2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS) 2018
DOI: 10.1109/icdcs.2018.00133
|View full text |Cite
|
Sign up to set email alerts
|

Private Memoirs of IoT Devices: Safeguarding User Privacy in the IoT Era

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 22 publications
(10 citation statements)
references
References 15 publications
0
10
0
Order By: Relevance
“…PSNR(X, Y) = 10 log 10 (2 n − 1) 2 MSE(X, Y) (7) where MSE means mean square error operation, and n denotes the number of bits per pixel (generally n = 8). 2) Structural Similarity Index (SSIM): As a common image standard evaluation index, SSIM can evaluate the similarity between two images from different perspectives, including brightness, contrast, and structure.…”
Section: ) Video Restorationmentioning
confidence: 99%
“…PSNR(X, Y) = 10 log 10 (2 n − 1) 2 MSE(X, Y) (7) where MSE means mean square error operation, and n denotes the number of bits per pixel (generally n = 8). 2) Structural Similarity Index (SSIM): As a common image standard evaluation index, SSIM can evaluate the similarity between two images from different perspectives, including brightness, contrast, and structure.…”
Section: ) Video Restorationmentioning
confidence: 99%
“…Privacy: IoT vendors mostly conduct a massive data collection strategy to produce useful insights for their services. They often perform this operation by sacrificing users' privacy [13], threatening the trust and usability of overall IoT systems. Blockchain cannot fully solve this problem; however, it can help users achieve pseudonymity.…”
Section: Non-repudiationmentioning
confidence: 99%
“…IoT devices can leak sensitive information, as shown by recent studies [96]. For example, the data collected by smart switches, smart thermostats, and smart power meters can leak information, including information about whether a home is being occupied [97], [98].…”
Section: Security and Privacy In The Internet Of Thingsmentioning
confidence: 99%
“…rooftop solar panels) can reveal home location [99], [100]. In solar energy analytics, energy data can leak location information, which may cause location-based privacy attacks [96]. In critical fields (military, as an example), the privacy threat is very dangerous, because IoT devices can leak sensitive information that the enemy can exploit.…”
Section: Security and Privacy In The Internet Of Thingsmentioning
confidence: 99%
See 1 more Smart Citation