT) and the rapid popularization of 5 G
networks, the data that needs to be processed in Mobile Crowdsourcing (MCS) system is …

POTA: Privacy-preserving online multi-task assignment with path planning

C Zhang, X Luo, J Liang, X Liu, L Zhu… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Privacy-preserving online multi-task assignment is a crucial aspect of spatial crowdsensing
on untrusted platforms, where multiple real-time tasks are allocated to appropriate workers …

Privacy-preserving online task assignment in spatial crowdsourcing: A graph-based approach

H Wang, E Wang, Y Yang, J Wu… - IEEE INFOCOM 2022 …, 2022 - ieeexplore.ieee.org
Recently, the growing popularity of Spatial Crowd-sourcing (SC), allowing untrusted
platforms to obtain a great quantity of information about workers and tasks' locations, has …

OPTDP: Towards optimal personalized trajectory differential privacy for trajectory data publishing

W Cheng, R Wen, H Huang, W Miao, C Wang - Neurocomputing, 2022 - Elsevier
With the development of location-based applications, more and more trajectory data are
collected. Trajectory data often contains users' sensitive information, and direct release it …

A multi-round game-based source location privacy protection scheme with AUV enabled in underwater acoustic sensor networks

H Wang, G Han, W Lai, Y Hou… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
With a growing demand for the development of smart ocean projects, the Internet of
Underwater Things (IoUT) integrating multiple networks will gradually become the …

A multi-channel interference based source location privacy protection scheme in underwater acoustic sensor networks

H Wang, G Han, Y Hou, M Guizani… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
The Internet of Underwater Things (IoUT) gradually becomes the future direction of ocean.
Many devices, which are called the sources, are deployed in the sea to fulfill scientific …

P3S: Pertinent privacy-preserving scheme for remotely sensed environmental data in smart cities

F Algarni, MA Khan, W Alawad… - IEEE Journal of Selected …, 2023 - ieeexplore.ieee.org
Sensing devices, high-performance networking, and privacy preservation algorithms have
important roles to play in remotely sensed environmental data in smart cities. The data …

TamForen: A tamper‐proof cloud forensic framework

F Ye, Y Zheng, X Fu, B Luo, X Du… - Transactions on …, 2022 - Wiley Online Library
Cloud forensics has become increasingly critical in cloud computing security in recent years.
A fundamental problem in cloud forensics is how to safely and effectively obtain, preserve …