메뉴 건너뛰기




Volumn 4, Issue 2, 2017, Pages 330-339

Leveraging Crowdsourcing for Efficient Malicious Users Detection in Large-Scale Social Networks

Author keywords

Crowdsourcing; large scale networks; malicious users detection

Indexed keywords

COST BENEFIT ANALYSIS; CROWDSOURCING; OPTIMIZATION; PROBLEM SOLVING;

EID: 85019052345     PISSN: None     EISSN: 23274662     Source Type: Journal    
DOI: 10.1109/JIOT.2016.2560518     Document Type: Article
Times cited : (80)

References (46)
  • 1
    • 84919475079 scopus 로고    scopus 로고
    • Dynamic channel assignment for wireless sensor networks: A regret matching based approach
    • Jan.
    • J. Chen, et al., "Dynamic channel assignment for wireless sensor networks: A regret matching based approach, " IEEE Trans. Parallel Distrib. Syst., vol. 26, no. 1, pp. 95-106, Jan. 2015.
    • (2015) IEEE Trans. Parallel Distrib. Syst. , vol.26 , Issue.1 , pp. 95-106
    • Chen, J.1
  • 2
    • 84890331378 scopus 로고    scopus 로고
    • On energy-efficient trap coverage in wireless sensor networks
    • J. Chen, et al., "On energy-efficient trap coverage in wireless sensor networks, " ACM Trans. Sensor Netw., vol. 10, no. 1, pp. 1-29, 2013.
    • (2013) ACM Trans. Sensor Netw. , vol.10 , Issue.1 , pp. 1-29
    • Chen, J.1
  • 3
    • 84923172288 scopus 로고    scopus 로고
    • Impacts of deployment strategies on localization performance in underwater acoustic sensor networks
    • Mar.
    • G. Han, C. Zhang, L. Shu, and J. J. P. C. Rodrigues, "Impacts of deployment strategies on localization performance in underwater acoustic sensor networks, " IEEE Trans. Ind. Electron., vol. 62, no. 3, pp. 1725-1733, Mar. 2015.
    • (2015) IEEE Trans. Ind. Electron. , vol.62 , Issue.3 , pp. 1725-1733
    • Han, G.1    Zhang, C.2    Shu, L.3    Rodrigues, J.J.P.C.4
  • 4
    • 84941918744 scopus 로고    scopus 로고
    • Data gathering optimization by dynamic sensing and routing in rechargeable sensor networks
    • to be published
    • Y. Zhang, S. He, and J. Chen, "Data gathering optimization by dynamic sensing and routing in rechargeable sensor networks, " IEEE/ACM Trans. Netw., doi: 10.1109/TNET.2015.2425146, to be published, 2016.
    • (2016) IEEE/ACM Trans. Netw.
    • Zhang, Y.1    He, S.2    Chen, J.3
  • 6
    • 84940484414 scopus 로고    scopus 로고
    • QoE-ensured price competition model for emerging mobile networks
    • Aug.
    • M. Dong, X. Liu, Z. Qian, A. Liu, and T. Wang, "QoE-ensured price competition model for emerging mobile networks, " IEEE Wireless Commun., vol. 22, no. 4, pp. 50-57, Aug. 2015.
    • (2015) IEEE Wireless Commun. , vol.22 , Issue.4 , pp. 50-57
    • Dong, M.1    Liu, X.2    Qian, Z.3    Liu, A.4    Wang, T.5
  • 8
    • 84937425876 scopus 로고    scopus 로고
    • CAMF: Context-Aware message forwarding in mobile social networks
    • Aug.
    • K. Wei, M. Dong, K. Ota, and K. Xu, "CAMF: Context-Aware message forwarding in mobile social networks, " IEEE Trans. Parallel Distrib. Syst., vol. 26, no. 8, pp. 2178-2187, Aug. 2015.
    • (2015) IEEE Trans. Parallel Distrib. Syst. , vol.26 , Issue.8 , pp. 2178-2187
    • Wei, K.1    Dong, M.2    Ota, K.3    Xu, K.4
  • 9
    • 84963692169 scopus 로고    scopus 로고
