[1] |
XIONG J B , ZHAO M F , BHUIYAN M Z A ,et al. An AI-enabled three-party game framework for guaranteed data privacy in mobile edge crowdsensing of IoT[J]. IEEE Transactions on Industrial Informatics, 2019: 1.
|
[2] |
XIONG J , CHEN L , BHUIYAN M Z A ,et al. A secure data deletion scheme for IoT devices through key derivation encryption and data analysis[J]. Future Generation Computer Systems, 2020,111: 741-753.
|
[3] |
YU S , WANG G , LIU X ,et al. Security and privacy in the age of the smart internet of things:an overview from a networking perspective[J]. IEEE Communications Magazine, 2018,56(9): 14-18.
|
[4] |
QI L , HU C , ZHANG X ,et al. Privacy-aware data fusion and prediction with spatial-temporal context for smart city industrial environment[J]. IEEE Transactions on Industrial Informatics, 2020: 1.
|
[5] |
胡宇翔, 伊鹏, 孙鹏浩 ,等. 全维可定义的多模态智慧网络体系研究[J]. 通信学报, 2019,40(8): 1-12.
|
|
HU Y X,YI P , SUN P H , e al . Research on the full-dimensional defined polymorphic smart network[J]. Journal on Communications, 2019,40(8): 1-12.
|
[6] |
LUO C , JI J , WANG Q ,et al. Channel state information prediction for 5G wireless communications:a deep learning approach[J]. IEEE Transactions on Network Science and Engineering, 2020,7(1): 227-236.
|
[7] |
乔康, 游伟, 王领伟 ,等. 基于区块链的 5G 物联网数据共享方案[J]. 网络与信息安全学报, 2020,6(4): 45-55.
|
|
QIAO K , YOU W , WANG L W ,et al. Data sharing scheme for 5G IoT based on blockchain[J]. Chinese Journal of Network and Information Security, 2020,6(4): 45-55.
|
[8] |
AL-GARADI M A , MOHAMED A , AL-ALI A ,et al. A survey of machine and deep learning methods for internet of things (IoT) security[J]. IEEE Communications Surveys & Tutorials, 2020,22(3): 1646-1685.
|
[9] |
熊金波, 马蓉, 牛犇 ,等. 移动群智感知中基于用户联盟匹配的隐私保护激励机制[J]. 计算机研究与发展, 2018,55(7): 1359-1370.
|
|
XIONG J B , MA R , NIU B ,et al. Privacy protection incentive mechanism based on user-Union matching in mobile crowdsensing[J]. Journal of Computer Research and Development, 2018,55(7): 1359-1370.
|
[10] |
ZHANG Y , WANG P , HUANG H ,et al. Privacy-assured FogCS:chaotic compressive sensing for secure industrial big image data processing in fog computing[J]. IEEE Transactions on Industrial Informatics, 2020.
|
[11] |
LIU C , TIAN Y , XIONG J ,et al. Towards attack and defense views to k-Anonymous using information theory approach[J]. IEEE Access, 2019,7: 156025-156032.
|
[12] |
AL-ASMARI H A , SALEH M S . A conceptual framework for measuring personal privacy risks in facebook online social network[C]// International Conference on Computer and Information Sciences (ICCIS). 2019: 1-6.
|
[13] |
ZHAO Y , WAGNER I . On the strength of privacy metrics for vehicular communication[J]. IEEE Transactions on Mobile Computing, 2018,18(2): 390-403.
|
[14] |
WAGNER I , ECKHOFF D . Technical privacy metrics:a systematic survey[J]. ACM Computing Surveys (CSUR), 2018,51(3): 1-38.
|
[15] |
熊金波, 王敏燊, 田有亮 ,等. 面向云数据的隐私度量研究进展[J]. 软件学报, 2018,29(7): 1963-1980.
|
|
XIONG J B , WANG M S , TIAN Y L ,et al. Research progress on privacy measurement for cloud data[J]. Journal of Software, 2018,29(7): 1963-1980.
|
[16] |
HUANG Z , YANG L , JIANG W . Uncertainty measurement with belief entropy on the interference effect in the quantum-like Bayesian networks[J]. Applied Mathematics and Computation, 2019,347: 417-428.
|
[17] |
SONG H , LUO T , LI J . Common criterion of privacy metrics and parameters analysis based on error probability for randomized response[J]. IEEE Access, 2019,7: 16964-16978.
|
[18] |
YAN F , XU K . A set pair analysis based layer of protection analysis and its application in quantitative risk assessment[J]. Journal of Loss Prevention in the Process Industries, 2018,55: 313-319.
|
[19] |
SHI W , HU J , YAN J ,et al. A privacy measurement method using network structure entropy[C]// Proceedings of the International Conference on Networking and Network Applications (NaNA). 2017: 147-151.
