Game theory for cyber security and privacy

CT Do, NH Tran, C Hong, CA Kamhoua… - ACM Computing …, 2017 - dl.acm.org
In this survey, we review the existing game-theoretic approaches for cyber security and
privacy issues, categorizing their application into two classes, security and privacy. To show …

Sensor network security: A survey

X Chen, K Makki, K Yen… - … surveys & tutorials, 2009 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) use small nodes with constrained capabilities to sense,
collect, and disseminate information in many types of applications. As sensor networks …

Blockchain for secure and efficient data sharing in vehicular edge computing and networks

J Kang, R Yu, X Huang, M Wu… - IEEE Internet of …, 2018 - ieeexplore.ieee.org
The drastically increasing volume and the growing trend on the types of data have brought
in the possibility of realizing advanced applications such as enhanced driving safety, and …

Deepchain: Auditable and privacy-preserving deep learning with blockchain-based incentive

J Weng, J Weng, J Zhang, M Li… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Deep learning can achieve higher accuracy than traditional machine learning algorithms in
a variety of machine learning tasks. Recently, privacy-preserving deep learning has drawn …

Vehicular fog computing: A viewpoint of vehicles as the infrastructures

X Hou, Y Li, M Chen, D Wu, D Jin… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
With the emergence of ever-growing advanced vehicular applications, the challenges to
meet the demands from both communication and computation are increasingly prominent …

A blockchain based privacy-preserving incentive mechanism in crowdsensing applications

J Wang, M Li, Y He, H Li, K Xiao, C Wang - Ieee Access, 2018 - ieeexplore.ieee.org
Crowdsensing applications utilize the pervasive smartphone users to collect large-scale
sensing data efficiently. The quality of sensing data depends on the participation of highly …

Accountable algorithms

JA Kroll - 2015 - search.proquest.com
Important decisions about people are increasingly made by algorithms: Votes are counted;
voter rolls are purged; financial aid decisions are made; taxpayers are chosen for audits; air …

A blockchain-based trust management with conditional privacy-preserving announcement scheme for VANETs

X Liu, H Huang, F Xiao, Z Ma - IEEE Internet of Things Journal, 2019 - ieeexplore.ieee.org
As the infrastructure of the intelligent transportation system, vehicular ad hoc networks
(VANETs) have greatly improved traffic efficiency. However, due to the openness …

Trust management system design for the Internet of Things: A context-aware and multi-service approach

YB Saied, A Olivereau, D Zeghlache, M Laurent - Computers & Security, 2013 - Elsevier
This work proposes a new trust management system (TMS) for the Internet of Things (IoT).
The wide majority of these systems are today bound to the assessment of trustworthiness …

Distributed reputation management for secure and efficient vehicular edge computing and networks

X Huang, R Yu, J Kang, Y Zhang - IEEE Access, 2017 - ieeexplore.ieee.org
Vehicular edge computing (VEC) is introduced to extend computing capacity to vehicular
network edge recently. With the advent of VEC, service providers directly host services in …