[1] |
赵亚军, 郁光辉, 徐汉青 . 6G移动通信网络:愿景、挑战与关键技术[J]. 中国科学:信息科学, 2019,49(8): 963-987.
|
|
ZHAO Y J , YU G H , XU H Q . 6G mobile communication networks:vision,challenges,and key technologies[J]. Scientia Sinica(Informationis), 2019,49(8): 963-987.
|
[2] |
张平, 牛凯, 田辉 ,等. 6G 移动通信技术展望[J]. 通信学报, 2019,40(1): 141-148.
|
|
ZHANG P , NIU K , TIAN H ,et al. Technology prospect of 6G mobile communications[J]. Journal on Communications, 2019,40(1): 141-148.
|
[3] |
尹博南, 艾元, 彭木根 . 雾无线接入网:架构、原理和挑战[J]. 电信科学, 2016,32(6): 20-27.
|
|
YIN B N , AI Y , PENG M G . Fog computing based radio access networks:architecture,principles and challenges[J]. Telecommunications Science, 2016,32(6): 20-27.
|
[4] |
PENG M , ZHANG K . Recent advances in fog radio access networks:performance analysis and radio resource allocation[J]. IEEE Access, 2016,4: 5003-5009.
|
[5] |
刘铎, 杨涓, 谭玉娟 . 边缘存储的发展现状与挑战[J]. 中兴通讯技术, 2019,25(3): 15-22.
|
|
LIU D , YANG J , TAN Y J . A survey on the storage issues in edge computing[J]. ZTE Technology Journal, 2019,25(3): 15-22.
|
[6] |
WANG B , LI B , LI H . Oruta:privacy-preserving public auditing for shared data in the cloud[J]. IEEE Transactions on Cloud Computing, 2014,2(1): 43-56.
|
[7] |
唐春明, 郑晓龙 . 云计算中一种对大群组用户的隐私保护公共审计方案[J]. 信息网络安全, 2015(2): 19-25.
|
|
TANG C M , ZHENG X L . A privacy-preserving public auditing mechanism for the date with large groups users in the cloud computing[J]. Netinfo Security, 2015(2): 19-25.
|
[8] |
TRUEMAN T E , NARAYANASAMY P . Ensuring privacy and data freshness for public auditing of shared data in cloud[C]// IEEE International Conference on Cloud Computing in Emerging Markets. Piscataway:IEEE Press, 2016: 22-27.
|
[9] |
LI J , ZHANG L , LIU J K ,et al. Privacy-preserving public auditing protocol for low-performance end devices in cloud[J]. IEEE Transactions on Information Forensics & Security, 2016,11(11): 2572-2583.
|
[10] |
SHEN W , QIN J , YU J ,et al. Enabling identity-based integrity auditing and data sharing with sensitive information hiding for secure cloud storage[J]. IEEE Transactions on Information Forensics and Security, 2018,14(2): 331-346.
|
[11] |
LIM H W , POH G S , XU J ,et al. PrivateLink:privacy-preserving integration and sharing of datasets[J]. IEEE Transactions on Information Forensics and Security, 2019,PP(99): 564-577.
|
[12] |
刘杨, 彭木根 . 6G 内生安全:体系结构与关键技术[J]. 电信科学, 2020,36(1): 11-20.
|
|
LIU Y , PENG M G . 6G endogenous security:architecture and key technologies[J]. Telecommunications Science, 2020,36(1): 11-20.
|
[13] |
叶青青, 孟小峰, 朱敏杰 ,等. 本地化差分隐私研究综述[J]. 软件学报, 2018,29(7): 1981-2005.
|
|
YE Q Q , MENG X F , ZHU M J ,et al. Survey on local differential privacy[J]. Journal of Software, 2018,29(7): 1981-2005.
|
[14] |
方俊斌, 蒋千越, 李爱平 . 本地化差分隐私在数据众包中的应用[J]. 信息技术与网络安全, 2018,37(6): 32-35,51
|
|
FANG J B , JIANG Q Y , LI A P . Local differential privacy applications in data crowdsourcing[J]. Information Technology and Network Security, 2018,37(6): 32-35,51
|
[15] |
ERLINGSSON L , PIHUR V , KOROLOVA A . RAPPOR:randomized aggregatable privacy-preserving ordinal response[C]// Proceedings of the ACM Conference on Computer and Communications Security. New York:ACM Press, 2014: 1054-1067.
|
[16] |
BRODER A , MITZENMACHER M . Network applications of bloom filters:a survey[J]. Internet Mathematics, 2004,1(4): 485-509.
|
[17] |
吕云翔 . 云计算与大数据技术[M]. 北京: 清华大学出版社, 2018.
|
|
LYU Y X . Cloud computing and big data technology[M]. Beijing: Tsinghua University Press, 2018.
|
[18] |
ROBERT T . Regression shrinkage and selection via the lasso:a retrospective[J]. Journal of the Royal Statistical Society:Series B (Statistical Methodology), 2011,73.
|
[19] |
BONEH D , DRIJVERS M , NEVEN G . Compact multi-signatures for smaller blockchains[R]. Palo Alto,CA:Stanford University, 2018.
|
[20] |
WANG Q , WANG C , REN K ,et al. Enabling public auditability and data dynamics for storage security in cloud computing[J]. IEEE Transactions on Parallel and Distributed Systems, 2011,22(5): 847-859.
|