    • Device-To-device communication in LTE-Advanced networks: A survey
    • Dec.
    • J. Liu, N. Kato, J. Ma, and N. Kadowaki, "Device-To-device communication in LTE-Advanced networks: A survey, " IEEE Commun. Surveys Tuts., vol. 17, no. 4, pp. 1923-1940, Dec. 2015.
    • (2015) IEEE Commun. Surveys Tuts. , vol.17 , Issue.4 , pp. 1923-1940
    • Liu, J.1    Kato, N.2    Ma, J.3    Kadowaki, N.4
  • 10
    • 84876487570 scopus 로고    scopus 로고
    • Performance modeling for relay cooperation in delay tolerant networks
    • J. Liu, X. Jiang, H. Nishiyama, and N. Kato, "Performance modeling for relay cooperation in delay tolerant networks, " Mobile Netw. Appl., vol. 18, no. 2, pp. 186-194, 2013.
    • (2013) Mobile Netw. Appl. , vol.18 , Issue.2 , pp. 186-194
    • Liu, J.1    Jiang, X.2    Nishiyama, H.3    Kato, N.4
  • 11
    • 84961990862 scopus 로고    scopus 로고
    • Big data-driven optimization for mobile networks toward 5G
    • Jan./Feb.
    • K. Zheng, et al., "Big data-driven optimization for mobile networks toward 5G, " IEEE Netw., vol. 30, no. 1, pp. 44-51, Jan./Feb. 2016.
    • (2016) IEEE Netw. , vol.30 , Issue.1 , pp. 44-51
    • Zheng, K.1
  • 12
    • 84896391856 scopus 로고    scopus 로고
    • Optimal power allocation for outage probability minimization in fading channels with energy harvesting constraints
    • Feb.
    • C. Huang, R. Zhang, and S. Cui, "Optimal power allocation for outage probability minimization in fading channels with energy harvesting constraints, " IEEE Trans. Wireless Commun., vol. 13, no. 2, pp. 1074-1087, Feb. 2014.
    • (2014) IEEE Trans. Wireless Commun. , vol.13 , Issue.2 , pp. 1074-1087
    • Huang, C.1    Zhang, R.2    Cui, S.3
  • 13
    • 84877752789 scopus 로고    scopus 로고
    • Throughput maximization for the Gaussian relay channel with energy harvesting constraints
    • Aug.
    • C. Huang, R. Zhang, and S. Cui, "Throughput maximization for the Gaussian relay channel with energy harvesting constraints, " IEEE J. Sel. Areas Commun., vol. 31, no. 8, pp. 1469-1479, Aug. 2013.
    • (2013) IEEE J. Sel. Areas Commun. , vol.31 , Issue.8 , pp. 1469-1479
    • Huang, C.1    Zhang, R.2    Cui, S.3
  • 14
  • 15
    • 84925082806 scopus 로고    scopus 로고
    • Multicloud-based evacuation services for emergency management
    • Nov.
    • M. Dong, H. Li, K. Ota, L. T. Yang, and H. Zhu, "Multicloud-based evacuation services for emergency management, " IEEE Cloud Comput., vol. 1, no. 4, pp. 50-59, Nov. 2014.
    • (2014) IEEE Cloud Comput. , vol.1 , Issue.4 , pp. 50-59
    • Dong, M.1    Li, H.2    Ota, K.3    Yang, L.T.4    Zhu, H.5
  • 16
    • 84889087663 scopus 로고    scopus 로고
    • Security and privacy for storage and computation in cloud computing
    • Feb.
    • L. Wei, et al., "Security and privacy for storage and computation in cloud computing, " Inf. Sci., vol. 258, pp. 371-386, Feb. 2014.
    • (2014) Inf. Sci. , vol.258 , pp. 371-386
    • Wei, L.1
  • 17
    • 84921358942 scopus 로고    scopus 로고
    • Energy-efficient probabilistic area coverage in wireless sensor networks
    • Jan.
    • Q. Yang, S. He, J. Li, J. Chen, and Y. Sun, "Energy-efficient probabilistic area coverage in wireless sensor networks, " IEEE Trans. Veh. Technol., vol. 64, no. 1, pp. 367-377, Jan. 2015.
