期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
Evolutionary privacy-preserving learning strategies for edge-based IoT data sharing schemes 被引量:9
1
作者 Yizhou Shen Shigen Shen +3 位作者 Qi Li Haiping Zhou Zongda Wu youyang qu 《Digital Communications and Networks》 SCIE CSCD 2023年第4期906-919,共14页
The fast proliferation of edge devices for the Internet of Things(IoT)has led to massive volumes of data explosion.The generated data is collected and shared using edge-based IoT structures at a considerably high freq... The fast proliferation of edge devices for the Internet of Things(IoT)has led to massive volumes of data explosion.The generated data is collected and shared using edge-based IoT structures at a considerably high frequency.Thus,the data-sharing privacy exposure issue is increasingly intimidating when IoT devices make malicious requests for filching sensitive information from a cloud storage system through edge nodes.To address the identified issue,we present evolutionary privacy preservation learning strategies for an edge computing-based IoT data sharing scheme.In particular,we introduce evolutionary game theory and construct a payoff matrix to symbolize intercommunication between IoT devices and edge nodes,where IoT devices and edge nodes are two parties of the game.IoT devices may make malicious requests to achieve their goals of stealing privacy.Accordingly,edge nodes should deny malicious IoT device requests to prevent IoT data from being disclosed.They dynamically adjust their own strategies according to the opponent's strategy and finally maximize the payoffs.Built upon a developed application framework to illustrate the concrete data sharing architecture,a novel algorithm is proposed that can derive the optimal evolutionary learning strategy.Furthermore,we numerically simulate evolutionarily stable strategies,and the final results experimentally verify the correctness of the IoT data sharing privacy preservation scheme.Therefore,the proposed model can effectively defeat malicious invasion and protect sensitive information from leaking when IoT data is shared. 展开更多
关键词 Privacy preservation Internet of things Evolutionary game Data sharing Edge computing
下载PDF
Expression Preserved Face Privacy Protection Based on Multi-mode Discriminant Analysis
2
作者 Xiang Wang Chen Xiong +1 位作者 Qingqi Pei youyang qu 《Computers, Materials & Continua》 SCIE EI 2018年第10期107-121,共15页
Most visual privacy protection methods only hide the identity information of the face images,but the expression,behavior and some other information,which are of great significant in the live broadcast and other scenar... Most visual privacy protection methods only hide the identity information of the face images,but the expression,behavior and some other information,which are of great significant in the live broadcast and other scenarios,are also destroyed by the privacy protection process.To this end,this paper introduces a method to remove the identity information while preserving the expression information by performing multi-mode discriminant analysis on the images normalized with AAM algorithm.The face images are decomposed into mutually orthogonal subspaces corresponding to face attributes such as gender,race and expression,each of which owns related characteristic parameters.Then,the expression parameter is preserves to keep the facial expression information while others parameters,including gender and race,are modified to protect face privacy.The experiments show that this method yields well performance on both data utility and privacy protection. 展开更多
关键词 Privacy protection MULTI-MODE DISCRIMINATION expression-preserving
下载PDF
Improving Data Utility Through Game Theory in Personalized Differential Privacy 被引量:2
3
作者 Lei Cui youyang qu +3 位作者 Mohammad Reza Nosouhi Shui Yu Jian-Wei Niu Gang Xie 《Journal of Computer Science & Technology》 SCIE EI CSCD 2019年第2期272-286,共15页
Due to dramatically increasing information published in social networks,privacy issues have given rise to public concerns.Although the presence of differential privacy provides privacy protection with theoretical foun... Due to dramatically increasing information published in social networks,privacy issues have given rise to public concerns.Although the presence of differential privacy provides privacy protection with theoretical foundations,the trade-off between privacy and data utility still demands further improvement.However,most existing studies do not consider the quantitative impact of the adversary when measuring data utility.In this paper,we firstly propose a personalized differential privacy method based on social distance.Then,we analyze the maximum data utility when users and adversaries are blind to the strategy sets of each other.We formalize all the payoff functions in the differential privacy sense,which is followed by the establishment of a static Bayesian game.The trade-off is calculated by deriving the Bayesian Nash equilibrium with a modified reinforcement learning algorithm.The proposed method achieves fast convergence by reducing the cardinality from n to 2.In addition,the in-place trade-off can maximize the user's data utility if the action sets of the user and the adversary are public while the strategy sets are unrevealed.Our extensive experiments on the real-world dataset prove the proposed model is effective and feasible. 展开更多
关键词 PERSONALIZED PRIVACY PROTECTION GAME theory trade-off REINFORCEMENT learning
原文传递
Towards Privacy-Aware and Trustworthy Data Sharing Using Blockchain for Edge Intelligence
4
作者 youyang qu Lichuan Ma +4 位作者 Wenjie Ye Xuemeng Zhai Shui Yu Yunfeng Li David Smith 《Big Data Mining and Analytics》 EI CSCD 2023年第4期443-464,共22页
The popularization of intelligent healthcare devices and big data analytics significantly boosts the development of Smart Healthcare Networks(SHNs).To enhance the precision of diagnosis,different participants in SHNs ... The popularization of intelligent healthcare devices and big data analytics significantly boosts the development of Smart Healthcare Networks(SHNs).To enhance the precision of diagnosis,different participants in SHNs share health data that contain sensitive information.Therefore,the data exchange process raises privacy concerns,especially when the integration of health data from multiple sources(linkage attack)results in further leakage.Linkage attack is a type of dominant attack in the privacy domain,which can leverage various data sources for private data mining.Furthermore,adversaries launch poisoning attacks to falsify the health data,which leads to misdiagnosing or even physical damage.To protect private health data,we propose a personalized differential privacy model based on the trust levels among users.The trust is evaluated by a defined community density,while the corresponding privacy protection level is mapped to controllable randomized noise constrained by differential privacy.To avoid linkage attacks in personalized differential privacy,we design a noise correlation decoupling mechanism using a Markov stochastic process.In addition,we build the community model on a blockchain,which can mitigate the risk of poisoning attacks during differentially private data transmission over SHNs.Extensive experiments and analysis on real-world datasets have testified the proposed model,and achieved better performance compared with existing research from perspectives of privacy protection and effectiveness. 展开更多
关键词 edge intelligence blockchain personalized privacy preservation differential privacy Smart Healthcare Networks(SHNs)
原文传递
Call for Papers Special Issue on Privacy-Preserving Data Mining for Artificial Intelligence of Things
5
作者 youyang qu Pierangela Samarati +1 位作者 Abderrahim BENSLIMANE Shui Yu 《Big Data Mining and Analytics》 EI 2022年第1期80-80,共1页
Artificial Intelligence of Things(AIoT)is experiencing unimaginable fast booming with the popularization of end devices and advanced machine learning and data processing techniques.An increasing volume of data is bein... Artificial Intelligence of Things(AIoT)is experiencing unimaginable fast booming with the popularization of end devices and advanced machine learning and data processing techniques.An increasing volume of data is being collected every single second to enable Artificial Intelligence(AI)on the Internet of Things(IoT).The explosion of data brings significant benefits to various intelligent industries to provide predictive services and research institutes to advance human knowledge in data-intensive fields.To make the best use of the collected data,various data mining techniques have been deployed to extract data patterns.In classic scenarios,the data collected from IoT devices is directly sent to cloud servers for processing using diverse methods such as training machine learning models. 展开更多
关键词 IOT THINGS SERVICES
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部