-
1
-
2
Privacy preserving average consensus
Published 2017Subjects: Get full text
Get full text
Conference Paper -
3
Decentralized detection with robust information privacy protection
Published 2021Subjects: Get full text
Journal Article -
4
Compressive privacy for a linear dynamical system
Published 2021Subjects: Get full text
Journal Article -
5
Preserving trajectory privacy in driving data release
Published 2023Subjects: Get full text
Conference Paper -
6
Privacy and security issues in deep learning : a survey
Published 2021Subjects: Get full text
Journal Article -
7
On the relationship between inference and data privacy in decentralized IoT networks
Published 2021Subjects: Get full text
Journal Article -
8
Privacy-preserving distributed projection LMS for linear multitask networks
Published 2022Subjects: Get full text
Journal Article -
9
How much noise suffices for privacy of multi-agent systems?
Published 2023“…As multi-agent systems always involve a large number of nodes and connections, it is crucial to study the privacy preserving problem with minimal “corrupted” noise in the framework of differential privacy or noise-perturbation schemes. …”
Get full text
Journal Article -
10
Data privacy protection domain adaptation by roughing and finishing stage
Published 2023“…However, in medical imaging, source domain data from a hospital is usually restricted due to patient data privacy regulations. Therefore, it is crucial to perform privacy-preserving domain adaptation, which simultaneously improves the model’s performance on target domain data and preserves the privacy of source domain data. …”
Get full text
Journal Article -
11
Achieve Location Privacy-Preserving Range Query in Vehicular Sensing
Published 2018Subjects: Get full text
Get full text
Journal Article -
12
Enabling efficient and privacy-preserving health query over outsourced cloud
Published 2019“…In this paper, we propose an efficient and privacy-preserving health query scheme over outsourced cloud named HeOC. …”
Get full text
Get full text
Journal Article -
13
Toward information privacy for the internet of things : a nonparametric learning approach
Published 2019Subjects: “…Information Privacy…”
Get full text
Get full text
Get full text
Journal Article -
14
A privacy-preserving sensory data sharing scheme in Internet of Vehicles
Published 2020Subjects: Get full text
Journal Article -
15
Achieving privacy-preserving and verifiable data sharing in vehicular fog with blockchain
Published 2022“…Security analysis demonstrates the security properties of the proposed scheme, in terms of location privacy preservation, verifiability and immutability. …”
Get full text
Journal Article -
16
Privacy-preserving co-synthesis against sensor–actuator eavesdropping intruder
Published 2023“…In this work, we investigate the problem of privacy-preserving supervisory control against an external passive intruder via co-synthesis of a dynamic mask, an edit function, and a supervisor. …”
Get full text
Journal Article -
17
Security and privacy in vehicular ad hoc network and vehicle cloud computing : a survey
Published 2021“…In sum, this survey comprehensively covers the location privacy and trust management models of the VANETs and discusses the security and privacy issues in the VCC, which fills the gap of existing surveys. …”
Get full text
Journal Article -
18
Tripsense : a trust-based vehicular platoon crowdsensing scheme with privacy preservation in VANETs
Published 2018Subjects: Get full text
Get full text
Journal Article -
19
Achieve privacy-preserving priority classification on patient health data in remote eHealthcare system
Published 2019“…For this reason, many privacy-preserving schemes have been proposed in recent years. …”
Get full text
Get full text
Get full text
Journal Article -
20
Security and privacy for reconfigurable intelligent surface in 6G: a review of prospective applications and challenges
Published 2023“…To this end, we review the attributes of RISs that distinguish them from other relevant technologies, such as multiple-input-multiple-output (MIMO), conventional relaying, backscatter communication (BackCom), as well as outline security and privacy attacks in RIS-assisted 6G applications. Our specific focus is on security and privacy threats associated with the use of RISs with different vital 6G technologies, including millimeter wave (mmWave), terahertz (THz), device-to-device communication, IoT networks, multiaccess edge computing, integrated sensing and communication (ISAC), simultaneous wireless information and power transfer (SWIPT), and non-terrestrial network. …”
Get full text
Journal Article