A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Primary Users' Operational Privacy Preservation via Data-Driven Optimization
2017
GLOBECOM 2017 - 2017 IEEE Global Communications Conference
Recently opened spectrum within 3550-3700 MHz provides more accessing opportunities to secondary users (SUs), while it also raises concerns on the operational privacy of primary users (PUs), especially ...
With joint consideration of PUs' privacy and uncertain SUs' demands, we formulate the data-driven risk-averse stochastic optimization, and provide corresponding solutions. ...
To address the issues above, we propose a novel PUs' obfuscation strategy design, formulate the PUs' operational privacy preservation problem into a data-driven risk-averse optimization, and provide robust ...
doi:10.1109/glocom.2017.8254108
dblp:conf/globecom/WangGQJPH17
fatcat:oenxp3vqs5ajpaxz7vsyfkay7u
Differential Privacy in Cognitive Radio Networks: A Comprehensive Survey
[article]
2021
arXiv
pre-print
In order to preserve this privacy leakage, various privacy preserving strategies have been developed by researchers, and according to us differential privacy is the most significant among them. ...
Various capabilities of CR nodes depend upon efficient and continuous reporting of data with each other and centralized base stations, which in turn can cause leakage in privacy. ...
Operation time is the total activity time of primary user, which is also known as primary user activity time [73] . ...
arXiv:2111.02011v2
fatcat:a5hique4fvfxrclslvpgda5jyy
Cognitive Networking for Next-G Wireless Communications
2016
International Journal of Distributed Sensor Networks
The paper entitled "A New Distributed User-Demand-Driven Location Privacy Protection Scheme for Mobile Communication Network" by W. ...
However, the rap development of smart grid will result in poor data security and privacy preservation. International Journal of Distributed Sensor Networks smart grid, called PAS. ...
doi:10.1155/2016/9172605
fatcat:kq4iek6ehfgdnngt3qwq7rqiou
Towards Privacy-Preserving IoT Systems Using Model Driven Engineering
2019
ACM/IEEE International Conference on Model Driven Engineering Languages and Systems
This paper discusses a way to create privacy-preserving IoT systems using an MDE approach to support privacy and data transparency. ...
For MDE approaches it is important to consider privacy already on model level. ...
This data could be collected via smart devices and depth cameras. Every operator has certain Abilities (lines [25] [26] [27] . ...
dblp:conf/models/MichaelNRV19
fatcat:qd7m25oqxvf5vdctz7dt76topi
Optimal strategies for defending location inference attack in database-driven CRNs
2015
2015 IEEE International Conference on Communications (ICC)
Database-driven Cognitive Radio Network (CRN) has been proposed to replace the requirement of spectrum sensing of terminal devices so that the operation of users is simplified. ...
However, location privacy issues introduce a big challenge for securing database-driven CRN due to spectrum availability information. ...
In section IV, we give the location privacy preserving scheme and analyse the maximum location privacy which can be obtained by the users. ...
doi:10.1109/icc.2015.7249548
dblp:conf/icc/ZhangFLZD15
fatcat:h63geynjvfahritvwquaur3zom
Table of contents
2021
IEEE Transactions on Smart Grid
Xue 5158 Data-Driven Distributionally Robust Co-Optimization of P2P Energy Trading and Network Operation for Interconnected Microgrids . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ...
An Open-Source Simulator for Data-Driven Electric Vehicle Charging Research . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ...
Data Analytics and Big Data Applications to Microgrids and ADNs ...
doi:10.1109/tsg.2021.3119763
fatcat:q4lez7najrcr5gv7idprsd52oy
Big Data Analytics in Cloud Environments
2024
International Journal of Research Publication and Reviews
Cloud computing empowers big data analytics, transforming it into a powerful engine for data-driven decisions, uncovering hidden insights, and fueling innovation. ...
and analyzing data. ...
This aids businesses in minimizing downtime and preserving operations even in the case of natural disasters or hardware malfunctions. ...
doi:10.55248/gengpi.5.0324.07105
fatcat:rptgo73abbhazpj55zjihfjbtu
Finding Optimal Path and Privacy Preserving for Wireless Network
2022
International Journal for Research in Applied Science and Engineering Technology
We explicitly examine the privacyutility trade-off problem for wireless networks and develop a novel privacy-preserving routing algorithm called Optimal Privacy Enhancing Routing Algorithm (OPERA). ...