    • (2015) IEEE Trans. Veh. Technol. , vol.64 , Issue.1 , pp. 367-377
    • Yang, Q.1    He, S.2    Li, J.3    Chen, J.4    Sun, Y.5
  • 18
    • 84923528489 scopus 로고    scopus 로고
    • TOC: Localizing wireless rechargeable sensors with time of charge
    • Art. no. 44
    • Y. Shu, P. Cheng, Y. Gu, J. Chen, and T. He, "TOC: Localizing wireless rechargeable sensors with time of charge, " ACM Trans. Sensor Netw., vol. 11, no. 3, 2015, Art. no. 44.
    • (2015) ACM Trans. Sensor Netw. , vol.11 , Issue.3
    • Shu, Y.1    Cheng, P.2    Gu, Y.3    Chen, J.4    He, T.5
  • 19
    • 84946949652 scopus 로고    scopus 로고
    • An attack-resistant trust model based on multidimensional trust metrics in underwater acoustic sensor network
    • Dec.
    • G. Han, J. Jiang, L. Shu, and M. Guizani, "An attack-resistant trust model based on multidimensional trust metrics in underwater acoustic sensor network, " IEEE Trans. Mobile Comput., vol. 14, no. 12, pp. 2447-2459, Dec. 2015.
    • (2015) IEEE Trans. Mobile Comput. , vol.14 , Issue.12 , pp. 2447-2459
    • Han, G.1    Jiang, J.2    Shu, L.3    Guizani, M.4
  • 20
    • 84940705050 scopus 로고    scopus 로고
    • Optimal DoS attack scheduling in wireless networked control system
    • May
    • H. Zhang, P. Cheng, L. Shi, and J. Chen, "Optimal DoS attack scheduling in wireless networked control system, " IEEE Trans. Control Syst. Technol., vol. 24, no. 3, pp. 843-852, May 2016, doi: 10.1109/TCST.2015.2462741.
    • (2016) IEEE Trans. Control Syst. Technol. , vol.24 , Issue.3 , pp. 843-852
    • Zhang, H.1    Cheng, P.2    Shi, L.3    Chen, J.4
  • 22
    • 74549125111 scopus 로고    scopus 로고
    • More Than $3 Billion Lost to These Attacks. [Online]. Available
    • T. McCall. (2007). Gartner Survey Shows Phishing Attacks Escalated in 2007; More Than $3 Billion Lost to These Attacks. [Online]. Available: http://www.gartner.com/newsroom/id/565125
    • (2007) Gartner Survey Shows Phishing Attacks Escalated in 2007
    • McCall, T.1
  • 25
    • 84878390310 scopus 로고    scopus 로고
    • Neighbor-based malicious node detection in wireless sensor networks
    • S.-J. Yim and Y.-H. Choi, "Neighbor-based malicious node detection in wireless sensor networks, " Wireless Sensor Netw., vol. 4, no. 9, pp. 219-225, 2012.
    • (2012) Wireless Sensor Netw. , vol.4 , Issue.9 , pp. 219-225
    • Yim, S.-J.1    Choi, Y.-H.2
  • 27
    • 84938388237 scopus 로고    scopus 로고
    • Malicious node detection using a dual threshold in wireless sensor networks
    • S. Y. Lim and Y.-H. Choi, "Malicious node detection using a dual threshold in wireless sensor networks, " J. Sensor Actuator Netw., vol. 2, no. 1, pp. 70-84, 2013.
    • (2013) J. Sensor Actuator Netw. , vol.2 , Issue.1 , pp. 70-84
    • Lim, S.Y.1    Choi, Y.-H.2
  • 31
    • 84945315428 scopus 로고    scopus 로고
    • Optimal denial-of-service attack scheduling with energy constraint
    • Nov.
    • H. Zhang, P. Cheng, L. Shi, and J. Chen, "Optimal denial-of-service attack scheduling with energy constraint, " IEEE Trans. Autom. Control, vol. 60, no. 11, pp. 3023-3028, Nov. 2015.
    • (2015) IEEE Trans. Autom. Control , vol.60 , Issue.11 , pp. 3023-3028
    • Zhang, H.1    Cheng, P.2    Shi, L.3    Chen, J.4
