Differential privacy techniques for cyber physical systems: a survey

MU Hassan, MH Rehmani… - … Communications Surveys & …, 2019 - ieeexplore.ieee.org
Modern cyber physical systems (CPSs) has widely being used in our daily lives because of
development of information and communication technologies (ICT). With the provision of …

Differentially private data fusion and deep learning framework for cyber–physical–social systems: State-of-the-art and perspectives

NJ Gati, LT Yang, J Feng, X Nie, Z Ren, SK Tarus - Information Fusion, 2021 - Elsevier
The modern technological advancement influences the growth of the cyber–physical system
and cyber–social system to a more advanced computing system cyber–physical–social …

QTSAC: An energy-efficient MAC protocol for delay minimization in wireless sensor networks

Y Liu, K Ota, K Zhang, M Ma, N Xiong, A Liu… - IEEE Access, 2018 - ieeexplore.ieee.org
Millions of sensors are deployed to monitor the smart grid. They consume huge amounts of
energy in the communication infrastructure. Therefore, the establishment of an energy …

Towards privacy-preserving incentive for mobile crowdsensing under an untrusted platform

Z Wang, J Li, J Hu, J Ren, Z Li… - IEEE INFOCOM 2019-IEEE …, 2019 - ieeexplore.ieee.org
Reverse auction-based incentive mechanisms have been commonly proposed to stimulate
mobile users to participate in crowdsensing, where users submit bids to the platform to …

Maximizing network lifetime using coverage sets scheduling in wireless sensor networks

C Luo, Y Hong, D Li, Y Wang, W Chen, Q Hu - Ad Hoc Networks, 2020 - Elsevier
Abstract In a Wireless Sensor Network (WSN), when a large amount of sensors are
randomly deployed into a detection area, an efficient sleep/active scheduling for sensors to …

Nowhere to hide: Efficiently identifying probabilistic cloning attacks in large-scale RFID systems

X Ai, H Chen, K Lin, Z Wang, J Yu - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Radio-Frequency Identification (RFID) is an emerging technology which has been widely
applied in various scenarios, such as tracking, object monitoring, and social networks, etc …

Cost-effective barrier coverage formation in heterogeneous wireless sensor networks

Z Wang, Q Cao, H Qi, H Chen, Q Wang - Ad Hoc Networks, 2017 - Elsevier
Barrier coverage is a critical issue in wireless sensor networks (WSNs) for security
applications, which however cannot be guaranteed to be formed after initial random …

A distributed border surveillance (dbs) system for rectangular and circular region of interest with wireless sensor networks in shadowed environments

J Amutha, J Nagar, S Sharma - Wireless Personal Communications, 2021 - Springer
Border surveillance is indeed one of the most pertinent applications of wireless sensor
networks, primarily used for security purposes such as intrusion detection in border regions …

Energy-efficient barrier coverage with probabilistic sensors in wireless sensor networks

P Si, J Ma, F Tao, Z Fu, L Shu - IEEE Sensors Journal, 2020 - ieeexplore.ieee.org
Barrier coverage is an important research issue in wireless sensor networks (WSNs). Barrier
gaps may exist due to deployment randomness or battery depletion. It is critical to address …

[HTML][HTML] Convex hull obstacle-aware pedestrian tracking and target detection in theme park applications

Y Choi, H Kim - Drones, 2023 - mdpi.com
Barriers are utilized for various tasks in security, environmental monitoring, penetration
detection and reconnaissance. It is highly necessary to consider how to support pedestrian …