Computer Science ›› 2023, Vol. 50 ›› Issue (1): 294-301.doi: 10.11896/jsjkx.220400101
• Computer Network • Previous Articles Next Articles
XU Miaomiao, CHEN Zhenping
CLC Number:
[1]CAO L,CAI Y,YUE Y G.Swarm Intelligence-Based Perfor-mance Optimization for Mobile Wireless Sensor Networks:Survey,Challenges,and Future Directions [J].IEEE Access,2019,7:161524-161553. [2]ZHOU Y K,RAO B,WANG W.UAV Swarm Intelligence:Recent Advances and Future Trends [J].IEEE Access,2020,8:183856-183878. [3]ZHANG Y H,DENG R H,ZHENG D,et al.Efficient and Robust Certificateless Signature for Data Crowdsensing in Cloud-Assisted Industrial IoT [J].IEEE Transactions on Industrial Informatics,2019,15(9):5099-5108. [4]HUANG H Y,CHEN D,LI Y T.IM-LDP:Incentive Mecha-nism for Mobile Crowd-Sensing Based on Local Differential Privacy[J].IEEE Communications Letters,2021,25(3):960-964. [5]ZHAO B W,TANG S H,LIU X M,et al.PACE:Privacy-Preserving and Quality-Aware Incentive Mechanism for Mobile Crowdsensing [J].IEEE Transactions on Mobile Computing,2021,20(5):1924-1939. [6]ZHAO C,YANG S S,MCCANN J A.On the Data Quality inPrivacy-Preserving Mobile Crowdsensing Systems with Untruthful Reporting [J].IEEE Transactions on Mobile Computing,2021,20(2):647-661. [7]ZHANG Y F,ZHANG X L.Price Learning-based IncentiveMechanism for Mobile Crowd Sensing[J].ACM Transactions on Sensor Networks,2021,17(2):1-24. [8]DAN P,FAN W,CHEN G H.Data Quality Guided IncentiveMechanism Design for Crowdsensing [J].IEEE Transactions on Mobile Computing,2018,17(2):307-319. [9]LIU Y X,TANG S H,WU H T,et al.RTPT:A Framework for Real-Time Privacy-Preserving Truth Discovery on Crowd Sensed Data Streams[J].Computer Networks,2019,148(15):349-360. [10]HE D J,CHAN S,GUIZANI M.User Privacy and Data Trustworthiness in Mobile Crowd Sensing [J].IEEE Wireless Communications,2015,22(1):28-34. [11]ZHAO B W,LIU X M,CHEN W N,et al.PRICE:Privacy and Reliability-Aware Real-Time Incentive System for Crowdsensing [J].IEEE Internet of Things Journal,2021,8(24):17584- 17595. [12]XUE K P,ZHU B,YANG Q Y,et al.InPPTD:A Lightweight Incentive-Based Privacy-Preserving Truth Discovery for Crowd-sensing Systems [J].IEEE Internet of Things Journal,2021,8(6):4305-4316. [13]SHI F,WU D,ARKHIPOV D I,et al.ParkCrowd:ReliableCrowdsensing for Aggregation and Dissemination of Parking Space Information [J].IEEE Transactions on Intelligent Transportation Systems,2019,20(11):4032-4044. [14]XU C,WANG J C,ZHU L H,et al.PPMR:A Privacy-Preserving Online Medical Service Recommendation Scheme in eHealthcare System [J].IEEE Internet of Things Journal,2019,6(3):5665-5673. [15]CAPPONI A,FIANDRINO C,KANTARCI B,et al.A Survey on Mobile Crowdsensing Systems:Challenges,Solutions,and Opportunities [J].IEEE Communications Surveys & Tutorials,2019,21(3):2419-2465. [16]CHEN X,TANG C,LI Z,et al.A Pricing Approach Toward Incentive Mechanisms for Participant Mobile Crowdsensing in Edge Computing [J].Mobile Networks and Applications,2020,25(3):1220-1232. [17]WANG J Z,LI M R,HE Y H,et al.A Blockchain Based Privacy-Preserving Incentive Mechanism in Crowdsensing Applications [J].IEEE Access,2018,6:17545-17556. [18]WANG D,REN J,WANG Z,et al.Privacy-preserving Streaming Truth Discovery in Crowdsourcing with