A comprehensive analysis of privacy-preserving solutions developed for online social networks

A Majeed, S Khan, SO Hwang - Electronics, 2022 - mdpi.com
Owning to the massive growth in internet connectivity, smartphone technology, and digital
tools, the use of various online social networks (OSNs) has significantly increased. On the …

Privacy-preserving Naive Bayes classifiers secure against the substitution-then-comparison attack

C Gao, Q Cheng, P He, W Susilo, J Li - Information Sciences, 2018 - Elsevier
Naive Bayes (NB) is a simple but highly practical classifier, with a wide range of applications
including spam filters, cancer diagnosis and face recognition, to name a few examples only …

SPOC: A secure and privacy-preserving opportunistic computing framework for mobile-healthcare emergency

R Lu, X Lin, X Shen - IEEE transactions on parallel and …, 2012 - ieeexplore.ieee.org
With the pervasiveness of smart phones and the advance of wireless body sensor networks
(BSNs), mobile Healthcare (m-Healthcare), which extends the operation of Healthcare …

Mobile social networks: Design requirements, architecture, and state-of-the-art technology

Z Mao, Y Jiang, G Min, S Leng, X **, K Yang - Computer Communications, 2017 - Elsevier
Mobile social networks (MSNs) are new systems for people to share content, communicate,
and interact. Such networks combine social computing and mobile networking techniques to …

Cloud-assisted privacy-preserving profile-matching scheme under multiple keys in mobile social network

C Gao, Q Cheng, X Li, S **a - Cluster Computing, 2019 - Springer
Making new friends by measuring the proximity of people's profile is a crucial service in
mobile social networks. With the rapid development of cloud computing, outsourcing …

All your location are belong to us: Breaking mobile social networks for automated user location tracking

M Li, H Zhu, Z Gao, S Chen, L Yu, S Hu… - Proceedings of the 15th …, 2014 - dl.acm.org
Location-based social networks (LBSNs) feature friend discovery by location proximity that
has attracted hundreds of millions of users world-wide. While leading LBSN providers claim …

Privacy-preserving data aggregation without secure channel: Multivariate polynomial evaluation

T Jung, XF Mao, XY Li, SJ Tang… - 2013 Proceedings …, 2013 - ieeexplore.ieee.org
Much research has been conducted to securely outsource multiple parties' data aggregation
to an untrusted aggregator without disclosing each individual's privately owned data, or to …

A privacy-preserving attribute-based authentication system for mobile health networks

L Guo, C Zhang, J Sun, Y Fang - IEEE Transactions on Mobile …, 2013 - ieeexplore.ieee.org
Electronic healthcare (eHealth) systems have replaced paper-based medical systems due to
the attractive features such as universal accessibility, high accuracy, and low cost. As a …

A trust-based privacy-preserving friend recommendation scheme for online social networks

L Guo, C Zhang, Y Fang - ieee transactions on dependable and …, 2014 - ieeexplore.ieee.org
Online social networks (OSNs), which attract thousands of million people to use everyday,
greatly extend OSN users' social circles by friend recommendations. OSN users' existing …

Peer-to-peer energy sharing in mobile networks: Applications, challenges, and open problems

A Dhungana, E Bulut - Ad Hoc Networks, 2020 - Elsevier
Energy is a scarce resource in mobile wireless networks that consist of devices mainly
powered by their batteries. Providing energy ubiquitously to these devices for making them …