Literature DB >> 29385056

Node Location Privacy Protection Based on Differentially Private Grids in Industrial Wireless Sensor Networks.

Jun Wang1, Rongbo Zhu2, Shubo Liu3, Zhaohui Cai4.   

Abstract

Wireless sensor networks (WSNs) are widely applied in industrial application with the rapid development of Industry 4.0. Combining with centralized cloud platform, the enormous computational power is provided for data analysis, such as strategy control and policy making. However, the data analysis and mining will bring the issue of privacy leakage since sensors will collect varieties of data including sensitive location information of monitored objects. Differential privacy is a novel technique that can prevent compromising single record benefits. Geospatial data can be indexed by a tree structure; however, existing differentially private release methods pay no attention to the concrete analysis about the partition granularity of data domains. Based on the overall analysis of noise error and non-uniformity error, this paper proposes a data domain partitioning model, which is more accurate to choose the grid size. A uniform grid release method is put forward based on this model. In order to further reduce the errors, similar cells are merged, and then noise is added into the merged cells. Results show that our method significantly improves the query accuracy compared with other existing methods.

Entities:  

Keywords:  differential privacy; industrial wireless sensor networks; location; privacy guarantee

Year:  2018        PMID: 29385056      PMCID: PMC5856137          DOI: 10.3390/s18020410

Source DB:  PubMed          Journal:  Sensors (Basel)        ISSN: 1424-8220            Impact factor:   3.576


1. Introduction

Recent years have witnessed the rapid development of the industrial wireless sensor networks (IWSNs), which have been introduced into the industry area to meet requirements of higher flexibility and market share, and IWSNs are becoming the key and fundamental technology of Industry 4.0 [1]. In the industrial domain, mobile nodes are used in industrial systems incrementally [2]. Radio modules or wireless nodes have been installed on mobile devices to raise mobility and flexibility which are ignored in traditional WSNs [3]. IWSNs generally contain more moving nodes, such as mobile products, workers and other mobile devices [4]. The centralized cloud platform collects sensor data to provide strategy control and policy making. However, the data analysis and mining will bring the issue of privacy leakage since a semi-credible cloud server is curious about sensitive location information of monitored objects [5]. To address this problem, a novel privacy protection technique called differential privacy [6] has been introduced to location privacy preservation. The Location information is called geospatial data [7]. For example, as shown in Figure 1, the location information of nodes will be collected and uploaded to the cloud. The release of static geospatial data brings great convenience to scientific research. The work in [8] indicates that it is possible to use geospatial information to forecast the spread of an infectious disease. However, data analysis also has the risk of privacy leaks. For instance, De Montjoye demonstrated that only simple date and location information of four shopping records can recognize more than 90% individuals in dataset [9]. The raw data must be sanitized before release for data analysis and mining [10].
Figure 1

Illustration of node location data aggregation.

Compared with wired networks, IWSNs have a higher possibility of privacy leaks when they integrate with cloud computing and big data technologies. Consequently, effective privacy-preserving technologies are needed in IWSNs. The work in [11] analyses existing privacy protection approaches in WSNs from data and sensor [12,13], and it investigates the approaches, such as anonymization [14], supported in large-scale industrial environments. The widespread use of geospatial data should be coupled with greater security [15], such as security controllability and strictly provable security [16]. Traditional methods based on anonymity model have risks of privacy disclosure [17,18,19]. Differential privacy is a relatively novel concept [20,21] and can hide any single record in the output by perturbing the data, which makes an adversary fail to infer the presence of a record with high probability [22,23]. How to balance between data quality and privacy level is a key problem for research [24]. In order to improve the utility of released geospatial data, a number of data decomposition methods based on tree structure were proposed [25]. In [26,27,28,29], a domain partition scheme based on quadtree or kd-tree is proposed to enhance the utility of released data. However, these works have not analyzed optimal partition granularity of data domains, so how to choose the appropriate tree depth or partition granularity is the key point for data decomposition strategy. To the best of our knowledge, the work in [7] first uses a granularity partitioning scheme to create differentially private geospatial data. It assumes that the shape of query is square and the non-uniformity error is proportional to the number of location points in the cells, which fall on the border of the query shape [7]. However, the shape of data query perhaps is rectangle in actuality, i.e., the length is not equal with the width of query. Meanwhile, the larger the intersection between the border of query rectangle and cells gets, the bigger the non-uniformity error becomes. Inspired by this, we point out that the non-uniformity error is proportional to the intersection area between the border of query rectangle and cells, and a novel granularity partitioning model of data domain based on the global analysis of noise error and non-uniformity error is proposed. A bucket sort based cells merging strategy is adopted to enhance the utility of released data further, and it merges all of the similar cells contained in the data domain and differs from the scheme in [29], which just aggregates the four sub nodes of quadtree. The contributions of this paper are as follows: We propose a novel granularity partitioning model of data domain, which is effective to balance the noise error and the non-uniformity error. The partition granularity is proportional to the area of data domain, privacy budget and coefficient k. We adopt a cells merging strategy based on bucket sort, which groups all the similar cells of data domain into a partition, in order to decrease the noise added to each cell. This merging strategy further raises the accuracy of query. We conduct evaluations using two real-world datasets to verify the effectiveness of the granularity partitioning model and the similar cells merging strategy, and results show that the proposed approach has better query accuracy and enhances the utility of released data. The rest of this paper is organized as follows: Section 2 introduces the related work about differentially private data release, including privacy spatial decomposition (PSD) method and differentially private grids approach; Section 3 provides the preliminaries on differential privacy and problem definition; Section 4 presents the granularity partitioning model and the corresponding data release approaches; Experimental results and analysis are presented in Section 5; The conclusions and future work are finally presented in Section 6.

