Service caching and computation reuse strategies at the edge: A survey

C Barrios, M Kumar - ACM Computing Surveys, 2023 - dl.acm.org
With the proliferation of connected devices including smartphones, novel network
connectivity and management methods are needed to meet user Quality of Experience …

Privacy-preserving collaborative learning: A scheme providing heterogeneous protection

X Wang, H Zhang, M Yang, X Wu… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
With the widespread application of collaborative learning (CL) technology in mobile-
crowdsourcing-related scenarios, special attention should be paid to the privacy disclosure …

A survey on data dissemination in internet of vehicles networks

N Azzaoui, A Korichi, B Brik, H Amirat - Journal of Location Based …, 2023 - Taylor & Francis
Internet of vehicles (IoV) is rapidly growing as key enablers of new applications related to
Intelligent Transportation System (ITS), including: autonomous driving, teleoperation …

Ramc: Reverse auction based multilevel cooperation for large size data download in vanets

S Wang, F Ma, Z Yu - IEEE Internet of Things Journal, 2023 - ieeexplore.ieee.org
The cooperative data download in vehicular ad hoc networks (VANETs) is attracting more
and more attention since a great number of services and applications, which aim at …

Efficient suppression algorithms for preserving trajectory privacy

CY Lin - Information Sciences, 2024 - Elsevier
Concerns about the security of trajectory data have surfaced amid rising public awareness of
privacy protection. In this study, we focus on how to protect personal information effectively …

Distributed Power Load Missing Value Forecasting with Privacy Protection

Y Miao, L Qi, H Wu, Y Tian, S Wu, Y Wang… - … Conference on Machine …, 2022 - Springer
In the era of the Internet of Things (IoT) supporting 5 G technology, the Smart Grid (SG) is an
important part of Smart City. Specifically, load forecasting is a key ingredient of the …

[PDF][PDF] Grid Anonymous Trajectory Privacy Protection Algorithm Based on Differential Privacy

H Dai, Z Wu, S Wang, K Wu - IAENG International Journal of Applied …, 2023 - iaeng.org
Attackers can use data analysis to learn about the user's regular habits if the current
trajectory data is shared and used without being processed. It will lead to the user's private …