2019
DOI: 10.1016/j.jpdc.2019.04.007
|View full text |Cite
|
Sign up to set email alerts
|

A risk defense method based on microscopic state prediction with partial information observations in social networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
43
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
6
3

Relationship

1
8

Authors

Journals

citations
Cited by 83 publications
(43 citation statements)
references
References 31 publications
0
43
0
Order By: Relevance
“…Fog computing [36] involves many technologies, such as resource management, privacy protection [37], network connection, etc. The development of fog computing depends on the continuous advancement of these technologies, and architecture is the cornerstone of all technologies [38].…”
Section: The Architecture Of Vehicular Fog Computingmentioning
confidence: 99%
“…Fog computing [36] involves many technologies, such as resource management, privacy protection [37], network connection, etc. The development of fog computing depends on the continuous advancement of these technologies, and architecture is the cornerstone of all technologies [38].…”
Section: The Architecture Of Vehicular Fog Computingmentioning
confidence: 99%
“…However, a large subregion would increase the energy dissipation of image transmission within the region. Therefore, we provide the following inequality: (11) where N comp is the average number of compressed images per normal node in a round; T round is the time consumed by one round; F camera is the image transmission frequency of the camera node; N area is the number of sub-regions; S area is the area of the network region.…”
Section: Determining the Number Of Subregionsmentioning
confidence: 99%
“…WMSNs integrate and expand the application of traditional WSNs and are widely used in security and environment monitoring, intelligent transportation and homes, and other applications requiring multimedia information. WMSNs are a typical application motivated by the combination of Wireless Sensor Networks (WSNs) and edge computing [11][12][13][14][15].…”
Section: Introductionmentioning
confidence: 99%
“…Moreover, in order to perfect the system, they also design a task allocation scheme, a reward scheme, and a processing flow to deal with the pictures uploaded. Considering the security of the data such as photos, Wu et al, propose a data protection and recovery method based on the incentive [35] and a prediction-based risk defense strategy [36] for the data. Zhuo et al [37] propose a tripartite architecture for data aggregation and analysis to mitigate the pressure of resource constrained requesters in mobile crowdsourcing by means of cloud support; they achieve privacy-preserving of data and identity of workers.…”
Section: Photo Crowdsourcingmentioning
confidence: 99%