4.8 Article

Achieving Graph Clustering Privacy Preservation Based on Structure Entropy in Social IoT

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Theory & Methods

Security and Privacy in IoT Using Machine Learning and Blockchain: Threats and Countermeasures

Nazar Waheed et al.

Summary: The security and privacy concerns of users have become significant as IoT devices become more involved in various applications. Machine Learning algorithms and Blockchain techniques are being used to address these issues effectively in recent years.

ACM COMPUTING SURVEYS (2021)

Article Computer Science, Information Systems

Addressing Security and Privacy Issues of IoT Using Blockchain Technology

Bhabendu Kumar Mohanta et al.

Summary: The rapid growth of IoT technology presents security and privacy challenges, but blockchain technology offers some solutions. By integrating IoT and blockchain technologies, a more secure smart IoT system can be achieved.

IEEE INTERNET OF THINGS JOURNAL (2021)

Article Automation & Control Systems

An AI-Enabled Three-Party Game Framework for Guaranteed Data Privacy in Mobile Edge Crowdsensing of IoT

Jinbo Xiong et al.

Summary: The article proposes an artificial intelligence three-party game framework to ensure data privacy in mobile edge crowdsensing of IoT, addressing the issue of sensitive data privacy leakage through a combination of machine learning and game theory.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2021)

Article Computer Science, Information Systems

Trust-Based Cloud Machine Learning Model Selection for Industrial IoT and Smart City Services

Basheer Qolomany et al.

Summary: In this study, a solution is proposed to maximize the trustworthiness of ML models while reducing cloud communication overhead by selecting and switching between a subset of models from a superset. Case studies in Industrial IoT and smart cities services showed a slight decrease in trust level compared to results obtained using integer linear programming, with the proposed heuristic achieving an optimal competitive ratio in a polynomial-time approximation scheme.

IEEE INTERNET OF THINGS JOURNAL (2021)

Article Biochemical Research Methods

Multi-Domain Networks Association for Biological Data Using Block Signed Graph Clustering

Ye Liu et al.

IEEE-ACM TRANSACTIONS ON COMPUTATIONAL BIOLOGY AND BIOINFORMATICS (2020)

Article Computer Science, Information Systems

Efficient privacy preservation of big data for accurate data mining

M. A. P. Chamikara et al.

INFORMATION SCIENCES (2020)

Article Computer Science, Theory & Methods

A secure data deletion scheme for IoT devices through key derivation encryption and data analysis

Jinbo Xiong et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2020)

Article Computer Science, Artificial Intelligence

DAG: A General Model for Privacy-Preserving Data Mining

Sin G. Teo et al.

IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2020)

Article Computer Science, Artificial Intelligence

An efficient K-means clustering algorithm for tall data

Marco Capo et al.

DATA MINING AND KNOWLEDGE DISCOVERY (2020)

Article Computer Science, Artificial Intelligence

Data mining and application of social e-commerce users based on big data of internet of things

Chao Xie et al.

JOURNAL OF INTELLIGENT & FUZZY SYSTEMS (2020)

Article Automation & Control Systems

A Blockchain-Based Secure Key Management Scheme With Trustworthiness in DWSNs

Youliang Tian et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)

Article Computer Science, Information Systems

A Privacy-Preserving Personalized Service Framework through Bayesian Game in Social IoT

Renwan Bi et al.

WIRELESS COMMUNICATIONS & MOBILE COMPUTING (2020)

Proceedings Paper Computer Science, Theory & Methods

Social Network Analysis and Mining: Privacy and Security on Twitter

Mansour Alshaikh et al.

