2017
DOI: 10.1109/jiot.2017.2679483
|View full text |Cite
|
Sign up to set email alerts
|

Follow But No Track: Privacy Preserved Profile Publishing in Cyber-Physical Social Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
60
0

Year Published

2017
2017
2019
2019

Publication Types

Select...
5
4

Relationship

1
8

Authors

Journals

citations
Cited by 131 publications
(60 citation statements)
references
References 25 publications
0
60
0
Order By: Relevance
“…For example, whether two individuals in a social network have a close relationship may be expected to be kept a secret. Therefore, privacy concerns have been raised in increasingly emerging technologies [2][3][4][5][6][7][8][9].…”
Section: Introductionmentioning
confidence: 99%
“…For example, whether two individuals in a social network have a close relationship may be expected to be kept a secret. Therefore, privacy concerns have been raised in increasingly emerging technologies [2][3][4][5][6][7][8][9].…”
Section: Introductionmentioning
confidence: 99%
“…(3) is the LSSS matrix, initialized to null; () is the function that maps the rows of to attributes. (4) BooleanFormula2LSSS(root( ),V, , , ()); (5) function (BooleanFormula2LSSS ( , V, , , ())) (6) if is an AND gate then (7) pad V with 0's (if necessary) to make its length = ; (8) label the left child with the vector V ‖ 1, where ‖ means concatenation; (9) label the right child with the vector (0, . .…”
Section: Resultsmentioning
confidence: 99%
“…However, despite the attractive features provided by smart grid technologies, challenges, especially those in cyber security and privacy [5], are still present. For example, it has been reported that the pervasively adopted integrated Supervisory Control and Data 2 Wireless Communications and Mobile Computing Acquisition (SCADA)/Energy Management systems [6] are vulnerable to significant security threats [7][8][9][10].…”
Section: Introductionmentioning
confidence: 99%
“…e following sections describe how IoT handles personal information specifically, but this chapter explains the rough privacy issues occurred in IoT environment. Due to the close correlation between personal physical characteristics and status, the adoption of cyberphysical-social systems (CPSSs) has inevitably been challenged by users' privacy concerns [13]. e first step is about collecting data.…”
Section: Iot Privacy Issuesmentioning
confidence: 99%