IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications 2016
DOI: 10.1109/infocom.2016.7524588
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-preserving crowdsourced spectrum sensing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
17
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 75 publications
(17 citation statements)
references
References 26 publications
0
17
0
Order By: Relevance
“…The work in [45], [46] has studied the privacy preserving data publishing and aggregation problems in mobile crowdsourcing, but without considering the incentivization problem. The excellent studies in [35], [47] have proposed some novel approaches to protect the location privacy of the users, using the tools of differential privacy or k-anonymity. Two closest studies to ours are [8] and [18], where some ingenious auction mechanisms are proposed to protect the bidding privacy of the users in mobile crowdsourcing.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The work in [45], [46] has studied the privacy preserving data publishing and aggregation problems in mobile crowdsourcing, but without considering the incentivization problem. The excellent studies in [35], [47] have proposed some novel approaches to protect the location privacy of the users, using the tools of differential privacy or k-anonymity. Two closest studies to ours are [8] and [18], where some ingenious auction mechanisms are proposed to protect the bidding privacy of the users in mobile crowdsourcing.…”
Section: Related Workmentioning
confidence: 99%
“…Fortunately, in such cases, we can often get the distribution knowledge and hence the expected value of the number of participants. For example, the historical mobility traces of the users could be used to estimate the number of users appeared in the Points of Interests (PoI) of mobile crowdsourcing applications [9], [35].…”
mentioning
confidence: 99%
“…It originally comes from the database discipline and has been applied in many other related areas [4], [36], [37]. In what follows, we first introduce the definition of -differential privacy and its properties.…”
Section: Preliminaries On Differential Privacymentioning
confidence: 99%
“…Recently, the privacy protection in MCS has attracted high attention in numerous researchers [18]- [21]. Wang et al [18] utilize the k-anonymity to reduce the risk of location-privacy disclosure for crowd sensing users.…”
Section: Introductionmentioning
confidence: 99%
“…Zhang et al [20] design an incentive mechanism to maximize the fusion center's aggregation accuracy by quantizing crowd sensing users' privacy preserving levels and characterizing their impacts on the aggregation accuracy. Paper [21] focuses on the location privacy in the crowdsourced spectrum sensing scenario and presents a novel framework, consisting of two different schemes under distinct design objectives and assumptions, for a service provider to select participants in a differentially privacy-preserving manner. Above related works focus on protecting a participant's privacy only from either other crowd sensing users or the service requestor, whereas an integrated and more reliable privacy preservation mechanism considering potential attacks from both mobile users and the requestor should also be studied.…”
Section: Introductionmentioning
confidence: 99%