2020 10TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC) (2020)

Article Computer Science, Information Systems

An Improved DBSCAN Algorithm Based on the Neighbor Similarity and Fast Nearest Neighbor Query

Shan-Shan Li

IEEE ACCESS (2020)

Article Computer Science, Theory & Methods

In-band full duplex wireless communications and networking for IoT devices: Progress, challenges and opportunities

Shaoen Wu et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)

Article Computer Science, Theory & Methods

Cooperative trust relaying and privacy preservation via edge-crowdsourcing in social Internet of Things

Vishal Sharma et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)

Article Computer Science, Information Systems

Enhancing Privacy and Availability for Data Clustering in Intelligent Electrical Service of IoT

Jinbo Xiong et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Computer Science, Hardware & Architecture

DISTRIBUTED SECURITY ARCHITECTURE BASED ON BLOCKCHAIN FOR CONNECTED HEALTH: ARCHITECTURE, CHALLENGES, AND APPROACHES

Ruyan Wang et al.

IEEE WIRELESS COMMUNICATIONS (2019)

Article Computer Science, Information Systems

Biologically Inspired Resource Allocation for Network Slices in 5G-Enabled Internet of Things

Dapeng Wu et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Proceedings Paper Computer Science, Information Systems

Privacy Preservation of Social Network Users Against Attribute Inference Attacks via Malicious Data Mining

Khondker Jahid Reza et al.

PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP) (2019)

Proceedings Paper Computer Science, Information Systems

A Differential Privacy-based Protecting Data Preprocessing Method for Big Data Mining

Ran Mo et al.

2019 18TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS/13TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (TRUSTCOM/BIGDATASE 2019) (2019)

Article Computer Science, Information Systems

Dynamic Authentication Protocol Using Self-Powered Timers for Passive Internet of Things

M. H. Afifi et al.

IEEE INTERNET OF THINGS JOURNAL (2018)

Article Computer Science, Hardware & Architecture

An Authentication Method Based on the Turtle Shell Algorithm for Privacy-Preserving Data Mining

Rong Wang et al.

COMPUTER JOURNAL (2018)

Article Computer Science, Information Systems

Achieving Incentive, Security, and Scalable Privacy Protection in Mobile Crowdsensing Services

Jinbo Xiong et al.

WIRELESS COMMUNICATIONS & MOBILE COMPUTING (2018)

Article Multidisciplinary Sciences

Decoding topologically associating domains with ultra-low resolution Hi-C data by graph structural entropy

Angsheng Li et al.

NATURE COMMUNICATIONS (2018)

Article Computer Science, Interdisciplinary Applications

Citation-based clustering of publications using CitNetExplorer and VOSviewer

Nees Jan van Eck et al.

SCIENTOMETRICS (2017)

Article Computer Science, Information Systems

Structural Information and Dynamical Complexity of Networks

Angsheng Li et al.

IEEE TRANSACTIONS ON INFORMATION THEORY (2016)

Article Computer Science, Artificial Intelligence

Graph entropy-based clustering algorithm in medical brain image database

Yu Zhan et al.

JOURNAL OF INTELLIGENT & FUZZY SYSTEMS (2016)

Article Computer Science, Hardware & Architecture

Security, privacy and trust in Internet of Things: The road ahead

S. Sicari et al.

COMPUTER NETWORKS (2015)

Article Computer Science, Theory & Methods

GPUSCAN: GPU-Based Parallel Structural Clustering Algorithm for Networks

Thomas Ryan Stovall et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2015)

Article Physics, Multidisciplinary

Discovering natural communities in networks

Angsheng Li et al.

PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS (2015)

Article Computer Science, Information Systems

A novel privacy-preserving scheme for collaborative frequent itemset mining across vertically partitioned data

Nirali R. Nanavati et al.

SECURITY AND COMMUNICATION NETWORKS (2015)

Article Ethics

Data Mining and Privacy of Social Network Sites' Users: Implications of the Data Mining Problem

Yeslam Al-Saggaf et al.

SCIENCE AND ENGINEERING ETHICS (2015)

Proceedings Paper Computer Science, Theory & Methods

Privacy-preserving mining of frequent routes in cellular network data

Olof Gornerup et al.

2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1 (2015)

Article Computer Science, Software Engineering

A Perturbation Method Based on Singular Value Decomposition and Feature Selection for Privacy Preserving Data Mining

Mohammad Reza Keyvanpour et al.

INTERNATIONAL JOURNAL OF DATA WAREHOUSING AND MINING (2014)