A survey on differential privacy for unstructured data content

Y Zhao, J Chen - ACM Computing Surveys (CSUR), 2022‏ - dl.acm.org
Huge amounts of unstructured data including image, video, audio, and text are ubiquitously
generated and shared, and it is a challenge to protect sensitive personal information in …

New method of vehicle cooperative communication based on fuzzy logic and signaling game strategy

DG Zhang, CH Ni, J Zhang, T Zhang… - Future Generation …, 2023‏ - Elsevier
With the rapid development of the Internet of Vehicles, at the same time, due to the limited
storage space of vehicles and more and more data requirements, vehicles need more and …

Blockchain-based decentralized reputation system in E-commerce environment

Z Zhou, M Wang, CN Yang, Z Fu, X Sun… - Future Generation …, 2021‏ - Elsevier
With the rapid development of E-commerce, more and more people are used to shop**
online, in which the reputation scores of sellers play an important role in hel** consumers …

A caching and spatial K-anonymity driven privacy enhancement scheme in continuous location-based services

S Zhang, X Li, Z Tan, T Peng, G Wang - Future Generation Computer …, 2019‏ - Elsevier
With the rapid pervasion of location-based services (LBSs), protection of location privacy
has become a significant concern. In most continuous LBSs' privacy-preserving solutions …

[HTML][HTML] Dynamic defenses in cyber security: Techniques, methods and challenges

Y Zheng, Z Li, X Xu, Q Zhao - Digital Communications and Networks, 2022‏ - Elsevier
Driven by the rapid development of the Internet of Things, cloud computing and other
emerging technologies, the connotation of cyberspace is constantly expanding and …

A triple real-time trajectory privacy protection mechanism based on edge computing and blockchain in mobile crowdsourcing

W Wang, Y Wang, P Duan, T Liu… - IEEE Transactions on …, 2022‏ - ieeexplore.ieee.org
With the rapid development of the Internet of Things (IoT) and the rapid popularization of 5 G
networks, the data that needs to be processed in Mobile Crowdsourcing (MCS) system is …

ADTT: A highly efficient distributed tensor-train decomposition method for IIoT big data

X Wang, LT Yang, Y Wang, L Ren… - IEEE Transactions on …, 2020‏ - ieeexplore.ieee.org
The industrial Internet of Things (IIoT) is growing quickly due to increasing deployment and
integration of smart sensors, instruments, and devices, and software using wired or wireless …

An energy-aware computation offloading method for smart edge computing in wireless metropolitan area networks

X Xu, Y Li, T Huang, Y Xue, K Peng, L Qi… - Journal of Network and …, 2019‏ - Elsevier
Currently, the booming popularity and growth of mobile devices in urban cities leads to the
surge of various computation-intensive mobile applications, such as virtual reality and online …

Link prediction in paper citation network to construct paper correlation graph

H Liu, H Kou, C Yan, L Qi - EURASIP Journal on Wireless …, 2019‏ - Springer
Nowadays, recommender system has become one of the main tools to search for users'
interested papers. Since one paper often contains only a part of keywords that a user is …

A many-objective optimization recommendation algorithm based on knowledge mining

X Cai, Z Hu, J Chen - Information Sciences, 2020‏ - Elsevier
Recommendation system (RS) is a technology that provides accurate recommendation for
users. In order to make the recommendation results more accurate and diverse, we …