2. Related Work

The work in [30] studies the network isolation problem in group-based IWSNs, and Ref. [31] researches the dangerous area of toxic gases with WSNs. These works mostly focused on the effectiveness of network and the safety of application. As cloud and communication technologies (such as 5G and Internet) are integrated into IWSNs, more private data and information are produced. Researchers and experts are facing the serious problem of how to mine useful information from perturbed data, so data validity and privacy should be considered deeply. In order to enhance the utility of perturbed data, PSD based on tree structure is adopted [26]. The PSD divides the geospatial dataset into independent cells via horizontal and vertical lines, and gets the number of points in each cell. There are two types of error in query: one is noise error introduced by perturbation, and another is non-uniformity error generated by assuming that the location points are distributed uniformly. These two errors both affect the accuracy of query results and depend on the partition granularity m. The finer value of m implies a fewer non-uniformity error. Based on the kd-tree structure, Xiao et al. [27,28] allocated half of the privacy budget to the raw data and constructed the kd-tree by using the sanitized data to guarantee user privacy. However, it leads to a relatively larger error [26]. Cormode et al. [26] proposed a quadtree based method Quad-opt to enhance the utility, which is called Qopt for short in this paper. Qopt splits the data domain into a complete quadtree with a predefined tree depth. Firstly, data space is divided into equal quadrants. Then, the subspace is further split into four equal pieces until tree depth reaches the predefined value h. Different from the existing uniform budgeting strategy, Cormode et al. proposed a novel geometric budgeting strategy, which allocates for each level of the quadtree (). Notably, proportional factor is  and constrained inference [32] is employed to post-process the output of query with the purpose of higher utility. However, directly adding noise into each cell will result in a larger error when the data is sparse. Fan et al. [29] proposed to aggregate similar cells into a partition to overcome the data sparsity issue. First, each cell is pre-classified by domain knowledge, i.e., the cell is sparse or dense type. Next, a node is split into four equal quadrants until the predefined depth value h is reached or the node is homogeneous, i.e., all the cells within the node belong to the same type. This method needs to pre-classify the type of cells relying on the specialized knowledge, which may lead to misjudgment. Meanwhile, merging of cells just restricts in quadtree node and fails to extend to the entire data domain. For all above methods based on PSD, the utility of perturbed data is related to tree depth h or partition granularity m, so how to choose the right value of h or m is the key point. Qardaji et al. [7] proposed a granularity partitioning model of data domain to solve this problem and presented a uniform method UG based on this model. The partition granularity is , where N is the number of data points in cell, c is a small constant (generally c = 10), and is the privacy budget. Qardaji et al. further proposed an adaptive grid method AG. It splits the data domain into independent cells, where . The cell will be further divided into independent cells if the noisy count of the cell is bigger than the given threshold value, where , and is a parameter determined by user. To et al. [33] adopted the AG method to solve the spatial crowdsourcing specific requirements, and they modified the parameter c to decrease the system overhead, which is just beyond our research. Note that literature [7] assumes that the length and width of query rectangle are equal to each other, which may affect the utility of perturbed data. In this paper, the proposed method Ugrid adopts a novel granularity partitioning model of data domain. There is no need to assume that the length and width of query rectangle are equal to each other, and the partition granularity is , where k is the proportionality coefficient, H and L are the width and length of data domain, respectively, and is the privacy budget. We further introduce a merging grids release approach, which groups all of the similar cells into a partition and adds Laplace noise to each partition. The aggregation of the similar cells has improved the accuracy of data query.

