2016
DOI: 10.1109/tifs.2016.2515050
|View full text |Cite
|
Sign up to set email alerts
|

A Dummy-Based Approach for Preserving Source Rate Privacy

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(7 citation statements)
references
References 20 publications
0
7
0
Order By: Relevance
“…Dummy-based method is also a mechanism for protecting location privacy which was used in many Fig. 4 Example of the negative survey in protecting the location privacy [16] researches [19][20][21]. This approach has been proposed by Kido et al [21].…”
Section: Dummy-based Methodmentioning
confidence: 99%
See 1 more Smart Citation
“…Dummy-based method is also a mechanism for protecting location privacy which was used in many Fig. 4 Example of the negative survey in protecting the location privacy [16] researches [19][20][21]. This approach has been proposed by Kido et al [21].…”
Section: Dummy-based Methodmentioning
confidence: 99%
“…Dummy‐based method is also a mechanism for protecting location privacy which was used in many researches [19–21]. This approach has been proposed by Kido et al .…”
Section: Introductionmentioning
confidence: 99%
“…Maximum transmission unit (MTU) padding, for example, is a well-known mutation technique that consists of padding all the flow packets to the maximum payload size MTU [19]. Random padding is another technique that consists of randomly padding the packets [41].…”
Section: Literaturementioning
confidence: 99%
“…Augmented dummy data bears redundancy, requires extra bandwidth and buffer, and consumes more energy. Diyanat et al [175] minimally augment dummy data to preserve the (original) data privacy of a client without changing the statistical behavior of the original data, such as distribution. They minimize the weighted sum of augmented dummy communication cost and privacy degree.…”
Section: A Privacy Of Agentmentioning
confidence: 99%
“…Therefore, they require extra bandwidth and buffer, and consume more energy. As a result, it is critical to strike a balance between augmented dummy communication cost and privacy degree [175]. Encoding encrypts the collective features of data and sends the features to the server, rather than the raw data [176].…”
Section: Lessons Learned and Open Issues A Lessons Learnedmentioning
confidence: 99%