Security and privacy challenges in mobile cloud computing: Survey and way ahead

MB Mollah, MAK Azad, A Vasilakos - Journal of Network and Computer …, 2017 - Elsevier
The rapid growth of mobile computing is seriously challenged by the resource constrained
mobile devices. However, the growth of mobile computing can be enhanced by integrating …

A survey of differential privacy-based techniques and their applicability to location-based services

JW Kim, K Edemacu, JS Kim, YD Chung, B Jang - Computers & Security, 2021 - Elsevier
The widespread use of mobile devices such as smartphones, tablets, and smartwatches has
led users to constantly generate various location data during their daily activities …

A private and efficient mechanism for data uploading in smart cyber-physical systems

Z Cai, X Zheng - IEEE Transactions on Network Science and …, 2018 - ieeexplore.ieee.org
To provide fine-grained access to different dimensions of the physical world, the data
uploading in smart cyber-physical systems suffers novel challenges on both energy …

Data security and privacy-preserving in edge computing paradigm: Survey and open issues

J Zhang, B Chen, Y Zhao, X Cheng, F Hu - IEEE access, 2018 - ieeexplore.ieee.org
With the explosive growth of Internet of Things devices and massive data produced at the
edge of the network, the traditional centralized cloud computing model has come to a …

How well do my results generalize? comparing security and privacy survey results from mturk, web, and telephone samples

EM Redmiles, S Kross… - 2019 IEEE symposium on …, 2019 - ieeexplore.ieee.org
Security and privacy researchers often rely on data collected from Amazon Mechanical Turk
(MTurk) to evaluate security tools, to understand users' privacy preferences and to measure …

Follow but no track: Privacy preserved profile publishing in cyber-physical social systems

X Zheng, Z Cai, J Yu, C Wang… - IEEE Internet of Things …, 2017 - ieeexplore.ieee.org
Due to the close correlation with individual's physical features and status, the adoption of
cyber-physical social systems (CPSSs) has been inevitably hindered by users' privacy …

Location-privacy-aware review publication mechanism for local business service systems

X Zheng, Z Cai, J Li, H Gao - IEEE INFOCOM 2017-IEEE …, 2017 - ieeexplore.ieee.org
Local business service systems (LBSS), such as Yelp and Dian**, play an essential role
in making decisions like choosing a restaurant for our daily life. These systems heavily rely …

ILLIA: Enabling -Anonymity-Based Privacy Preserving Against Location Injection Attacks in Continuous LBS Queries

P Zhao, J Li, F Zeng, F **ao, C Wang… - IEEE Internet of Things …, 2018 - ieeexplore.ieee.org
With the increasing popularity of location-based services (LBSs), it is of paramount
importance to preserve one's location privacy. The commonly used location privacy …

Eclipse: Preserving differential location privacy against long-term observation attacks

B Niu, Y Chen, Z Wang, F Li, B Wang… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Mechanisms built upon geo-indistinguishability render location privacy, where a user can
submit obfuscated locations to Location-Based Service providers but still be able to correctly …

Osprey: Recovery of variable and data structure via probabilistic analysis for stripped binary

Z Zhang, Y Ye, W You, G Tao, W Lee… - … IEEE Symposium on …, 2021 - ieeexplore.ieee.org
Recovering variables and data structure information from stripped binary is a prominent
challenge in binary program analysis. While various state-of-the-art techniques are effective …