Adversarial attacks and defenses in machine learning-empowered communication systems and networks: A contemporary survey

Y Wang, T Sun, S Li, X Yuan, W Ni… - … Surveys & Tutorials, 2023‏ - ieeexplore.ieee.org
Adversarial attacks and defenses in machine learning and deep neural network (DNN) have
been gaining significant attention due to the rapidly growing applications of deep learning in …

Location privacy threats and protections in future vehicular networks: A comprehensive review

B Ma, X Wang, X Lin, Y Jiang, C Sun, Z Wang… - arxiv preprint arxiv …, 2023‏ - arxiv.org
Location privacy is critical in vehicular networks, where drivers' trajectories and personal
information can be exposed, allowing adversaries to launch data and physical attacks that …

Efficient and privacy-preserving arbitrary polygon range query scheme over dynamic and time-series location data

F Wang, H Zhu, G He, R Lu, Y Zheng… - IEEE Transactions on …, 2023‏ - ieeexplore.ieee.org
Location-based services (LBSs) provide enhanced functionality of mobile applications and
convenience for mobile users, which plays a more and more remarkable role in people's …

[HTML][HTML] A hierarchical distributed trusted location service achieving location k-anonymity against the global observer

F Buccafurri, V De Angelis, MF Idone, C Labrini - Computer Networks, 2024‏ - Elsevier
As widely known in the literature, location-based services can seriously threaten users'
privacy. Privacy-aware location-based services can be obtained by protecting the user's …

Location-privacy-aware service migration against inference attacks in multiuser MEC systems

W Wang, X Zhou, T Qiu, X He… - IEEE Internet of Things …, 2023‏ - ieeexplore.ieee.org
In multiaccess edge computing (MEC) systems, service migration has been extensively
applied to ensure service quality by migrating services to follow mobile users. The existing …

ByCAN: Reverse Engineering Controller Area Network (CAN) Messages from Bit to Byte Level

X Lin, B Ma, X Wang, G Yu, Y He… - IEEE Internet of Things …, 2024‏ - ieeexplore.ieee.org
As the primary standard protocol for modern cars, the controller area network (CAN) is a
critical research target for automotive cybersecurity threats and autonomous applications. As …

Preserving location‐query privacy in location‐based services: A review

H Rasheed, R Md Noor, N Abdul Ghani… - Security and …, 2024‏ - Wiley Online Library
Location‐based services (LBS) leverage the geographical information of a device to deliver
information, entertainment, and other services tailored to the user's present location. LBS not …

Sgo: Semantic group obfuscation for location-based services in vanets

I Ullah, MA Shah - Sensors, 2024‏ - mdpi.com
Location privacy is an important parameter to be addressed in the case of vehicular ad hoc
networks. Each vehicle frequently communicates with location-based services to find the …

Privacy-Preserving Tools and Technologies: Government Adoption and Challenges

S Prabowo, AG Putrada, ID Oktaviani… - IEEE …, 2025‏ - ieeexplore.ieee.org
Understanding the landscape of privacy protection in governmental systems is crucial for
ensuring the trustworthiness of public services and safeguarding citizens' sensitive data from …

Smart Contract Vulnerability Detection Based on Generative Adversarial Networks and Graph Matching Networks

H Li, X Wang, G Yu, W Ni, RP Liu, N Georgalas… - … Conference on Network …, 2023‏ - Springer
With Blockchain technology's tamper-proof and decentralized characteristics, smart
contracts have been developed rapidly for wide application in critical areas, eg, the Internet …