A systematic survey: Security threats to UAV-aided IoT applications, taxonomy, current challenges and requirements with future research directions

M Adil, MA Jan, Y Liu, H Abulkasim… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
Unmanned aerial vehicles (UAVs) as an intermediary can offer an efficient and useful
communication paradigm for different Internet of Things (IoT) applications. Following the …

A survey of the social internet of vehicles: Secure data issues, solutions, and federated learning

L Xing, P Zhao, J Gao, H Wu… - IEEE Intelligent …, 2022 - ieeexplore.ieee.org
The Social Internet of Vehicles (SIoV) is constructed so that the vehicle, as an entity,
generates social awareness, which leads to the social behavior of the vehicle. The SIoV has …

Data-driven intrusion detection for intelligent internet of vehicles: A deep convolutional neural network-based method

L Nie, Z Ning, X Wang, X Hu… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
As an industrial application of Internet of Things (IoT), Internet of Vehicles (IoV) is one of the
most crucial techniques for Intelligent Transportation System (ITS), which is a basic element …

Preserving privacy in WiFi localization with plausible dummy locations

P Zhao, W Liu, G Zhang, Z Li… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Benefiting from the development of wireless communication, WiFi localization plays a vital
role in various mobile applications. However, users' locations are breached by untrusted …

Privacy preservation using machine learning in the internet of things

S El-Gendy, MS Elsayed, A Jurcut, MA Azer - Mathematics, 2023 - mdpi.com
The internet of things (IoT) has prepared the way for a highly linked world, in which
everything is interconnected, and information exchange has become more easily accessible …

Influence of cementite coarsening on the corrosion resistance of high strength low alloy steel

C Liu, C Li, Z Che, X Li, S Yang, Z Liu, Y Zhou… - npj Materials …, 2023 - nature.com
The impact of heat treatment on the initiation and progression of localized corrosion in E690
steel in a simulated marine environment was investigated systematically. The primary cause …

A Review of Anonymization Algorithms and Methods in Big Data

E Shamsinejad, T Banirostam, MM Pedram… - Annals of Data …, 2024 - Springer
In the era of big data, with the increase in volume and complexity of data, the main challenge
is how to use big data while preserving the privacy of users. This study was conducted with …

LDP-based social content protection for trending topic recommendation

J Wei, J Li, Y Lin, J Zhang - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
Trending topic recommendation (TTR) has become a popular social service for social users
to obtain interesting topics based on public social content. Due to sensitive privacy, the …

Lightweight privacy-preserving scheme in Wi-Fi fingerprint-based indoor localization

G Zhang, A Zhang, P Zhao, J Sun - IEEE Systems Journal, 2020 - ieeexplore.ieee.org
Wi-Fi fingerprint-based localization, a common indoor localization technique, plays an
important role in the Internet of Things, supporting a number of mobile applications, eg …

On the case of privacy in the IoT ecosystem: A survey

S Imtiaz, R Sadre, V Vlassov - 2019 international conference on …, 2019 - ieeexplore.ieee.org
IoT has enabled the creation of a multitude of personal applications and services for a better
understanding of urban environments and our personal lives. These services are driven by …