A systematic review of technologies and solutions to improve security and privacy protection of citizens in the smart city
MHP Rizi, SAH Seno - Internet of Things, 2022 - Elsevier
The development of smart cities through digital communications has improved citizens'
quality of life and well-being. In these cities, IoT technology generates vast amounts of data …
quality of life and well-being. In these cities, IoT technology generates vast amounts of data …
An overview of security and privacy in smart cities' IoT communications
Smart cities have brought significant improvements in quality of life and services to citizens
and urban environments. They are fully enabled to control the physical objects in real time …
and urban environments. They are fully enabled to control the physical objects in real time …
Review of smart meter data analytics: Applications, methodologies, and challenges
The widespread popularity of smart meters enables an immense amount of fine-grained
electricity consumption data to be collected. Meanwhile, the deregulation of the power …
electricity consumption data to be collected. Meanwhile, the deregulation of the power …
Security and privacy in smart cities: Challenges and opportunities
Smart cities are expected to improve the quality of daily life, promote sustainable
development, and improve the functionality of urban systems. Now that many smart systems …
development, and improve the functionality of urban systems. Now that many smart systems …
Machine learning meets computation and communication control in evolving edge and cloud: Challenges and future perspective
Mobile Edge Computing (MEC) is considered an essential future service for the
implementation of 5G networks and the Internet of Things, as it is the best method of …
implementation of 5G networks and the Internet of Things, as it is the best method of …
Location privacy protection based on differential privacy strategy for big data in industrial internet of things
C Yin, J **, R Sun, J Wang - IEEE Transactions on Industrial …, 2017 - ieeexplore.ieee.org
In the research of location privacy protection, the existing methods are mostly based on the
traditional anonymization, fuzzy and cryptography technology, and little success in the big …
traditional anonymization, fuzzy and cryptography technology, and little success in the big …
Multi-access edge computing architecture, data security and privacy: A review
Multi-Access Edge Computing (MEC) is an extension of cloud computing that aims to
provide computation, storage, and networking capabilities at the edge of the network in …
provide computation, storage, and networking capabilities at the edge of the network in …
K-means clustering and kNN classification based on negative databases
Nowadays, privacy protection has become an important issue in data mining. k-means
clustering and kNN classification are two popular data mining algorithms, which have been …
clustering and kNN classification are two popular data mining algorithms, which have been …
Generating realistic building electrical load profiles through the Generative Adversarial Network (GAN)
Building electrical load profiles can improve understanding of building energy efficiency,
demand flexibility, and building-grid interactions. Current approaches to generating load …
demand flexibility, and building-grid interactions. Current approaches to generating load …
Time-aware distributed service recommendation with privacy-preservation
As a promising way to extract insightful information from massive data, service
recommendation has gained ever-increasing attentions in both academic and industrial …
recommendation has gained ever-increasing attentions in both academic and industrial …