Computer Science ›› 2019, Vol. 46 ›› Issue (3): 202-208.doi: 10.11896/j.issn.1002-137X.2019.03.030
• Information Security • Previous Articles Next Articles
TONG Hai1,2,BAI Guang-wei1,SHEN Hang1,3
CLC Number:
[1]SWEENEY L.k-anonymity:A model for protecting privacy[J].International Journal of Uncertainty,Fuzziness and Knowledge-Based Systems,2002,10(5):557-570. [2]YANG D,XUE G,FANG X,et al.Crowdsourcing to smartphones:incentive mechanism design for mobile phone sensing[C]∥International Conference on Mobile Computing and Networking.ACM,2012:173-184. [3]YANG D,FANG X,XUE G.Truthful incentive mechanisms for k-anonymity location privacy[C]∥IEEE INFOCOM.IEEE,2013:2994-3002. [4]YUAN Z,WEI T,SHENG Z.On Designing Satisfaction-Ratio-Aware Truthful Incentive Mechanisms for k-Anonymity Location Privacy[J].IEEE Transactions on Information Forensics & Security,2016,11(11):2528-2541. [5]WU Y,PENG H,PENG H,et al.MagiCrowd:A crowd based incentive for location-aware crowd sensing[C]∥Wireless Communications and NETWORKING Conference.IEEE,2016. [6]WANG X,LIU Z,TIAN X,et al.Incentivizing Crowdsensing with Location-Privacy Preserving[J].IEEE Transactions on Wireless Communications,2017,PP(99):1. [7]SHI W S,SUN H,CAO J,et al.Edge Computing:An Emerging Computing Model for Internet of Everything Era[J].Journal of Computing Research and Development,2017,54(5):907-924.(in Chinese) 施巍松,孙辉,曹杰,等.边缘计算:万物互联时代新型计算模型[J].计算机研究与发展,2017,54(5):907-924. [8]KAWAJIRI R,SHIMOSAKA M,KASHIMA H.Steered crowd- sensing:incentive design towards quality-oriented place-centric crowdsensing[C]∥ACM International Joint Conference on Pervasive and Ubiquitous Computing.ACM,2014:691-701. [9]LI X,MIAO M,LIU H,et al.An incentive mechanism for K -anonymity in LBS privacy protection based on credit mechanism[J].Soft Computing,2017,21(14):3907-3917. [10]REDDY S,ESTRIN D,HANSEN M,et al.Examining micro-payments for participatory sensing data collections∥Proceedings of the 12th ACM International Conference on Ubiquitous Computing.ACM,2010:33-36. [11]DANEZIS G,LEWIS S,ANDERSON R.How much is location privacy worth[C]∥Proceedings of the Workshop on the Economics of Information Security Series (WEIS).ACM,2005. [12] LEE J S,HOH B.Sell your experiences:a market mechanism based incentive for participatory sensing[C]∥IEEE InternationalConference on Pervasive Computing and Communications.IEEE,2010:60-68. [13] LUO T,TAN H P,XIA L.Profit-maximizing incentive for participatory sensing[C]∥ Proceedings-IEEE INFOCOM.IEEE,2014:127-135. [14]FENG Z,ZHU Y,ZHANG Q,et al.TRAC:Truthful auction for location-aware collaborative sensing in mobile crowdsourcing[C]∥Proceedings-IEEE INFOCOM.IEEE〈2014:1231-1239. [15]ZHANG H,LIU B,SUSANTO H,et al.Incentive mechanism for proximity-based Mobile Crowd Service systems[C]∥IEEE INFOCOM 2016-IEEE International Conference on Computer Communications.IEEE,2016:1-9. [16]ZHANG X,YANG Z,ZHOU Z,et al.Free Market of Crowd- sourcing:Incentive Mechanism Design for Mobile Sensing[J].IEEE Transactions on Parallel & Distributed Systems,2014,25(12):3190-3200. [17]ZHAO D,LI X Y,MA H.Budget-Feasible Online Incentive Mechanisms for Crowdsourcing Tasks Truthfully[J].IEEE/ACM Transactions on Networking,2016,24(2):647-661. |
[1] | FU Yan-ming, ZHU Jie-fu, JIANG Kan, HUANG Bao-hua, MENG Qing-wen, ZHOU Xing. Incentive Mechanism Based on Multi-constrained Worker Selection in Mobile Crowdsourcing [J]. Computer Science, 2022, 49(9): 275-282. |
[2] | WANG Lei, LI Xiao-yu. LBS Mobile Privacy Protection Scheme Based on Random Onion Routing [J]. Computer Science, 2022, 49(9): 347-354. |
[3] | WANG Si-ming, TAN Bei-hai, YU Rong. Blockchain Sharding and Incentive Mechanism for 6G Dependable Intelligence [J]. Computer Science, 2022, 49(6): 32-38. |
[4] | DU Hui, LI Zhuo, CHEN Xin. Incentive Mechanism for Hierarchical Federated Learning Based on Online Double Auction [J]. Computer Science, 2022, 49(3): 23-30. |
[5] | WANG Xin, ZHOU Ze-bao, YU Yun, CHEN Yu-xu, REN Hao-wen, JIANG Yi-bo, SUN Ling-yun. Reliable Incentive Mechanism for Federated Learning of Electric Metering Data [J]. Computer Science, 2022, 49(3): 31-38. |
[6] | YANG Xin-yu, PENG Chang-gen, YANG Hui, DING Hong-fa. Rational PBFT Consensus Algorithm with Evolutionary Game [J]. Computer Science, 2022, 49(3): 360-370. |
[7] | ZHANG Xue-jun, YANG Hao-ying, LI Zhen, HE Fu-cun, GAI Ji-yang, BAO Jun-da. Differentially Private Location Privacy-preserving Scheme withSemantic Location [J]. Computer Science, 2021, 48(8): 300-308. |
[8] | WANG Hui, ZHU Guo-yu, SHEN Zi-hao, LIU Kun, LIU Pei-qian. Dummy Location Generation Method Based on User Preference and Location Distribution [J]. Computer Science, 2021, 48(7): 164-171. |
[9] | WANG Le-ye. Geographic Local Differential Privacy in Crowdsensing:Current States and Future Opportunities [J]. Computer Science, 2021, 48(6): 301-305. |
[10] | CHEN Meng-rong,LIN Ying,LAN Wei,SHAN Jin-zhao. Improvement of DPoS Consensus Mechanism Based on Positive Incentive [J]. Computer Science, 2020, 47(2): 269-275. |
[11] | ZHOU Yi-hua, LI Guang-hui, YANG Yu-guang, SHI Wei-min. Location Privacy Preserving Nearest Neighbor Querying Based on GeoHash [J]. Computer Science, 2019, 46(8): 212-216. |
[12] | WU Dan-dan, LYU Xin. Location Anonymous Algorithm Based on User Collaboration under Distributed Structure [J]. Computer Science, 2019, 46(4): 158-163. |
[13] | CAO Min-zi, ZHANG Lin-lin, BI Xue-hua, ZHAO Kai. Personalized (α,l)-diversity k-anonymity Model for Privacy Preservation [J]. Computer Science, 2018, 45(11): 180-186. |
[14] | XIONG Wan-zhu, LI Xiao-yu. Mobile Location Privacy Protection Based on Anonymous Routing [J]. Computer Science, 2018, 45(10): 142-149. |
[15] | DAI Jia-zhu and HUA Liang. Method of Anonymous Area Generation for Sensitive Location Protection under Road Networks [J]. Computer Science, 2016, 43(3): 137-144. |
|