3. Preliminaries

In this section, we formally introduce the basic concept of differential privacy and present the problem definition.

3.1. Differential Privacy

The formalized definition of differential privacy is as follows. Differential privacy [ The parameter is called privacy budget, which is used to control the ratio of output of algorithm A in neighboring datasets D and D’ [25]. Smaller yields a stronger privacy guarantee because the output probabilities of algorithm A in D and D’ are approximately the same, which makes the adversary fail to judge whether the tuple is present in the dataset or not. However, the smaller is, the lower the utility will be, as the adding noise is bigger. Detail of noise addition can be seen in the part of the Laplace mechanism. The value of is usually small, such as 0.1, 0.5, 1, etc. [25]. Differential privacy owns a significant composable property, which plays an important role in demonstrating whether an algorithm satisfies -differential privacy or not. Parallel composition [ Sequential composition [ Laplace mechanism is a differentially private implementation scheme, which masks the real data by adding random noise following Laplace distribution to the output. The value of noise is related to privacy budget and global sensitivity. Global sensitivity [ The parameter D and are neighboring datasets; R is the real space; d is the dimension; and  is the first-order norm distance [25]. For instance, the global sensitivity of count function is 1. Laplace mechanism [ The exponential mechanism addresses the non-numeric case in which adding noise makes no sense. It is another method to construct differentially private algorithm over any quality function . Exponential mechanism [ Let be a Laplace distribution, where location parameter , scale parameter is b, and its probability density function is . According to the function , the bigger b gets, the bigger perturbed noise becomes. If , let denotes standard deviation, denote variance, , , and ; then, , [25].

3.2. Problem Definition

Let L and H be the domain length and width of geospatial dataset D of monitored objects in IWSNs; a and b are the length and width of data query Q as shown in Figure 2. Splitting the data domain into cells , point count of cell is perturbed by random noise following Laplace distribution. Then, the perturbed differentially privacy dataset  is released.
Figure 2

Example of data query.

Let be the noise error introduced by the addition noise, and let be the non-uniformity error caused by the assumption of uniform distribution. As shown in Figure 2, there is an intersection between cells and query rectangle Q, and some cells are partly contained in it, such as cells filled with oblique lines. For these cells, we calculate the number of data points in the intersected part based on the uniformity assumption. For instance, let be the intersected part between cell and query Q, and let be the estimated count of data points in . Then, , where is the count of data points in , is the area of , and is the area of . We conclude that if , if not. Intuitively, a bigger value of partition granularity implies a smaller non-uniformity error and a larger noise error when splitting the data domain. In contrast, a smaller value of partition granularity means a smaller noise error and a larger non-uniformity error because the value of partition granularity m is the key. Qardaji et al. inferred the value of m based on the assumption [7], which is needless in this paper. From the above analysis, given a geospatial dataset D and privacy budget , how to choose an optimal partition granularity m to minimize the error of query Q is the research question in this paper. The formalized definition is defined as follows: Table 1 is a summary of the primary symbols used in this paper.
Table 1

Symbols.

SymbolDescription
Dtwo-dimensional geospatial dataset
D˜sanitized dataset
cicell
xicount of data points in cell ci
kproportionality coefficient
Qdata query
Iiintersection between query Q and cell ci
x˜inoisy count of cell ci
Ldomain length of D
Hdomain width of D
alength of Q
bwidth of Q

4. Sanitized Data Release Based on Grid Partition

This section mainly states the sanitized data release approach Ugrid and Mgrid. In particular, the granularity partitioning model of data domain is first presented; then, Ugrid and Mgrid based on this model are presented.

