2020
DOI: 10.1109/tnse.2018.2830307
|View full text |Cite
|
Sign up to set email alerts
|

A Private and Efficient Mechanism for Data Uploading in Smart Cyber-Physical Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
231
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
10

Relationship

4
6

Authors

Journals

citations
Cited by 494 publications
(231 citation statements)
references
References 28 publications
0
231
0
Order By: Relevance
“…PINQ proposed an algebraic method to describe the protection of privacy data analysis, and they ensured that the results satisfied difference privacy. Differential privacy is also frequently studied on the context of index [38][39][40][41][42][43][44][45][46]. This paper combines matrix manipulation of attributes with differential privacy technology, and we propose a novel privacy protection method to prevent attackers to infer user's sensitive information.…”
Section: Privacy Protectmentioning
confidence: 99%
“…PINQ proposed an algebraic method to describe the protection of privacy data analysis, and they ensured that the results satisfied difference privacy. Differential privacy is also frequently studied on the context of index [38][39][40][41][42][43][44][45][46]. This paper combines matrix manipulation of attributes with differential privacy technology, and we propose a novel privacy protection method to prevent attackers to infer user's sensitive information.…”
Section: Privacy Protectmentioning
confidence: 99%
“…Location-based social networks (LBSNs) are a kind of social networks which include geographical information into shared contents. Many research problems emerge in LBSNs such as information propagation [6][7][8][9], privacy, and security [10][11][12][13][14]. Among them, friends and POI recommendation aiming at helping users make friends and find new places are two important services in LBSNs that have attracted a lot of attentions recently [15][16][17][18].…”
Section: Introductionmentioning
confidence: 99%
“…Due to the explosiveness of big data, many new highperformance requirements of network throughput, real-time performance, security privacy, and bandwidth have been put forward [1][2][3][4]. It is consequently challenging to design efficient link scheduling algorithms to improve communication efficiency in wireless communication.…”
Section: Introductionmentioning
confidence: 99%