Latest trends of security and privacy in recommender systems: a comprehensive review and future perspectives

Y Himeur, SS Sohail, F Bensaali, A Amira… - Computers & Security, 2022 - Elsevier
With the widespread use of Internet of things (IoT), mobile phones, connected devices and
artificial intelligence (AI), recommender systems (RSs) have become a booming technology …

Privacy-aware data fusion and prediction with spatial-temporal context for smart city industrial environment

L Qi, C Hu, X Zhang, MR Khosravi… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
As one of the cyber–physical–social systems that plays a key role in people's daily activities,
a smart city is producing a considerable amount of industrial data associated with …

A Caching-Based Dual K-Anonymous Location Privacy-Preserving Scheme for Edge Computing

S Zhang, B Hu, W Liang, KC Li… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
Location-based services have become prevalent and the risk of location privacy leakage
increases. Most existing schemes use third-party-based or third-party-free system …

Blockchain enabled trust-based location privacy protection scheme in VANET

B Luo, X Li, J Weng, J Guo, J Ma - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
While enjoying the convenience brought by Location Based Service (LBS), the location
privacy of vehicles in VANET may be disclosed. Distributed k-anonymity, as one of the most …

[HTML][HTML] Dynamic defenses in cyber security: Techniques, methods and challenges

Y Zheng, Z Li, X Xu, Q Zhao - Digital Communications and Networks, 2022 - Elsevier
Driven by the rapid development of the Internet of Things, cloud computing and other
emerging technologies, the connotation of cyberspace is constantly expanding and …

A survey of dummy-based location privacy protection techniques for location-based services

S Zhang, M Li, W Liang, VKA Sandor, X Li - Sensors, 2022 - mdpi.com
As smart devices and mobile positioning technologies improve, location-based services
(LBS) have grown in popularity. The LBS environment provides considerable convenience …

Link prediction in paper citation network to construct paper correlation graph

H Liu, H Kou, C Yan, L Qi - EURASIP Journal on Wireless …, 2019 - Springer
Nowadays, recommender system has become one of the main tools to search for users'
interested papers. Since one paper often contains only a part of keywords that a user is …

A location-based privacy-preserving oblivious sharing scheme for indoor navigation

H Yang, P Vijayakumar, J Shen, BB Gupta - Future Generation Computer …, 2022 - Elsevier
In recent years, with the rapid development of wireless communication technology and
mobile devices, etc., indoor localization and navigation using WiFi sensing are increasingly …

An improved authentication scheme for internet of vehicles based on blockchain technology

X Wang, P Zeng, N Patterson, F Jiang, R Doss - IEEE access, 2019 - ieeexplore.ieee.org
Thanks to the rapid development in mobile vehicles and wireless technologies, the Internet
of Vehicles (IoV) has become an attractive application that can provide a large number of …

A secure and fast image encryption scheme based on double chaotic S-boxes

S Zhu, G Wang, C Zhu - Entropy, 2019 - mdpi.com
In order to improve the security and efficiency of image encryption systems
comprehensively, a novel chaotic S-box based image encryption scheme is proposed …