4.1. Uniform Grid Release Approach

4.1.1. Granularity Partitioning Model of Data Domain

We give the optimal value of partition granularity m based on the overall analysis of perturbed data’s noise error and non-uniformity error. Details of derivation are as follows. As illustrated in Figure 2, let cells that are filled with oblique lines be I, the non-uniformity error is 0 when the area of I is 0; now, cells in Q are completely contained in it. The non-uniformity error becomes bigger with the area of I increasing when cells in Q are not contained in it. Motivated by this, we propose that the relative error based on the uniformity assumption is proportional to the area of I. Let k be the proportionality coefficient between and , and are the ith sampling values; let and be the mean value of relative error and area of I, and we can infer the value of k through linear-regression analysis, and the value of k can be calculated by least square estimation; the formula is as follows: For instance, we have that relative error satisfies through linear-regression analysis in checkin dataset, where k = 0.1291. Notably, the relative error is 0 when the area of I is 0. We finally set k = 0.1314 after using the coordinate origin (0, 0) to correct the value of k. Details of checkin dataset can be seen in Section 5. The bigger the area of I gets, the bigger the non-uniformity error becomes. The value of the non-uniformity error reaches a maximum in theory, and the area of I is the region of cells that intersected with the border of the query Q. The value of is . The analysis of non-uniformity error: the number of cells that intersected with the border of Q is defined as , where is the number of cells that intersected with the top and bottom borders of Q, and is the number of cells intersected with the left and right borders of Q. The area of each cell is , where LH is the total area of data domain and is the total number of cells. Then, we deduce the total area of the cells that intersected with the border of Q is , and non-uniformity error that is proportional to the total area is . The noise error is caused by the added Laplace noise and is affected by the value of partition granularity m. The value of is , and . The analysis of noise error: the added random noise follows Laplace distribution and has a standard deviation . The number of cells included in the query Q is , where  is the ratio of the area of query Q to the area of data domain and is the total number of cells. Thus, the standard deviation of the total noise error is , and . The total error of data query is at a minimum when , where k is the proportional coefficient, H and L are the domain width and length of dataset D, and ε is the privacy budget. The total error is the sum of non-uniformity error and noise error , where , according to the above analysis. To minimize the total error, according to , we deduce that , and round it up to a whole number; then, . ☐

4.1.2. Ugrid Method

We propose a uniform grid release approach based on this granularity partitioning model. First of all, Ugrid splits the data domain into independent cells according to the value of partition granularity m, where . Next, calculate the count of data points in each cell through a traversal of D and getting the point counts of all cells . Then, obtain the noised count by adding Laplace noise . Finally, share the sanitized dataset for query services. The pseudo code description of Ugrid is presented in Algorithm 1. Steps of Ugrid conduct domain division in geospatial dataset D; step 6 sets point count ; in steps , the Laplace noise is added into each count of ; and the last step generates the differentially privacy sanitized dataset . for do if then add to cell end if end for set point count for do noisy count end for sanitized dataset Algorithm Ugrid satisfies ε-differential privacy. According to Property 1 parallel composition, Laplace noise is added into independent cells; then, Ugrid provides differential privacy. As , Ugrid satisfies -differential privacy. ☐ Given geospatial dataset D and partition granularity m, the time complexity of Ugrid is . In steps 1–5 of algorithm, dataset D has data points, and the cost is . In steps 7–9, there are cells, and the cost is . Therefore, the total cost is . ☐ To balance the noise error and non-uniformity error, Ugrid sets to minimize the total error. However, the output of query may contain a large mass of noise when some cells are extremely sparse. For example, let real count of cell be 1, the added noise is 20, and then the noise error is 20, which remains with little valuable information in it. In order to decrease data query error and enhance the utility of perturbed data, we further introduce a merging grids release approach Mgrid. It aggregates all similar cells into a partition employing the bucket sort based cell merging strategy, which reduces the noise error by adding noise into each partition.

4.2. Merging Grids Release Approach

4.2.1. Merging of Similar Cells

The formalized definition of similar cells merging is defined as follows: Similar cells merging: Given the point count of all cells The parameter c is a constant, and corresponding cells will be merged into a partition if the difference between every two hash value of these cells is smaller than the given threshold c. BKDRHash maps the binary string(3-bits are a group) of to . To find the similar cells, clustering algorithm affinity propagation [37] has the advantage of not needing to specify the cluster “number”. However, the algorithm is more complex, and the time complexity is . To enhance the efficiency, the bucket sort based similar cells merging is adopted. Given mapping function , c is a small value, and is related to the BKDRHash. Mapping each cell with count to the corresponding bucket, the cells in each bucket just are similar cells. Bucket sort based similar cells merging traverses all cells only just once, and its time complexity is . After the merging of similar cells, we get the partition dataset . As shown in Figure 3, cells filled with point symbols, oblique lines, diagonal grids, horizontal and vertical grids are merged into the partitions , , , , respectively. The random noise is added to each partition ; then, the noise added to each cell contained in partition is decreased. Note that BKDRHash is used in the process of similar cells merging to protect data privacy of the real count of all cells.
Figure 3

Example of merging cells.

