2021
DOI: 10.30696/ijeea.ix.ii.2021.45-53
|View full text |Cite
|
Sign up to set email alerts
|

Data Publication Based on Differential Privacy in V2g Network

Abstract: Nowadays, the massive amount of data from V2G networks makes many important data mining applications possible and improves the quality of our daily lives. However, data privacy protection in the V2G network has also attracted great attention when data is released to a third party for analysis. In response to this problem, this paper proposes a dynamic data publishing algorithm based on differential privacy. Combined with the idea of data prediction, we propose a combined prediction model to predict the data, a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 38 publications
(2 citation statements)
references
References 8 publications
0
2
0
Order By: Relevance
“…b) Utilize ML techniques to analyze user data, identify patterns, and offer tailored insights for optimizing performance, preventing injuries, and promoting overall wellness. c) Develop Chabot's or virtual fitness assistants that can provide instant guidance, answer user queries, and offer motivation and support [9][10][11][12][13][14][15][16][17][18].…”
Section: Integration Of Artificial Intelligence (Ai) and Machine Lear...mentioning
confidence: 99%
“…b) Utilize ML techniques to analyze user data, identify patterns, and offer tailored insights for optimizing performance, preventing injuries, and promoting overall wellness. c) Develop Chabot's or virtual fitness assistants that can provide instant guidance, answer user queries, and offer motivation and support [9][10][11][12][13][14][15][16][17][18].…”
Section: Integration Of Artificial Intelligence (Ai) and Machine Lear...mentioning
confidence: 99%
“…In any event, it is possible that a few unscrupulous individuals would attempt to exploit the system by establishing fictitious user identities. The Sybil attack is the term used to describe this kind of disruption [21]. Hence, the user needs to submit a national identification card number to demonstrate his/her identity to avoid Sybil.…”
Section: A User Registrationmentioning
confidence: 99%