-
1
-
-
84988380596
-
Following targets for mobile tracking in wireless sensor networks
-
T. Wang et al., "Following targets for mobile tracking in wireless sensor networks, " ACM Trans. Sensor Netw., vol. 12, no. 4, p. 31, 2016.
-
(2016)
ACM Trans. Sensor Netw
, vol.12
, Issue.4
, pp. 31
-
-
Wang, T.1
-
2
-
-
84986631527
-
A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing
-
Nov
-
Z. Xia, X. Wang, L. Zhang, X. Sun, K. Ren, and Z. Qin, "A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing, " IEEE Trans. Inf. Forensics Security, vol. 11, no. 11, pp. 2594-2608, Nov. 2016.
-
(2016)
IEEE Trans. Inf. Forensics Security
, vol.11
, Issue.11
, pp. 2594-2608
-
-
Xia, Z.1
Wang, X.2
Zhang, L.3
Sun, X.4
Ren, K.5
Qin, Z.6
-
3
-
-
84962448916
-
A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data
-
Jan
-
Z. Xia, X. Wang, X. Sun, and Q. Wang, "A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data, " IEEE Trans. Parallel Distrib. Syst., vol. 27, no. 2, pp. 340-352, Jan. 2016.
-
(2016)
IEEE Trans. Parallel Distrib. Syst
, vol.27
, Issue.2
, pp. 340-352
-
-
Xia, Z.1
Wang, X.2
Sun, X.3
Wang, Q.4
-
4
-
-
84995467231
-
Green routing pro-Tocols for wireless multimedia sensor networks
-
Dec
-
G. Han, J. Jiang, M. Guizani, and J. J. P. C. Rodrigues, "Green routing pro-Tocols for wireless multimedia sensor networks, " IEEEWireless Commun., vol. 23, no. 6, pp. 140-146, Dec. 2016.
-
(2016)
IEEEWireless Commun
, vol.23
, Issue.6
, pp. 140-146
-
-
Han, G.1
Jiang, J.2
Guizani, M.3
Rodrigues, J.J.P.C.4
-
5
-
-
84983268338
-
Towards ef-cient content-Aware search over encrypted outsourced data in cloud
-
Apr
-
Z. Fu, X. Sun, S. Ji, and G. Xie, "Towards ef-cient content-Aware search over encrypted outsourced data in cloud, " in Proc. IEEE INFOCOM Conf. Comput. Commun., Apr. 2016, pp. 1-9.
-
(2016)
Proc IEEE INFOCOM Conf. Comput. Commun
, pp. 1-9
-
-
Fu, Z.1
Sun, X.2
Ji, S.3
Xie, G.4
-
6
-
-
84991466851
-
Privcheck: Privacy-preserving check-in data publishing for personalized location based ser-vices
-
D. Yang, D. Zhang, B. Qu, and P. C. Mauroux, "Privcheck: Privacy-preserving check-in data publishing for personalized location based ser-vices, " in Proc. ACM Int. Joint Conf. Pervasive Ubiquitous Comput., 2016, pp. 545-556.
-
(2016)
Proc ACM Int. Joint Conf. Pervasive Ubiquitous Comput
, pp. 545-556
-
-
Yang, D.1
Zhang, D.2
Qu, B.3
Mauroux, P.C.4
-
7
-
-
85020954580
-
An incentive mechanism for k-Anonymity in LBS privacy protection based on credit mechanism
-
X. Li, M. Miao, H. Liu, J. Ma, and K. C. Li, "An incentive mechanism for k-Anonymity in LBS privacy protection based on credit mechanism, " in Proc. Soft Comput., 2016, pp. 1-11.
-
(2016)
Proc. Soft Comput
, pp. 1-11
-
-
Li, X.1
Miao, M.2
Liu, H.3
Ma, J.4
Li, K.C.5
-
8
-
-
85029707124
-
Dynamic adaptive replace-ment policy in shared last-level cache of dram/pcm hybrid memory for big data storage
-
to be published
-
G. Jia, G. Han, J. Jiang, and L. Liu, "Dynamic adaptive replace-ment policy in shared last-level cache of dram/pcm hybrid memory for big data storage, " IEEE Trans. Ind. Informat., to be published, doi: 10.1109/TII.2016.2645941.
-
IEEE Trans. Ind. Informat
-
-
Jia, G.1
Han, G.2
Jiang, J.3
Liu, L.4
-
9
-
-
84994236081
-
Collaborative trajectory pri-vacy preserving scheme in location-based services
-
May
-
T. Peng, Q. Liu, D. Meng, and G. Wang, "Collaborative trajectory pri-vacy preserving scheme in location-based services, " Inf. Sci., vol. 387, pp. 165-179, May 2017.
