2022
DOI: 10.1109/jsyst.2021.3099103
|View full text |Cite
|
Sign up to set email alerts
|

RPPTD: Robust Privacy-Preserving Truth Discovery Scheme

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 28 publications
(11 citation statements)
references
References 27 publications
0
11
0
Order By: Relevance
“…On the other hand, attackers who violate user privacy data are usually service providers themselves or other relevant individual users, which makes it difficult for attackers to identify. Since the founding of the People's Republic of China in 1987, China has been making continuous efforts to establish and improve legal protection policies for various rights, including actively building a judicial protection system for individual privacy [13][14][15][16]. However, the legal protection of minors' privacy rights is still in the initial stage of development.…”
Section: Introductionmentioning
confidence: 99%
“…On the other hand, attackers who violate user privacy data are usually service providers themselves or other relevant individual users, which makes it difficult for attackers to identify. Since the founding of the People's Republic of China in 1987, China has been making continuous efforts to establish and improve legal protection policies for various rights, including actively building a judicial protection system for individual privacy [13][14][15][16]. However, the legal protection of minors' privacy rights is still in the initial stage of development.…”
Section: Introductionmentioning
confidence: 99%
“…However, this technology poses severe security and privacy concerns. 98 Because IoT tools contain restricted resources, typical security measures are impracticable. As a result, a small IDS is needed.…”
Section: Discussionmentioning
confidence: 99%
“…where CD indicates critical distance of appliances, t 1 , t i represents distance between first and end transmission appliance, and δ i denotes total life period of appliances. e second minimization objective is framed using critical distance measurement by considering a reference potential point at the beginning of SCADA connections [21][22][23]. In addition to variations in critical distance measurements, the schedule period of storage for all appliances provides great advantage in the entire process as storage points can be shifted from one end to the other.…”
Section: Scada For Industrial Applications: An Analytical Modelmentioning
confidence: 99%