4.2.2. Mgrid Method

We further propose the merging grids release approach based on the granularity partitioning model and the similar cells merging strategy. Similar to the method Ugrid, firstly, Mgrid splits the dataset into cells based on the granularity m. Secondly, it traverses D and calculates the hash value of based on the BKDRHash. Thirdly, similar cells are selected according to the mapping function f. Furthermore, Laplace noise is added to each partition , and noisy count of each cell in is defined as , where is the count of data points located in . Finally, the sanitized dataset is released for query services. Algorithm 2 states the pseudo code of Mgrid. Steps 1–5 of the Mgrid conduct the cell division in geospatial dataset D; in steps 7–9, each count is mapped to corresponding bucket according to the mapping function ; step 10 gets the partition dataset after the merging of similar cells; in steps 11–13, the Laplace noise is added into each partition ; the final step generates the sanitized differentially privacy dataset . for do if then add to cell end if end for set point count for do select similar cells by mapping function end for set partition dataset is , where = {similar cells} for do noisy count end for sanitized dataset Mgrid also satisfies -differential privacy, and the proof is similar to Ugrid’s. Note that the Laplace noise is added to each partition, bucket sort does not consume the privacy budget, and the Laplace mechanism consumes . Data query error is less than or equal to the value before the merging of similar cells. Given the geospatial dataset, before the merging of similar cells, the noise error of query Q is , and non-uniformity error is , the data query error is then . After the merging of similar cells, the noise error of query Q is , , and non-uniformity error is ; then, the data query error is . The difference between and is , so we deduce that data query error is less than or equal to the value before the merging of similar cells. ☐ Given geospatial dataset D and partition granularity m, then the time complexity of Mgrid is . In steps 1–5 of algorithm, dataset D has data points, and the cost is . There are cells in steps 7–9, and the cost is . In steps 11–13, the number of all partitions is L. Therefore, the total cost is . ☐

5. Experimental Results and Analysis

In this section, we begin with the introducing of the metric standard of perturbed data. Then, we present the experimental datasets used in this paper. Finally, detailed analysis of experimental results is presented.

5.1. Utility Metric

There is no specific utility metric standard in existing literature for differential privacy, and the existing methods usually adopt variance [26,38], relative error [7,26,29], absolute error [7], etc. to evaluate the utility of sanitized data. In this paper, we adopt relative error and absolute error to estimate the utility of sanitized data. Given a query Q, let denote the real query result, let denote the noisy query result, and then the relative error is defined as: The parameter is the count of nodes contained in dataset D, and the divisor is when , which avoids dividing by zero. The smaller the relative error is, the more accurate the query will be. Meanwhile, in order to intuitively observe the value of added noise, we also present the comparison results of absolute error.

5.2. Experimental Datasets

In Figure 4, the shapes of datasets are presented by plotting the point of monitored object directly, and the coordinate of base point starts from (0, 0) for intuition and convenience.
Figure 4

Illustration of datasets.

The first dataset is named as Checkin [39] obtained from a location-based social networking website Gowalla as illustrated in Figure 4a. It mainly includes the location point, check-in-time, and location id with about 6,442,890 records and only part of the location point information is used. The length and width of the data query Q increase by 10 in this dataset. The second dataset Areas [40] is obtained from the U.S. Census Bureau as illustrated in Figure 4b. Dataset Areas is the legislative areas national geodatabase, and we only employ the location point data. The length of Q increases by 3 and the width increases by 2 in this dataset. The query error is verified under different privacy budgets, such as 0.1, 0.5 and 1. Table 2 presents the parameters information about these datasets.
Table 2

Parameter information about datasets.

DatasetNum of PointsDomain SizeQuery Size
Checkin625,123354 × 133qi=10(i+1)×10(i+1),i[1,6]
Areas179,371351 × 54qi=3(i+5)×2(i+5),i[1,6]
We randomly generate 500 data queries for each query size and finally calculate the mean value. The experiments were conducted on Intel i5 CPU (santa clara, CA, USA) with 3 GB RAM, the programming platform is Eclipse3.5 (Eclipse Foundation, Inc., Ottawa, Canada), and the programming language is JAVA.