OPERA uses a statistical decision-making framework to optimize the privacy of the routing protocol given a utility (or cost) constraint. ...
Using ANOC, they can perform network coding to achieve a higher throughput, while still preserving user privacy in wireless mesh networks. ...
doi:10.22214/ijraset.2022.46949
fatcat:43mprab6sraollyoy6n3dox26u
Capturing Users' Privacy Expectations To Design Better Smart Car Applications
2018
Pacific Asia Conference on Information Systems
Smart cars learn from gathered operating data to add value to the users' driving experience and increase security. ...
Continuous collection of data can defy users' privacy expectations, which may lead to reluctant usage or even refusal to accept services offered by smart car providers. ...
Acknowledgements This work has been supported by the Center for Research in Security and Privacy (CRISP), funded by BMBF and HMWK. ...
dblp:conf/pacis/OsternEB18
fatcat:2dtfuu2j7vbe3p2wdvjjexfebe
Security and Enforcement in Spectrum Sharing
2014
Proceedings of the IEEE
In this paper, we review some of the critical security and privacy threats that impact spectrum sharing. ...
In other words, operational privacy of PUs is the confidentiality of information regarding the primary users' operational characteristic. ...
However, to the best of our knowledge, there is no existing work that addresses the problem of the primary users' operational privacy in the context of database-driven spectrum sharing.
B. ...
doi:10.1109/jproc.2014.2301972
fatcat:k45w2ty4rzc57gjgflncrddkza
Optimization of Privacy-Utility Trade-offs under Informational Self-determination
[article]
2018
arXiv
pre-print
There are several techniques that mask user-generated data to ensure privacy, e.g. differential privacy. ...
Nevertheless, third parties that run and manage these systems (data consumers) do not always guarantee users' privacy. ...
Individual privacy is still preserved for all users and their privacy settings. ...
arXiv:1710.03186v2
fatcat:6g53qtkfrbazfeaz4l26rfe7vi
User-Centric Privacy Preservation Solution to Control Third Party Access in Digital Databases
2017
Zenodo
Such coarse-grain privacy preservation leads to violate individual's specific privacy requirements. Simply, user-centric privacy preservation is not guaranteed. ...
The author attempts to solve this human critical problem by proposing a fine-grain privacy preservation solution. ...
User-centric privacy User-Centric Privacy Preservation is a forward-thinking that extends beyond the general policy driven privacy enforcements. Privacy is a human right. ...
doi:10.5281/zenodo.3951349
fatcat:wtkemiwecngbtewxjpkdxtkume
Location Privacy in Cognitive Radio Networks: A Survey
2017
IEEE Communications Surveys and Tutorials
Despite the great benefits that CRNs offer in terms of their ability to improve spectrum utilization efficiency, they suffer from user location privacy issues. ...
' privacy. ...
To find the optimal cloaking strategy, each SP projects its original sensing data to a single-dimensional space, with minimal data distortion [225] , using a privacy-preserving non-invertible projection ...
doi:10.1109/comst.2017.2693965
fatcat:4jkyw7tyxrcdzbbm5uocxawsie
Blockchain-empowered Data-driven Networks: A Survey and Outlook
[article]
2021
arXiv
pre-print
For future data-driven networks (DDNs), blockchain is considered as a promising solution to enable the secure storage, sharing, and analytics of data, privacy protection for users, robust, trustworthy ...
The paths leading to future networks are pointing towards a data-driven paradigm to better cater to the explosive growth of mobile services as well as the increasing heterogeneity of mobile devices, many ...
Future Data-driven Networks The rapid development and widespread of data-driven applications have brought promising opportunities to reshape the Internet architectures as well as operation and optimization ...
arXiv:2101.12375v1
fatcat:7f6udfdxajczxc6bjqdyzb3hyi
A Review on Achieving Cloud Security using Third Party Auditor and Preserving Privacy for Shared Data over Public Cloud
2023
International Journal of Advanced Research in Science, Communication and Technology
In the present paper a review related to Achieving Cloud Security using Third Party Auditor and Preserving Privacy for Shared Data over Public Cloudwas done. ...
The access control is used to segregate users from data owners, and only those users who have been allowed access by the data owners can access the owner's data. ...
A novel data driven scheduling is also developed for data processing optimization. ...
doi:10.48175/ijarsct-12044
fatcat:yvukdlxu5bdszfne3iql34xz4u
« Previous
Showing results 1 — 15 out of 15,245 results