-
(2017)
Inf. Sci
, vol.387
, pp. 165-179
-
-
Peng, T.1
Liu, Q.2
Meng, D.3
Wang, G.4
-
10
-
-
84883061024
-
Dynamic mix-zone for location privacy in vehicular networks
-
Aug
-
B. Ying, D. Makrakis, and H. T. Mouftah, "Dynamic mix-zone for location privacy in vehicular networks, " IEEE Commun. Lett., vol. 17, no. 8, pp. 1524-1527, Aug. 2013.
-
(2013)
IEEE Commun. Lett
, vol.17
, Issue.8
, pp. 1524-1527
-
-
Ying, B.1
Makrakis, D.2
Mouftah, H.T.3
-
11
-
-
84930372896
-
Long-Term location privacy protection for location-based services in mobile cloud computing
-
F. Tang, J. Li, I. You, and M. Guo, "Long-Term location privacy protection for location-based services in mobile cloud computing, " Soft Comput., vol. 20, no. 5, pp. 1735-1747, 2016.
-
(2016)
Soft Comput
, vol.20
, Issue.5
, pp. 1735-1747
-
-
Tang, F.1
Li, J.2
You, I.3
Guo, M.4
-
12
-
-
85077359111
-
Enabling semantic search based on conceptual graphs over encrypted outsourced data
-
to be published
-
Z. Fu, F. Huang, X. Sun, A. Vasilakos, and C. N. Yang, "Enabling semantic search based on conceptual graphs over encrypted outsourced data, " IEEE Trans. Serv. Comput., to be published, doi: 10.1109/TSC.2016.2622697.
-
IEEE Trans. Serv. Comput
-
-
Fu, Z.1
Huang, F.2
Sun, X.3
Vasilakos, A.4
Yang, N.C.5
-
13
-
-
36549043405
-
Protecting location privacy with personalized k-Anonymity: Architecture and algorithms
-
Jan
-
B. Gedik and L. Liu, "Protecting location privacy with personalized k-Anonymity: Architecture and algorithms, " IEEE Trans. Mobile Comput., vol. 7, no. 1, pp. 1-18, Jan. 2008.
-
(2008)
IEEE Trans. Mobile Comput
, vol.7
, Issue.1
, pp. 1-18
-
-
Gedik, B.1
Liu, L.2
-
14
-
-
84943157127
-
Pseudonym-based anonymity zone generation for mobile service with strong adversary model
-
M. Guo, N. Pissinou, and S. S. Iyengar, "Pseudonym-based anonymity zone generation for mobile service with strong adversary model, " in Proc. Consum. Commun. Netw. Conf., 2015, pp. 335-340.
-
(2015)
Proc. Consum. Commun. Netw. Conf
, pp. 335-340
-
-
Guo, M.1
Pissinou, N.2
Iyengar, S.S.3
-
15
-
-
84925450955
-
Fog computing: A platform for Internet Things analytics
-
Springer
-
F. Bonomi, R. Milito, P. Natarajan, and J. Zhu, "Fog computing: A platform for Internet Things analytics, " Big Data and Internet of Things: Roadmap for Smart Environments. Springer, 2014, pp. pp. 169-186.
-
(2014)
Big Data and Internet of Things: Roadmap for Smart Environments
, pp. 169-186
-
-
Bonomi, F.1
Milito, R.2
Natarajan, P.3
Zhu, J.4
-
16
-
-
84912110181
-
Connected vehicles, the Internet of Things, and fog com-puting
-
Las Vegas, NV, USA
-
F. Bonomi, "Connected vehicles, the Internet of Things, and fog com-puting, " in Proc. 8th ACM Int. Workshop Veh. Inter-Netw. (VANET), Las Vegas, NV, USA, 2011, pp. 13-15.
-
(2011)
Proc. 8th ACM Int. Workshop Veh. Inter-Netw. (VANET)
, pp. 13-15
-
-
Bonomi, F.1
-
17
-
-
84996757871
-
Finding your way in the fog: Towards a comprehensive de-nition of fog computing
-
Oct
-
L. M. Vaquero and L. Rodero-Merino, "Finding your way in the fog: Towards a comprehensive de-nition of fog computing, " ACM SIGCOMM Comput. Commun. Rev., vol. 44, no. 5, pp. 27-32, Oct. 2014.
-
(2014)
ACM SIGCOMM Comput. Commun. Rev
, vol.44
, Issue.5
, pp. 27-32
-
-
Vaquero, L.M.1
Rodero-Merino, L.2
-
18
-
-
84866627419
-
Fog computing and its role in the Internet of Things
-
F. Bonomi, R. Milito, J. Zhu, and S. Addepalli, "Fog computing and its role in the Internet of Things, " in Proc. 1st Ed. MCC Workshop Mobile Cloud Comput., 2012, pp. 13-16.