  • 32
    • 84896396765 scopus 로고    scopus 로고
    • Curve-based deployment for barrier coverage in wireless sensor networks
    • Feb.
    • S. He, X. Gong, J. Zhang, J. Chen, and Y. Sun, "Curve-based deployment for barrier coverage in wireless sensor networks, " IEEE Trans. Wireless Commun., vol. 13, no. 2, pp. 724-735, Feb. 2014.
    • (2014) IEEE Trans. Wireless Commun. , vol.13 , Issue.2 , pp. 724-735
    • He, S.1    Gong, X.2    Zhang, J.3    Chen, J.4    Sun, Y.5
  • 38
    • 84903577325 scopus 로고    scopus 로고
    • Device-To-device communications achieve efficient load balancing in LTE-Advanced networks
    • Apr.
    • J. Liu, Y. Kawamoto, H. Nishiyama, N. Kato, and N. Kadowaki, "Device-To-device communications achieve efficient load balancing in LTE-Advanced networks, " IEEE Wireless Commun., vol. 21, no. 2, pp. 57-65, Apr. 2014.
    • (2014) IEEE Wireless Commun. , vol.21 , Issue.2 , pp. 57-65
    • Liu, J.1    Kawamoto, Y.2    Nishiyama, H.3    Kato, N.4    Kadowaki, N.5
  • 40
    • 84894426605 scopus 로고    scopus 로고
    • Cooperative spectrum sharing: A contract-based approach
    • Jan.
    • L. Duan, L. Gao, and J. Huang, "Cooperative spectrum sharing: A contract-based approach, " IEEE Trans. Mobile Comput., vol. 13, no. 1, pp. 174-187, Jan. 2014.
    • (2014) IEEE Trans. Mobile Comput. , vol.13 , Issue.1 , pp. 174-187
    • Duan, L.1    Gao, L.2    Huang, J.3
  • 42
    • 84971014154 scopus 로고    scopus 로고
    • Delay-optimal dynamic mode selection and resource allocation in device-To-device communications-Part II: Practical algorithm
    • to be published
    • L. Lei, et al., "Delay-optimal dynamic mode selection and resource allocation in device-To-device communications-Part II: Practical algorithm, " IEEE Trans. Veh. Technol., doi: 10.1109/TVT.2015.2444791, to be published, 2016.
    • (2016) IEEE Trans. Veh. Technol.
    • Lei, L.1
  • 43
    • 84870266614 scopus 로고    scopus 로고
    • Optimal forwarding games in mobile ad hoc networks with two-hop f-cast relay
    • Dec.
    • J. Liu, et al., "Optimal forwarding games in mobile ad hoc networks with two-hop f-cast relay, " IEEE J. Sel. Areas Commun., vol. 30, no. 11, pp. 2169-2179, Dec. 2012.
    • (2012) IEEE J. Sel. Areas Commun. , vol.30 , Issue.11 , pp. 2169-2179
    • Liu, J.1
  • 45
    • 38549088052 scopus 로고    scopus 로고
    • Enhanced intrusion detection system for discovering malicious nodes in mobile ad hoc networks
    • N. Nasser and Y. Chen, "Enhanced intrusion detection system for discovering malicious nodes in mobile ad hoc networks, " in Proc. IEEE Int. Conf. Commun. (ICC), Glasgow, U.K., 2007, pp. 1154-1159.
    • (2007) Proc. IEEE Int. Conf. Commun. (ICC), Glasgow, U.K. , pp. 1154-1159
    • Nasser, N.1    Chen, Y.2
  • 46
    • 84868112157 scopus 로고    scopus 로고
    • EAACK-A secure intrusion-detection system for MANETs
    • Mar.
    • E. M. Shakshuki, N. Kang, and T. R. Sheltami, "EAACK-A secure intrusion-detection system for MANETs, " IEEE Trans. Ind. Electron., vol. 60, no. 3, pp. 1089-1098, Mar. 2013.
    • (2013) IEEE Trans. Ind. Electron. , vol.60 , Issue.3 , pp. 1089-1098
    • Shakshuki, E.M.1    Kang, N.2    Sheltami, T.R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.