相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。Security, Privacy and Risks Within Smart Cities: Literature Review and Development of a Smart City Interaction Framework
Elvira Ismagilova et al.
INFORMATION SYSTEMS FRONTIERS (2022)
Modeling reverse thinking for machine learning
Huihui Li et al.
SOFT COMPUTING (2020)
Acoustic-decoy: Detection of adversarial examples through audio modification on speech recognition system
Hyun Kwon et al.
NEUROCOMPUTING (2020)
Machine Learning in IoT Security: Current Solutions and Future Challenges
Fatima Hussain et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2020)
Selective Audio Adversarial Example in Evasion Attack on Speech Recognition System
Hyun Kwon et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2020)
Security Issues in Fog Environment: A Systematic Literature Review
Jasleen Kaur et al.
INTERNATIONAL JOURNAL OF WIRELESS INFORMATION NETWORKS (2020)
Machine Learning Security: Threats, Countermeasures, and Evaluations
Mingfu Xue et al.
IEEE ACCESS (2020)
Differential Privacy Techniques for Cyber Physical Systems: A Survey
Muneeb Ul Hassan et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2020)
Comprehensive Survey on Big Data Privacy Protection
Mohammed Binjubeir et al.
IEEE ACCESS (2020)
A survey of privacy enhancing technologies for smart cities
James Curzon et al.
PERVASIVE AND MOBILE COMPUTING (2019)
Cognitive security: A comprehensive study of cognitive science in cybersecurity
Roberto O. Andrade et al.
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS (2019)
Applications of Blockchains in the Internet of Things: A Comprehensive Survey
Muhammad Salek Ali et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2019)
Exploitation Techniques and Defenses for Data-Oriented Attacks
Long Cheng et al.
2019 IEEE SECURE DEVELOPMENT (SECDEV 2019) (2019)
Privacy Risks of Securing Machine Learning Models against Adversarial Examples
Liwei Song et al.
PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19) (2019)
Conceptual Description of Nature-Inspired Cognitive Cities: Properties and Challenges
Juvenal Machin et al.
FROM BIOINSPIRED SYSTEMS AND BIOMEDICAL APPLICATIONS TO MACHINE LEARNING, PT II (2019)
IoT security: Review, blockchain solutions, and open challenges
Minhaj Ahmad Khan et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)
Enabling Cognitive Smart Cities Using Big Data and Machine Learning: Approaches and Challenges
Mehdi Mohammadi et al.
IEEE COMMUNICATIONS MAGAZINE (2018)
Privacy in the Smart City-Applications, Technologies, Challenges, and Solutions
David Eckhoff et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2018)
A Survey on Security Threats and Defensive Techniques of Machine Learning: A Data Driven View
Qiang Liu et al.
IEEE ACCESS (2018)
Human aspects of ubiquitous computing: a study addressing willingness to use it and privacy issues
Gustavo Lopez et al.
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING (2017)
Security and Privacy in Smart City Applications: Challenges and Solutions
Kuan Zhang et al.
IEEE COMMUNICATIONS MAGAZINE (2017)
Future challenges for smart cities: Cyber-security and digital forensics
Zubair A. Baig et al.
DIGITAL INVESTIGATION (2017)
Understanding trust in privacy-aware video surveillance systems
Hatem A. Rashwan et al.
INTERNATIONAL JOURNAL OF INFORMATION SECURITY (2016)
Privacy concerns in smart cities
Liesbet van Zoonen
GOVERNMENT INFORMATION QUARTERLY (2016)
Technological, organizational and environmental security and privacy issues of big data: A literature review
Khairulliza Ahmad Salleh et al.
INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS/INTERNATIONAL CONFERENCE ON PROJECT MANAGEMENT/INTERNATIONAL CONFERENCE ON HEALTH AND SOCIAL CARE INFORMATION SYSTEMS AND TECHNOLOGIES, CENTERIS/PROJMAN / HCIST 2016 (2016)
A decade of security research in ubiquitous computing: results of a systematic literature review
Ema Kusen et al.
INTERNATIONAL JOURNAL OF PERVASIVE COMPUTING AND COMMUNICATIONS (2016)
INCREASING ACCOUNTABILITY THROUGH USER-INTERFACE DESIGN ARTIFACTS: A NEW APPROACH TO ADDRESSING THE PROBLEM OF ACCESS-POLICY VIOLATIONS
Anthony Vance et al.
MIS QUARTERLY (2015)
Smart Health: A Context-Aware Health Paradigm within Smart Cities
Agusti Solanas et al.
IEEE COMMUNICATIONS MAGAZINE (2014)
Understanding Employee Responses to Stressful Information Security Requirements: A Coping Perspective
John D'Arcy et al.
JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2014)
Enabling Smart Cities through a Cognitive Management Framework for the Internet of Things
Panagiotis Vlacheas et al.
IEEE COMMUNICATIONS MAGAZINE (2013)
The Pursuit of Citizens' Privacy: A Privacy-Aware Smart City Is Possible
Antoni Martinez-Balleste et al.
IEEE COMMUNICATIONS MAGAZINE (2013)
Using Accountability to Reduce Access Policy Violations in Information Systems
Anthony Vance et al.
JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2013)
IS Security Policy Violations: A Rational Choice Perspective
Anthony Vance et al.
JOURNAL OF ORGANIZATIONAL AND END USER COMPUTING (2012)
The security of machine learning
Marco Barreno et al.
MACHINE LEARNING (2010)
Preferred Reporting Items for Systematic Reviews and Meta-Analyses: The PRISMA Statement
David Moher et al.
PLOS MEDICINE (2009)
The PICO strategy for the research question construction and evidence search
Cristina Mamedio da Costa Santos et al.
REVISTA LATINO-AMERICANA DE ENFERMAGEM (2007)
Internet users' information privacy concerns (IUIPC): Tthe construct, the scale, and a causal model
NK Malhotra et al.
INFORMATION SYSTEMS RESEARCH (2004)
The vision of autonomic computing
JO Kephart et al.
COMPUTER (2003)