-
(2012)
Proc. 1st Ed. MCC Workshop Mobile Cloud Comput
, pp. 13-16
-
-
Bonomi, F.1
Milito, R.2
Zhu, J.3
Addepalli, S.4
-
19
-
-
84864275237
-
Fog computing: Miti-gating insider data theft attacks in the cloud
-
May
-
S. J. Stolfo, M. B. Salem, and A. D. Keromytis, "Fog computing: Miti-gating insider data theft attacks in the cloud, " in Proc. IEEE Symp. Secur. Privacy Workshops, May 2012, pp. 125-128.
-
(2012)
Proc IEEE Symp. Secur. Privacy Workshops
, pp. 125-128
-
-
Stolfo, S.J.1
Salem, M.B.2
Keromytis, A.D.3
-
20
-
-
84945926318
-
In-network trajectory privacy preservation
-
M. Guo, X. Jin, N. Pissinou, S. Zanlongo, B. Carbunar, and S. Iyengar, "In-network trajectory privacy preservation, " ACM Comput. Surv. (CSUR), vol. 48, no. 2, p. 23, 2015.
-
(2015)
ACM Comput. Surv. (CSUR)
, vol.48
, Issue.2
, pp. 23
-
-
Guo, M.1
Jin, X.2
Pissinou, N.3
Zanlongo, S.4
Carbunar, B.5
Iyengar, S.6
-
21
-
-
84958787166
-
An ef-cient virtual machine consol-idation scheme for multimedia cloud computing
-
G. Han, W. Que, G. Jia, and L. Shu, "An ef-cient virtual machine consol-idation scheme for multimedia cloud computing, " Sensors, vol. 16, no. 2, p. 246, 2016.
-
(2016)
Sensors
, vol.16
, Issue.2
, pp. 246
-
-
Han, G.1
Que, W.2
Jia, G.3
Shu, L.4
-
22
-
-
79952449865
-
Spatial cloaking for anonymous location-based services in mobile peer-To-peer environments
-
C.-Y. Chow, M. F. Mokbel, and X. Liu, "Spatial cloaking for anonymous location-based services in mobile peer-To-peer environments, " GeoInfor-matica, vol. 15, no. 2, pp. 351-380, 2011.
-
(2011)
GeoInfor-matica
, vol.15
, Issue.2
, pp. 351-380
-
-
Chow, C.-Y.1
Mokbel, M.F.2
Liu, X.3
-
23
-
-
84903180672
-
A novel time-obfuscated algorithm for trajectory privacy protection
-
Jun
-
R.-H. Hwang, Y.-L. Hsueh, and H.-W. Chung, "A novel time-obfuscated algorithm for trajectory privacy protection, " IEEE Trans. Serv. Comput., vol. 7, no. 2, pp. 126-139, Jun. 2014.
-
(2014)
IEEE Trans. Serv. Comput
, vol.7
, Issue.2
, pp. 126-139
-
-
Hwang, R.-H.1
Hsueh, Y.-L.2
Chung, H.-W.3
-
24
-
-
84922851833
-
Attack-resilient mix-zones over road networks: Architecture and algorithms
-
Mar
-
B. Palanisamy and L. Liu, "Attack-resilient mix-zones over road networks: Architecture and algorithms, " IEEE Trans. Mobile Comput., vol. 14, no. 3, pp. 495-508, Mar. 2015.
-
(2015)
IEEE Trans. Mobile Comput
, vol.14
, Issue.3
, pp. 495-508
-
-
Palanisamy, B.1
Liu, L.2
-
25
-
-
84866628169
-
Trajectory privacy in location-based services and data publication
-
Jun
-
C. Chow and M. F. Mokbel, "Trajectory privacy in location-based services and data publication, " ACM SIGKDD Explorations Newslett., vol. 13, no. 1, pp. 19-29, Jun. 2011.
-
(2011)
ACM SIGKDD Explorations Newslett
, vol.13
, Issue.1
, pp. 19-29
-
-
Chow, C.1
Mokbel, M.F.2
-
26
-
-
84936883899
-
A novel dummy-based mechanism to protect pri-vacy on trajectories
-
Dec
-
X. Wu and G. Sun, "A novel dummy-based mechanism to protect pri-vacy on trajectories, " in Proc. IEEE Int. Conf. Data Mining Workshop, Dec. 2014, pp. 1120-1125.
-
(2014)
Proc IEEE Int. Conf. Data Mining Workshop
, pp. 1120-1125
-
-
Wu, X.1
Sun, G.2
-
27
-
-
34547474184
-
A peer-To-peer spatial cloaking algorithm for anonymous location-based service
-
C.-Y. Chow, M. F. Mokbel, and X. Liu, "A peer-To-peer spatial cloaking algorithm for anonymous location-based service, " in Proc. 14th Annu. ACM Int. Symp. Adv. Geograph. Inf. Syst., 2006, pp. 171-178.