|
[20] |
SHAHAM S , DING M , LIU B ,et al. Transition-entropy:a novel metric for privacy preservation in location-based services[C]// IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS). 2019: 1-6.
|
[21] |
GAO F , HE J , PENG S ,et al. A quantifying metric for privacy protection based on Information theory[C]// Proceedings of the 2010 Third International Symposium on Intelligent Information Technology and Security Informatics. 2010: 216-220.
|
[22] |
张宏磊, 史玉良, 张世栋 ,等. 一种基于分块混淆的动态数据隐私保护机制[J]. 计算机研究与发展, 2016,53(11): 2454-2464.
|
|
ZHANG H L , SHI Y L , ZHANG S D ,et al. A privacy protection mechanism for dynamic data based on partition-confusion[J]. Journal of Computer Research and Development, 2016,53(11): 2454-2464.
|
[23] |
彭长根, 丁红发, 朱义杰 ,等. 隐私保护的信息熵模型及其度量方法[J]. 软件学报, 2016,27(8): 1891-1903.
|
|
PENG C G , DING H F , ZHU Y J ,et al. Information entropy models and privacy metrics methods for privacy protection[J]. Journal of software, 2016,27(8): 1891-1903.
|
[24] |
ZHANG T , ZHAO K , YANG M ,et al. Research on privacy security risk assessment method of mobile commerce based on information entropy and markov[J]. Wireless Communications and Mobile Computing, 2020,2: 1-11.
|
[25] |
马蓉, 陈秀华, 刘慧 ,等. 移动群智感知中用户隐私度量与隐私保护研究[J]. 信息网络安全, 2018,18(8): 64-72.
|
|
MA R , CHEN X H , LIU H ,et al. Research on user privacy measurement and privacy protection in mobile crowdsensing[J]. Netinfo Security, 2018,18(8): 64-72.
|
[26] |
WANG Y , LIU J . An attribtue-based statistic model for privacy impact assessment[C]// Proceedings of the 2016 International Conference on Collaboration Technologies and Systems (CTS). 2016: 619-621.
|
[27] |
LIU R , CAO J , VANSYCKEL S ,et al. PriMe:human-centric privacy measurement based on user preferences towards data sharing in mobile participatory sensing systems[C]// Proceedings of the 2016 IEEE International Conference on Pervasive Computing and Communications (PerCom). 2016: 1-8.
|
[28] |
YAMAOKA Y , ITOH K . K-presence-secrecy:practical privacy model as extension of k-anonymity[J]. IEICE Transactions on Information and Systems, 2017,100(4): 730-740.
|
[29] |
GKOUNTOUNA O , TERROVITIS M . Anonymizing collections of tree-structured data[J]. IEEE Transactions on Knowledge and Data Engineering, 2015,27(8): 2034-2048.
|
[30] |
LI X Y , ZHANG C , JUNG T ,et al. Graph-based privacy-preserving data publication[C]// Proceedings of the 35th Annual IEEE International Conference on Computer Communications. 2016: 1-9.
|
[31] |
ZHANG X , GUI X , TIAN F ,et al. Privacy quantification model based on the Bayes conditional risk in location-based services[J]. Tsinghua Science and Technology, 2014,19(5): 452-462.
|
[32] |
HAN X , TIAN D , DUAN X ,et al. Optimized anonymity updating in VANET based on information and privacy joint metrics[C]// Proceedings of the 8th ACM Symposium on Design and Analysis of Intelligent Vehicular Networks and Applications. 2018: 63-69.
|
[33] |
TESFAY W B , SERNA-OLVERA J , . Towards user-centered privacy risk detection and quantification framework[C]// Proceedings of the International Conference on New Technologies,Mobility and Security (NTMS). 2016: 1-5.
|
[34] |
晏燕, 郝晓弘, 王万军 . 一种隐私保护度量的集对分析方法[J]. 武汉大学学报(工学版), 2015,48(6): 883-890.
|
|
YAO Y , HAO X H , WANG W J . A set pair analysis method for privacy metric[J]. Engineering Journal of Wuhan University, 2015,48(6): 883-890.
|
[35] |
HUANG W Q , XIA J F , YU M ,et al. Personal privacy metric based on public social network data[J]. JPhCS, 2018,1087(3): 032007.
|
[36] |
HE W , ZENG Y , LI G . A novel structural reliability analysis method via improved maximum entropy method based on nonlinear mapping and sparse grid numerical integration[J]. Mechanical Systems and Signal Processing, 2019,133: 106247.
|
[37] |
HASSAN M U , REHMANI M H , CHEN J . Differential privacy techniques for cyber physical systems:a survey[J]. IEEE Communications Surveys & Tutorials, 2019,22(1): 746-789.
|
[38] |
HE J , CAI L , GUAN X . Differential private noise adding mechanism and its application on consensus algorithm[J]. IEEE Transactions on Signal Processing, 2020,68: 4069-4082.
|