메뉴 건너뛰기




Volumn , Issue , 2015, Pages 181-189

Achieving bilateral utility maximization and location privacy preservation in database-driven cognitive radio networks

Author keywords

database driven cognitive radio; differential privacy; location privacy

Indexed keywords

DATA PRIVACY; DATABASE SYSTEMS; INTERFERENCE SUPPRESSION; ITERATIVE METHODS; LOCATION;

EID: 84964677871     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/MASS.2015.93     Document Type: Conference Paper
Times cited : (26)

References (29)
  • 4
    • 78651372721 scopus 로고    scopus 로고
    • Collaborative spectrum sensing in the presence of byzantine attacks in cognitive radio networks
    • A. S. Rawat, P. Anand, H. Chen, and P. K. Varshney, "Collaborative spectrum sensing in the presence of byzantine attacks in cognitive radio networks," IEEE Transactions on Signal Processing, vol. 59, no. 2, pp. 774-786, 2011.
    • (2011) IEEE Transactions on Signal Processing , vol.59 , Issue.2 , pp. 774-786
    • Rawat, A.S.1    Anand, P.2    Chen, H.3    Varshney, P.K.4
  • 6
    • 84884907077 scopus 로고    scopus 로고
    • Energy-efficient intrusion detection with a barrier of probabilistic sensors: Global and local
    • J. Chen, J. Li, and T. H. Lai, "Energy-efficient intrusion detection with a barrier of probabilistic sensors: Global and local," IEEE Transactions on Wireless Communications, vol. 12, no. 9, pp. 4742-4755, 2013.
    • (2013) IEEE Transactions on Wireless Communications , vol.12 , Issue.9 , pp. 4742-4755
    • Chen, J.1    Li, J.2    Lai, T.H.3
  • 7
    • 84884380171 scopus 로고    scopus 로고
    • Trapping mobile targets in wireless sensor networks: An energy-efficient perspective
    • -, "Trapping mobile targets in wireless sensor networks: An energy-efficient perspective," IEEE Transactions on Vehicular Technology, vol. 62, no. 7, pp. 3287-3300, 2013.
    • (2013) IEEE Transactions on Vehicular Technology , vol.62 , Issue.7 , pp. 3287-3300
    • Chen, J.1    Li, J.2    Lai, T.H.3
  • 9
    • 84874570518 scopus 로고    scopus 로고
    • Distributed resource map: A database-driven network support architecture for cognitive radio ad hoc networks
    • S. N. Khan, M. A. Kalil, and A. Mitschele-Thiel, "Distributed resource map: A database-driven network support architecture for cognitive radio ad hoc networks," in Proceedings of ICUMT'12, 2012, pp. 188-194.
    • (2012) Proceedings of ICUMT'12 , pp. 188-194
    • Khan, S.N.1    Kalil, M.A.2    Mitschele-Thiel, A.3
  • 11
    • 84883081776 scopus 로고    scopus 로고
    • Location privacy in database-driven cognitive radio networks: Attacks and countermea-sures
    • Z. Gao, H. Zhu, Y. Liu, M. Li, and Z. Cao, "Location privacy in database-driven cognitive radio networks: Attacks and countermea-sures," in Proceedings of IEEE INFOCOM'13, 2013, pp. 2751-2759.
    • (2013) Proceedings of IEEE INFOCOM'13 , pp. 2751-2759
    • Gao, Z.1    Zhu, H.2    Liu, Y.3    Li, M.4    Cao, Z.5
  • 16
    • 34648875254 scopus 로고
    • The history of the solution of the cubic equation
    • L. Guilbeau, "The history of the solution of the cubic equation," Mathematics News Letter, pp. 8-12, 1930.
    • (1930) Mathematics News Letter , pp. 8-12
    • Guilbeau, L.1
  • 18
    • 79952992733 scopus 로고    scopus 로고
    • Network coding based privacy preservation against traffic analysis in multi-hop wireless networks
    • Y. Fan, Y Jiang, H. Zhu, J. Chen, and X. Shen, "Network coding based privacy preservation against traffic analysis in multi-hop wireless networks," IEEE Transactions on Wireless Communications, vol. 10, no. 3, pp. 834-843, 2011.
    • (2011) IEEE Transactions on Wireless Communications , vol.10 , Issue.3 , pp. 834-843
    • Fan, Y.1    Jiang, Y.2    Zhu, H.3    Chen, J.4    Shen, X.5
  • 22
    • 79951509728 scopus 로고    scopus 로고
    • Location privacy: Going beyond k-anonymity, cloaking and anonymizers
    • A. Khoshgozaran, C. Shahabi, and H. Shirani-Mehr, "Location privacy: going beyond k-anonymity, cloaking and anonymizers," Knowledge and Information Systems, vol. 26, no. 3, pp. 435-465, 2011.
    • (2011) Knowledge and Information Systems , vol.26 , Issue.3 , pp. 435-465
    • Khoshgozaran, A.1    Shahabi, C.2    Shirani-Mehr, H.3
  • 24
    • 37849018331 scopus 로고    scopus 로고
    • Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy
    • Springer
    • A. Khoshgozaran and C. Shahabi, "Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy," in Advances in Spatial and Temporal Databases. Springer, 2007, pp. 239-257.
    • (2007) Advances in Spatial and Temporal Databases , pp. 239-257
    • Khoshgozaran, A.1    Shahabi, C.2
  • 26
    • 84905991151 scopus 로고    scopus 로고
    • The algorithmic foundations of differential privacy
    • C. Dwork and A. Roth, "The algorithmic foundations of differential privacy," Theoretical Computer Science, vol. 9, no. 3-4, pp. 211-407, 2013.
    • (2013) Theoretical Computer Science , vol.9 , Issue.3-4 , pp. 211-407
    • Dwork, C.1    Roth, A.2
  • 27
    • 85002409724 scopus 로고    scopus 로고
    • Privacy and performance trade-off in cyber-physical systems
    • to appear
    • H. Zhang, Y Shu, P. Cheng, and J. Chen, "Privacy and performance trade-off in cyber-physical systems," IEEE Networks, to appear.
    • IEEE Networks
    • Zhang, H.1    Shu, Y.2    Cheng, P.3    Chen, J.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.