-
(2006)
Proc. 14th Annu ACM Int. Symp. Adv. Geograph. Inf. Syst
, pp. 171-178
-
-
Chow, C.-Y.1
Mokbel, M.F.2
Liu, X.3
-
28
-
-
84864375403
-
A dual-Active spatial cloaking algorithm for location privacy preserving in mobile peer-To-peer networks
-
Apr
-
Y. Che, Q. Yang, and X. Hong, "A dual-Active spatial cloaking algorithm for location privacy preserving in mobile peer-To-peer networks, " in Proc. IEEE Wireless Commun. Netw. Conf. (WCNC), Apr. 2012, pp. 2098-2102.
-
(2012)
Proc IEEE Wireless Commun. Netw. Conf. (WCNC)
, pp. 2098-2102
-
-
Che, Y.1
Yang, Q.2
Hong, X.3
-
29
-
-
84897644876
-
Balancing trajectory privacy and data utility using a personalized anonymization model
-
Feb
-
S. Gao, J. Ma, C. Sun, and X. Li, "Balancing trajectory privacy and data utility using a personalized anonymization model, " J. Netw. Comput. Appl., vol. 38, pp. 125-134, Feb. 2014.
-
(2014)
J. Netw. Comput. Appl
, vol.38
, pp. 125-134
-
-
Gao, S.1
Ma, J.2
Sun, C.3
Li, X.4
-
30
-
-
84978471363
-
Reliable wireless connections for fast-moving rail users based on a chained fog structure
-
Feb
-
T. Wang et al., "Reliable wireless connections for fast-moving rail users based on a chained fog structure, " Inf. Sci., vol. 379, pp. 160-176, Feb. 2017.
-
Inf. Sci
, vol.379
, Issue.2017
, pp. 160-176
-
-
Wang, T.1
-
31
-
-
84961879980
-
On QoS-Aware scheduling of data stream applications over fog computing infrastruc-Tures
-
V. Cardellini, V. Grassi, F. L. Presti, and M. Nardelli, "On QoS-Aware scheduling of data stream applications over fog computing infrastruc-Tures, " in Proc. Comput. Commun., 2015, pp. 271-276.
-
(2015)
Proc. Comput. Commun
, pp. 271-276
-
-
Cardellini, V.1
Grassi, V.2
Presti, F.L.3
Nardelli, M.4
-
33
-
-
84979792270
-
Dummy-based user location anonymization under real-world constraints
-
T. Hara, A. Suzuki, M. Iwata, Y. Arase, and X. Xie, "Dummy-based user location anonymization under real-world constraints, " IEEE Access, vol. 4, pp. 673-687, 2016.
-
(2016)
IEEE Access
, vol.4
, pp. 673-687
-
-
Hara, T.1
Suzuki, A.2
Iwata, M.3
Arase, Y.4
Xie, X.5
-
34
-
-
84899106645
-
Septic shock prediction for patients with missing data
-
J. C. Ho, C. H. Lee, and J. Ghosh, "Septic shock prediction for patients with missing data, " ACM Trans. Manage. Inf. Syst. (TMIS), vol. 5, no. 1, p. 1, 2014.
-
(2014)
ACM Trans. Manage. Inf. Syst. (TMIS)
, vol.5
, Issue.1
, pp. 1
-
-
Ho, J.C.1
Lee, C.H.2
Ghosh, J.3
-
35
-
-
85027519512
-
Visual assessment of clustering tendency for incomplete data
-
Dec
-
L. A. Park, J. C. Bezdek, C. Leckie, K. Ramamohanarao, J. Bailey, and M. Palaniswami, "Visual assessment of clustering tendency for incomplete data, " IEEE Trans. Knowl. Data Eng., vol. 28, no. 12, pp. 3409-3422, Dec. 2016.
-
(2016)
IEEE Trans. Knowl. Data Eng
, vol.28
, Issue.12
, pp. 3409-3422
-
-
Park, L.A.1
Bezdek, J.C.2
Leckie, C.3
Ramamohanarao, K.4
Bailey, J.5
Palaniswami, M.6
-
36
-
-
84962302594
-
Multiple imputation for missing data using genetic programming
-
C. T. Tran, M. Zhang, and P. Andreae, "Multiple imputation for missing data using genetic programming, " in Proc. Annu. Conf. Genetic Evol. Comput., 2015, pp. 583-590.
-
(2015)
Proc. Annu. Conf. Genetic Evol. Comput
, pp. 583-590
-
-
Tran, C.T.1
Zhang, M.2
Andreae, P.3
|