An anonymous entropy-based location privacy protection scheme in mobile social networks

L Ni, F Tian, Q Ni, Y Yan, J Zhang - EURASIP Journal on Wireless …, 2019 - Springer
The popularization of mobile communication devices and location technology has spurred
the increasing demand for location-based services (LBSs). While enjoying the convenience …

Instance cloned extreme learning machine

Y Zhang, J Wu, C Zhou, Z Cai - Pattern Recognition, 2017 - Elsevier
Abstract Extreme Learning Machine (ELM) is a popular machine learning method which can
flexibly simulate the relationships of real-world classification applications. When facing …

SecVKQ: Secure and verifiable kNN queries in sensor–cloud systems

Q Liu, Z Hao, Y Peng, H Jiang, J Wu, T Peng… - Journal of Systems …, 2021 - Elsevier
Sensor–cloud has gained increasingly popularity since it bridges the physical world and the
cyber world through pervasive computation. This paper focuses on secure and verifiable k …

Privacy-preserving k nearest neighbor query with authentication on road networks

S Yang, S Tang, X Zhang - Journal of Parallel and Distributed Computing, 2019 - Elsevier
Abstract k nearest neighbor (k NN) queries are frequently used in location-based services
(LBSs), by which we wish to get k closest points of interest (POIs) given a certain point. Since …

Dummy generation based on user-movement estimation for location privacy protection

S Hayashida, D Amagata, T Hara, X Xie - IEEE Access, 2018 - ieeexplore.ieee.org
Location-based services (LBSs) have been becoming more common due to the prevalence
of GPS-enabled devices. While LBSs bring many benefits for our daily lives, location …

TAREEG: A MapReduce-based system for extracting spatial data from OpenStreetMap

L Alarabi, A Eldawy, R Alghamdi… - Proceedings of the 22nd …, 2014 - dl.acm.org
Real spatial data, eg, detailed road networks, rivers, buildings, parks, are not easily
available for most of the world. This hinders the practicality of many research ideas that need …

Integrity authentication for SQL query evaluation on outsourced databases: A survey

B Zhang, B Dong, WH Wang - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Spurred by the development of cloud computing, there has been considerable recent
interest in the Database-as-a-Service (DaaS) paradigm. Users lacking in expertise or …

Freshness authentication for outsourced multi-version key-value stores

Y Hu, X Yao, R Zhang, Y Zhang - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Data outsourcing is a promising technical paradigm to facilitate cost-effective real-time data
storage, processing, and dissemination. In data outsourcing, a data owner proactively …

Efficient reverse spatial and textual k nearest neighbor queries on road networks

C Luo, L Junlin, G Li, W Wei, Y Li, J Li - Knowledge-Based Systems, 2016 - Elsevier
The proliferation of geo-positioning technologies boosts the prevalence of GPS-enabled
devices, and thus many spatial-textual objects that possess both text descriptions and geo …

A crowd enabled approach for processing nearest neighbor and range queries in incomplete databases with accuracy guarantee

MT Mahin, T Hashem, S Kabir - Pervasive and Mobile Computing, 2017 - Elsevier
With the proliferation of mobile devices and wireless technologies, location based services
(LBSs) are becoming popular in smart cities. Two important classes of LBSs are Nearest …