Reverse auction-based incentive mechanisms have been commonly proposed to stimulate mobile users to participate in crowdsensing, where users submit bids to the platform to compete for tasks. Recent works pointed out t...
详细信息
Reverse auction-based incentive mechanisms have been commonly proposed to stimulate mobile users to participate in crowdsensing, where users submit bids to the platform to compete for tasks. Recent works pointed out that bid is a private information which can reveal sensitive information of users (e.g., location privacy), and proposed bid-preserving mechanisms with differential privacy against inference attack. However, all these mechanisms rely on a trusted platform, and would fail in bid protection completely when the platform is untrusted (e.g., honest-but-curious). In this paper, we focus on the bid protection problem in mobile crowdsensing with an untrusted platform, and propose a novel privacy-preserving incentive mechanism to protect users' true bids against the honest-but-curious platform while minimizing the social cost of winner selection. To this end, instead of uploading the true bid to the platform, a differentially private bid obfuscation function is designed with the exponential mechanism, which helps each user to obfuscate bids locally and submit obfuscated task-bid pairs to the platform. The winner selection problem with the obfuscated task-bid pairs is formulated as an integer linear programming problem and proved to be NP-hard. We consider the optimization problem at two different scenarios, and propose a solution based on Hungarian method for single measurement and a greedy solution for multiple measurements, respectively. The proposed incentive mechanism is proved to satisfy ε-differential privacy, individual rationality and γ-truthfulness. The extensive experiments on a real-world data set demonstrate the effectiveness of the proposed mechanism against the untrusted platform.
In commercial buildings, about 40%-50% of the total electricity consumption is attributed to Heating, Ventilation, and Air Conditioning (HVAC) systems, which places an economic burden on building operators. In this pa...
详细信息
Large-scale general search engines have been unable to meet the needs of 'specialized, sophisticated and deep' information in the field of mineral intelligence services. Vertical search engines have emerged at...
Large-scale general search engines have been unable to meet the needs of 'specialized, sophisticated and deep' information in the field of mineral intelligence services. Vertical search engines have emerged at the historic moment, and the focused crawler is the key technology to achieve vertical search engines. This paper proposes a hybrid topic strategy based on text content and web link structure for the characteristics of mineral information field. In order to improve the topic relevance determination ability of the focused crawler, this article introduces HowNet and the word embedding technology in the field of natural language processing, and combines them to carry out the text-based topic relevance determination; at the same time, it also introduces the HITS algorithm based on the link structure of web pages. The topic strategy based on text content is organically combined with the topic strategy based on the webpage link structure to realize the recognition and prediction of the webpage topic. Simulation experiment results show that the method proposed in this paper can achieve a high recall rate and precision rate for the acquisition of mineral intelligence information on the Internet.
Access control is important to protect the network *** increasing demand for secure interactions between network domains brings in new challenges to access control *** this paper we design an access control model whic...
详细信息
ISBN:
(纸本)9781509065769;9781509065752
Access control is important to protect the network *** increasing demand for secure interactions between network domains brings in new challenges to access control *** this paper we design an access control model which provides a multilevel mapping method between hierarchical access control structures for achieving multilevel security protection in multi-domain networking *** access control structures ensure rigorous multilevel security in intra *** the mapping method based on quantized subject attributes is proposed to determine the subject's security level in its target *** is used in the model to adjust the mapping value in order to achieve flexible multilevel inter-domain access *** results we obtained from simulations are also reported in this paper to verify the effectiveness of the proposed access control model.
We present a high-speed balanced homodyne detector whose bandwidth is above 900 MHz and quantum to classical noise ratio reaches 12 dB respectively, which could be applied to the high-speed continuous variable quantum...
详细信息
The orthogonalized integer representation was independently proposed by Ding et al. using genetic algorithm and Fukase et al. using sampling technique to solve shortest vector problem(SVP). Their results are promising...
详细信息
The orthogonalized integer representation was independently proposed by Ding et al. using genetic algorithm and Fukase et al. using sampling technique to solve shortest vector problem(SVP). Their results are promising. In this paper, we consider sparse orthogonalized integer representations for shortest vectors and propose a new enumeration method, called orthognalized enumeration, by integrating such a representation. Furthermore, we present a mixed BKZ method, called MBKZ, by alternately applying orthognalized enumeration and other existing enumeration methods. Compared to the existing ones, our methods have greater efficiency and achieve exponential speedups both in theory and in practice for solving SVP. Implementations of our algorithms have been tested to be effective in solving challenging lattice problems.
The following topics are dealt with: learning (artificial intelligence); security of data; Internet; feature extraction; Internet of Things; pattern classification; mobile computing; data privacy; cloud computing; soc...
详细信息
ISBN:
(纸本)9781538675199
The following topics are dealt with: learning (artificial intelligence); security of data; Internet; feature extraction; Internet of Things; pattern classification; mobile computing; data privacy; cloud computing; social networking (online).
Photo sharing on Online Social networks (OSNs) has become one of the most popular social activities in our daily life. However, some associated friends or bystanders in the photos may not want to be viewed due to priv...
详细信息
Photo sharing on Online Social networks (OSNs) has become one of the most popular social activities in our daily life. However, some associated friends or bystanders in the photos may not want to be viewed due to privacy concerns. In this paper, we propose the design, implementation and evaluation of HideMe, a framework to preserve the associated users' privacy for online photo sharing. HideMe acts as a plugin to existing photo sharing OSNs, and it enables the following: a) extraction of factors when users upload their photos, b) associated friends in the uploaded photos are able to set their own privacy policies based on scenarios, instead of a photo-by-photo setting, c) any user in other friend's uploaded photos could be hidden away from unwanted viewers based on one time policy generation. We also design a distance-based algorithm to identify and protect the privacy of bystanders. Moreover, HideMe not only protects users' privacy but also reduces the system overhead by a carefully designed face matching algorithm. We have implemented a prototype of HideMe, and evaluation results have demonstrated its effectiveness and efficiency.
This paper proposes a global optimization method for it ensures finding good solutions while solving the unit commitment (UC) problem with carbon emission trading (CET). This method consists of two parts. In the first...
详细信息
In 2013,NSA published the specifications of two lightweight block cipher families SIMON and SPECK [1].Since the SIMON family was announced,it has attracted a lot of attention of the *** this article,we use the existin...
In 2013,NSA published the specifications of two lightweight block cipher families SIMON and SPECK [1].Since the SIMON family was announced,it has attracted a lot of attention of the *** this article,we use the existing differential characteristics given in [2-5] to analyze the reduced SIMON ***,we extend the characteristics backward and forward for several rounds and get the full differential path we *** to Wang et al.'s method in [6],we deduce the sufficient bit conditions corresponding to the differential *** find that the bit conditions can be divided into two *** conditions of the first type only depend on plain-texts or ciphertexts,which can be fulfilled by selecting the conforming plaintexts,ciphertexts and building the data structures.
暂无评论