相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。Security and Privacy in IoT Using Machine Learning and Blockchain: Threats and Countermeasures
Nazar Waheed et al.
ACM COMPUTING SURVEYS (2021)
Addressing Security and Privacy Issues of IoT Using Blockchain Technology
Bhabendu Kumar Mohanta et al.
IEEE INTERNET OF THINGS JOURNAL (2021)
An AI-Enabled Three-Party Game Framework for Guaranteed Data Privacy in Mobile Edge Crowdsensing of IoT
Jinbo Xiong et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2021)
Trust-Based Cloud Machine Learning Model Selection for Industrial IoT and Smart City Services
Basheer Qolomany et al.
IEEE INTERNET OF THINGS JOURNAL (2021)
Multi-Domain Networks Association for Biological Data Using Block Signed Graph Clustering
Ye Liu et al.
IEEE-ACM TRANSACTIONS ON COMPUTATIONAL BIOLOGY AND BIOINFORMATICS (2020)
Efficient privacy preservation of big data for accurate data mining
M. A. P. Chamikara et al.
INFORMATION SCIENCES (2020)
A secure data deletion scheme for IoT devices through key derivation encryption and data analysis
Jinbo Xiong et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2020)
DAG: A General Model for Privacy-Preserving Data Mining
Sin G. Teo et al.
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2020)
An efficient K-means clustering algorithm for tall data
Marco Capo et al.
DATA MINING AND KNOWLEDGE DISCOVERY (2020)
Data mining and application of social e-commerce users based on big data of internet of things
Chao Xie et al.
JOURNAL OF INTELLIGENT & FUZZY SYSTEMS (2020)
A Blockchain-Based Secure Key Management Scheme With Trustworthiness in DWSNs
Youliang Tian et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)
A Privacy-Preserving Personalized Service Framework through Bayesian Game in Social IoT
Renwan Bi et al.
WIRELESS COMMUNICATIONS & MOBILE COMPUTING (2020)
Social Network Analysis and Mining: Privacy and Security on Twitter
Mansour Alshaikh et al.
2020 10TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC) (2020)
An Improved DBSCAN Algorithm Based on the Neighbor Similarity and Fast Nearest Neighbor Query
Shan-Shan Li
IEEE ACCESS (2020)
In-band full duplex wireless communications and networking for IoT devices: Progress, challenges and opportunities
Shaoen Wu et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)
Cooperative trust relaying and privacy preservation via edge-crowdsourcing in social Internet of Things
Vishal Sharma et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)
Enhancing Privacy and Availability for Data Clustering in Intelligent Electrical Service of IoT
Jinbo Xiong et al.
IEEE INTERNET OF THINGS JOURNAL (2019)
DISTRIBUTED SECURITY ARCHITECTURE BASED ON BLOCKCHAIN FOR CONNECTED HEALTH: ARCHITECTURE, CHALLENGES, AND APPROACHES
Ruyan Wang et al.
IEEE WIRELESS COMMUNICATIONS (2019)
Biologically Inspired Resource Allocation for Network Slices in 5G-Enabled Internet of Things
Dapeng Wu et al.
IEEE INTERNET OF THINGS JOURNAL (2019)
Privacy Preservation of Social Network Users Against Attribute Inference Attacks via Malicious Data Mining
Khondker Jahid Reza et al.
PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP) (2019)
A Differential Privacy-based Protecting Data Preprocessing Method for Big Data Mining
Ran Mo et al.
2019 18TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS/13TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (TRUSTCOM/BIGDATASE 2019) (2019)
Dynamic Authentication Protocol Using Self-Powered Timers for Passive Internet of Things
M. H. Afifi et al.
IEEE INTERNET OF THINGS JOURNAL (2018)
An Authentication Method Based on the Turtle Shell Algorithm for Privacy-Preserving Data Mining
Rong Wang et al.
COMPUTER JOURNAL (2018)
A New Privacy-Preserving Data Mining Method Using Non-negative Matrix Factorization and Singular Value Decomposition
Guang Li et al.
WIRELESS PERSONAL COMMUNICATIONS (2018)
Achieving Incentive, Security, and Scalable Privacy Protection in Mobile Crowdsensing Services
Jinbo Xiong et al.
WIRELESS COMMUNICATIONS & MOBILE COMPUTING (2018)
Decoding topologically associating domains with ultra-low resolution Hi-C data by graph structural entropy
Angsheng Li et al.
NATURE COMMUNICATIONS (2018)
Citation-based clustering of publications using CitNetExplorer and VOSviewer
Nees Jan van Eck et al.
SCIENTOMETRICS (2017)
Structural Information and Dynamical Complexity of Networks
Angsheng Li et al.
IEEE TRANSACTIONS ON INFORMATION THEORY (2016)
Graph entropy-based clustering algorithm in medical brain image database
Yu Zhan et al.
JOURNAL OF INTELLIGENT & FUZZY SYSTEMS (2016)
Security, privacy and trust in Internet of Things: The road ahead
S. Sicari et al.
COMPUTER NETWORKS (2015)
GPUSCAN: GPU-Based Parallel Structural Clustering Algorithm for Networks
Thomas Ryan Stovall et al.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2015)
Discovering natural communities in networks
Angsheng Li et al.
PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS (2015)
A novel privacy-preserving scheme for collaborative frequent itemset mining across vertically partitioned data
Nirali R. Nanavati et al.
SECURITY AND COMMUNICATION NETWORKS (2015)
Data Mining and Privacy of Social Network Sites' Users: Implications of the Data Mining Problem
Yeslam Al-Saggaf et al.
SCIENCE AND ENGINEERING ETHICS (2015)
Privacy-preserving mining of frequent routes in cellular network data
Olof Gornerup et al.
2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1 (2015)
A Perturbation Method Based on Singular Value Decomposition and Feature Selection for Privacy Preserving Data Mining
Mohammad Reza Keyvanpour et al.
INTERNATIONAL JOURNAL OF DATA WAREHOUSING AND MINING (2014)