2021
DOI: 10.1016/j.comnet.2020.107743
|View full text |Cite
|
Sign up to set email alerts
|

Deep learning for privacy preservation in autonomous moving platforms enhanced 5G heterogeneous networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
15
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
2
2

Relationship

1
7

Authors

Journals

citations
Cited by 37 publications
(15 citation statements)
references
References 154 publications
(164 reference statements)
0
15
0
Order By: Relevance
“…In particular, this study collects the Energy Information Administration (EIA) energy disturbance events (containing outages) occurred from January 2011 to December 2013 among 26,304 data samples 14 as well as weather measurement data according to historical observations 15 at the same period and weather stations at the same region. Moreover, the work [113] presents a labeled energy-consumption dataset from 500 energy customers in Ireland 16 though the labelled dataset is not officially released (available upon request to the authors).…”
Section: B Contextualmentioning
confidence: 99%
See 2 more Smart Citations
“…In particular, this study collects the Energy Information Administration (EIA) energy disturbance events (containing outages) occurred from January 2011 to December 2013 among 26,304 data samples 14 as well as weather measurement data according to historical observations 15 at the same period and weather stations at the same region. Moreover, the work [113] presents a labeled energy-consumption dataset from 500 energy customers in Ireland 16 though the labelled dataset is not officially released (available upon request to the authors).…”
Section: B Contextualmentioning
confidence: 99%
“…Anomaly detection is of paramount importance in IIoT [10]- [15]. On the one hand, traditional isolated industry systems are now exposed to the public access due to the introduction of IIoT [16]- [19]. The sensors, instruments, and other IoT devices that were originally designed with little security mechanisms can be easily compromised by malicious users like attackers [4], [16], [20].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…There have been many surveys into privacy concerns and preservation technologies in different technologies: 6G IoT networks [240], 6G AI-enabled applications [6], autonomous driving [241], big data and cloud [242]. The techniques all meet common goals: (1) reduce identity linkage in data collection; (2) increase secure data storage; and (3) control over data sharing and use.…”
Section: B State-of-the-art Privacy Preservation Techniques and Visio...mentioning
confidence: 99%
“…W ITH the rapid development of Industrial 4.0, a distributed Internet of Things (IoT) system is becoming a dominant architecture in industrial IoT, which enables elastic interconnection of automation and data analytics across IoT networks [1], [2]. However, security in distributed IoT devices is highly threatened by malicious intruders.…”
Section: Introductionmentioning
confidence: 99%