A review on near-duplicate detection of images using computer vision techniques

KK Thyagharajan, G Kalaiarasi - Archives of Computational Methods in …, 2021 - Springer
Nowadays, digital content is widespread and simply redistributable, either lawfully or
unlawfully. For example, after images are posted on the internet, other web users can modify …

Learning the truth privately and confidently: Encrypted confidence-aware truth discovery in mobile crowdsensing

Y Zheng, H Duan, C Wang - IEEE Transactions on Information …, 2018 - ieeexplore.ieee.org
Mobile crowdsensing enables convenient sensory data collection from a large number of
mobile devices and has found various applications. In the real practice, however, the …

Providing task allocation and secure deduplication for mobile crowdsensing via fog computing

J Ni, K Zhang, Y Yu, X Lin… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Mobile crowdsensing enables a crowd of individuals to cooperatively collect data for special
interest customers using their mobile devices. The success of mobile crowdsensing largely …

Privacy-aware and efficient mobile crowdsensing with truth discovery

Y Zheng, H Duan, X Yuan… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Truth discovery in mobile crowdsensing has recently received wide attention. It refers to the
procedure for estimating the unknown user reliability from collected sensory data and …

PPQC: A blockchain-based privacy-preserving quality control mechanism in crowdsensing applications

J An, Z Wang, X He, X Gui, J Cheng… - IEEE/ACM Transactions …, 2022 - ieeexplore.ieee.org
With the rapid development of embedded smart devices, a new data collection paradigm,
mobile crowd-sensing (MCS), has been proposed. MCS allows individuals from the crowd to …

Building in-the-cloud network functions: Security and privacy challenges

P Jiang, Q Wang, M Huang, C Wang, Q Li… - Proceedings of the …, 2021 - ieeexplore.ieee.org
Network function virtualization (NFV) has been promising to improve the availability,
programmability, and flexibility of network function deployment and communication facilities …

An efficient ranked multi-keyword search for multiple data owners over encrypted cloud data

T Peng, Y Lin, X Yao, W Zhang - iEEE Access, 2018 - ieeexplore.ieee.org
With the development of cloud storage, more data owners are inclined to outsource their
data to cloud services. For privacy concerns, sensitive data should be encrypted before …

Privacy-preserving deduplication of sensor compressed data in distributed fog computing

C Zhang, Y Miao, Q Xie, Y Guo, H Du… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Distributed fog computing has received wide attention recently. It enables distributed
computing and data management on the network nodes within the close vicinity of IoT …

Privacy-preserving image denoising from external cloud databases

Y Zheng, H Cui, C Wang, J Zhou - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Along with the rapid advancement of digital image processing technology, image denoising
remains a fundamental task, which aims to recover the original image from its noisy …

FVC-dedup: A secure report deduplication scheme in a fog-assisted vehicular crowdsensing system

S Jiang, J Liu, Y Zhou, Y Fang - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
It is observed that modern vehicles are becoming more and more powerful in computing,
communications, and storage capacity. By interacting with other vehicles or with local …