Related references
Note: Only part of the references are listed.From CNNs to Adaptive Filter Design for Digital Image Denoising Using Reinforcement Q-Learning
Muhammad Alolaiwy et al.
SOUTHEASTCON 2021 (2021)
A Smart Privacy-Preserving Learning Method by Fake Gradients to Protect Users Items in Recommender Systems
Guixun Luo et al.
COMPLEXITY (2020)
CPSLP: A Cloud-Based Scheme for Protecting Source Location Privacy in Wireless Sensor Networks Using Multi-Sinks
Guangjie Han et al.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2019)
Achieving Source Location Privacy Protection in Monitoring Wireless Sensor Networks through Proxy Node Routing
Lilian C. Mutalemwa et al.
SENSORS (2019)
An Enhanced Source Location Privacy based on Data Dissemination in Wireless Sensor Networks (DeLP)
Naveed Jan et al.
SENSORS (2019)
A sector-based random routing scheme for protecting the source location privacy in WSNs for the Internet of Things
Yu He et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)
A source location privacy protection scheme based on ring-loop routing for the IoT
Hao Wang et al.
COMPUTER NETWORKS (2019)
Differentially Private Location Privacy Preservation in Wireless Sensor Networks
Bodhi Chakraborty et al.
WIRELESS PERSONAL COMMUNICATIONS (2019)
Efficient Routing Protocol for Location Privacy Preserving in Internet of Things
Rajwinder Kaur et al.
INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY (2019)
Staircase based differential privacy with branching mechanism for location privacy preservation in wireless sensor networks
Bodhi Chakraborty et al.
COMPUTERS & SECURITY (2018)
A source location protection protocol based on dynamic routing in WSNs for the Social Internet of Things
Guangjie Han et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)
Trust Mechanisms to Secure Routing in Wireless Sensor Networks: Current State of the Research and Open Research Issues
Farruh Ishmanov et al.
JOURNAL OF SENSORS (2017)
An energy-efficient and sink-location privacy enhanced scheme for WSNs through ring based routing
Jun Long et al.
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING (2015)
Source Location Privacy Using Fake Source And Phantom Routing (FSAPR) Technique in Wireless Sensor Networks
Pradeep Kumar Roy et al.
3RD INTERNATIONAL CONFERENCE ON RECENT TRENDS IN COMPUTING 2015 (ICRTC-2015) (2015)
On mitigating hotspots to maximize network lifetime in multi-hop wireless sensor network with guaranteed transport delay and reliability
Anfeng Liu et al.
PEER-TO-PEER NETWORKING AND APPLICATIONS (2014)
Privacy preserving shortest path routing with an application to navigation
Yong Xi et al.
PERVASIVE AND MOBILE COMPUTING (2014)
Using data mules to preserve source location privacy in Wireless Sensor Networks
Mayank Raj et al.
PERVASIVE AND MOBILE COMPUTING (2014)
Enhancing Source Location Privacy in Energy-Constrained Wireless Sensor Networks
Guangbao Tan et al.
PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (CSAIT 2013) (2014)
An Energy-Efficient Cyclic Diversionary Routing Strategy against Global Eavesdroppers in Wireless Sensor Networks
Ju Ren et al.
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS (2013)
Protecting Location Privacy in Sensor Networks against a Global Eavesdropper
Kiran Mehta et al.
IEEE TRANSACTIONS ON MOBILE COMPUTING (2012)
Quantitative Measurement and Design of Source-Location Privacy Schemes for Wireless Sensor Networks
Yun Li et al.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2012)
An efficient anonymous communication protocol for wireless sensor networks
Juan Chen et al.
WIRELESS COMMUNICATIONS & MOBILE COMPUTING (2012)
On the Use of Fake Sources for Source Location Privacy: Trade-Offs Between Energy and Privacy
Arshad Jhumka et al.
COMPUTER JOURNAL (2011)
Privacy-aware routing in sensor networks
Haodong Wang et al.
COMPUTER NETWORKS (2009)