Differential Privacy[J].IEEE Transactions on Mobile Computing,2022,21(10):3757-3772. [19]LI Q H,CAO G H,PORTA T F L.Efficient and Privacy-Aware Data Aggregation in Mobile Sensing[J].IEEE Transactions on Dependable and Secure Computing,2014,11(2):115-129. [20]LI Q,LI Y,GAO J,et al.Resolving conflicts in heterogeneous data by truth discovery and source reliability estimation[C]//Proceedings of ACM International Conference on Management of Data.2014:1187-1198. [21]TANG J,FU S,XU M,et al.Achieve Privacy Preserving Truth Discovery in Crowdsensing Systems[C]//Proceedings of ACM International Conference on Information and Knowledge Mana-gement.2019:1301-1310. |
[1] | LU Chen-yang, DENG Su, MA Wu-bin, WU Ya-hui, ZHOU Hao-hao. Federated Learning Based on Stratified Sampling Optimization for Heterogeneous Clients [J]. Computer Science, 2022, 49(9): 183-193. |
[2] | WANG Mei-shan, YAO Lan, GAO Fu-xiang, XU Jun-can. Study on Differential Privacy Protection for Medical Set-Valued Data [J]. Computer Science, 2022, 49(4): 362-368. |
[3] | GUO Yan-qing, LI Yu-hang, WANG Wan-wan, FU Hai-yan, WU Ming-kan, LI Yi. FL-GRM:Gamma Regression Algorithm Based on Federated Learning [J]. Computer Science, 2022, 49(12): 66-73. |
[4] | ZHOU Qian, DAI Hua, SHENG Wen-jie, HU Zheng, YANG Geng. Research on Verifiable Keyword Search over Encrypted Cloud Data:A Survey [J]. Computer Science, 2022, 49(10): 272-278. |
[5] | LI Yi-cong, ZHOU Kuan-jiu, WANG Zi-zhong, XU Lin. ZKFERP:Universal and Efficient Range Proof Scheme with Constant Computational Cost [J]. Computer Science, 2022, 49(10): 335-343. |
[6] | JIN Hua, ZHU Jing-yu, WANG Chang-da. Review on Video Privacy Protection [J]. Computer Science, 2022, 49(1): 306-313. |
[7] | LEI Yu-xiao , DUAN Yu-cong. AI Governance Oriented Legal to Technology Bridging Framework for Cross-modal Privacy Protection [J]. Computer Science, 2021, 48(9): 9-20. |
[8] | GUO Rui, LU Tian-liang, DU Yan-hui. Source-location Privacy Protection Scheme Based on Target Decision in WSN [J]. Computer Science, 2021, 48(5): 334-340. |
[9] | ZHENG Jia-tong, WU Wen-yuan. Practical Bi-deniable Encryption Scheme Based on MLWE [J]. Computer Science, 2021, 48(3): 307-312. |
[10] | WANG Rui-jin, TANG Yu-cheng, PEI Xi-kai, GUO Shang-tong, ZHANG Feng-li. Block-chain Privacy Protection Scheme Based on Lightweight Homomorphic Encryption and Zero-knowledge Proof [J]. Computer Science, 2021, 48(11A): 547-551. |
[11] | LENG Feng, ZHANG Ming-kai, YAN Zhi-wei, ZHANG Cui-ling, ZENG Yu. Application of Chinese Cryptographic Algorithm in RPKI [J]. Computer Science, 2021, 48(11A): 678-681. |
[12] | LI Yu, DUAN Hong-yue, YIN Yu-yu, GAO Hong-hao. Survey of Crowdsourcing Applications in Blockchain Systems [J]. Computer Science, 2021, 48(11): 12-27. |
[13] | YU Qi-long, LU Ning, SHI Wen-bo. Traceable Mixing Scheme for Bitcoin [J]. Computer Science, 2021, 48(11): 72-78. |
[14] | WEI Li-qi, ZHAO Zhi-hong, BAI Guang-wei, SHEN Hang. Location Privacy Game Mechanism Based on Generative Adversarial Networks [J]. Computer Science, 2021, 48(10): 266-271. |
[15] | YU Xue-yong, CHEN Tao. Privacy Protection Offloading Algorithm Based on Virtual Mapping in Edge Computing Scene [J]. Computer Science, 2021, 48(1): 65-71. |
|