5.3. Experimental Results

This subsection presents the experimental results of UG [7], AG [7], Ugrid, Mgrid, and Qopt under different query Q. Figure 5 shows the relative error in different queries. Compared with other methods, Mgrid outweighs other methods on a whole. The relative error of method Ugrid is comparatively large as shown in Figure 5b, and we believe this kind of situation is caused by excessive sparse cells contained in query Q. Mgrid further enhances the query accuracy by the similar cells merging strategy, which merges the similar cells into a partition to decrease the added noise to each cell. Experimental results verify the effectiveness of the granularity partitioning model and the similar cells merging strategy.
Figure 5

Relative error of query.

Note that the experimental results of UG outperform the results of AG in Figure 5e. This situation may be caused by the privacy budget allocation and the sparsity of dataset. AG allocates half of privacy budget to the first-level cells and the other half of the budget to the second-level cells; different allocation strategy will have an impact on the query results. Figure 6 shows the profile of absolute error, which is displayed by candlestick chart, in different queries. Note that the top horizontal line of the candlestick is the maximum value, the bottom horizontal line of the candlestick is the minimum value, and the middle horizontal line of the candlestick is the arithmetic mean. The top of the box is 95% of the maximum value, and the bottom of the box is 120% of the minimum value.
Figure 6

Absolute error of query.

As shown in Figure 6, just considering the absolute error of the added noise, we also deduce that Mgrid outperforms the four other methods. Note that the results of Qopt in dataset Areas are getting worse, which shows that a granularity partition based method works well when dealing with the sparse data.

6. Conclusions

The location information of monitored objects is an important privacy attribute in IWSNs, which has become a significant research direction. To protect node location privacy and enhance the utility of perturbed data, we propose a novel granularity partitioning model based on the overall analysis of two types of errors. This model considers that the shape of query Q is a rectangle, which is closer to the requirement of actual queries. Ugrid and Mgrid are proposed based on this model and are validated through two real world datasets. Experimental results show that Mgrid has a good utility and query accuracy. As for future work, we will continue to improve the granularity partitioning model and make the model to be in better accordance with the self-characteristics of datasets. For instance, using area and point count two factors to construct the model. In addition, we will explore the distributed application for geospatial datasets—for example, multiserver differentially private data release.
  5 in total

1.  Clustering by passing messages between data points.

Authors:  Brendan J Frey; Delbert Dueck
Journal:  Science       Date:  2007-01-11       Impact factor: 47.728

2.  Visual computing as a key enabling technology for Industrie 4.0 and Industrial Internet.

Authors:  Jorge Posada; Carlos Toro; Iñigo Barandiaran; David Oyarzun; Didier Stricker; Raffaele de Amicis; Eduardo B Pinto; Peter Eisert; Jurgen Döllner; Ivan Vallarino
Journal:  IEEE Comput Graph Appl       Date:  2015 Mar-Apr       Impact factor: 2.088

3.  Identity and privacy. Unique in the shopping mall: on the reidentifiability of credit card metadata.

Authors:  Yves-Alexandre de Montjoye; Laura Radaelli; Vivek Kumar Singh; Alex Sandy Pentland
Journal:  Science       Date:  2015-01-30       Impact factor: 47.728

4.  Source Anonymity in WSNs against Global Adversary Utilizing Low Transmission Rates with Delay Constraints.

Authors:  Anas Bushnag; Abdelshakour Abuzneid; Ausif Mahmood
Journal:  Sensors (Basel)       Date:  2016-06-27       Impact factor: 3.576

5.  Preserving Source Location Privacy for Energy Harvesting WSNs.

Authors:  Changqin Huang; Ming Ma; Yuxin Liu; Anfeng Liu
Journal:  Sensors (Basel)       Date:  2017-03-30       Impact factor: 3.576

  5 in total
  3 in total

1.  Application of Personal Information Privacy Protection Based on Machine Learning Algorithm.

Authors:  Fang Lang; Yunfei Zhong
Journal:  Comput Intell Neurosci       Date:  2022-07-31

2.  Differentially Private and Skew-Aware Spatial Decompositions for Mobile Crowdsensing.

Authors:  Jong Seon Kim; Yon Dohn Chung; Jong Wook Kim
Journal:  Sensors (Basel)       Date:  2018-10-30       Impact factor: 3.576

3.  An Enhanced Source Location Privacy based on Data Dissemination in Wireless Sensor Networks (DeLP).

Authors:  Naveed Jan; Ali H Al-Bayatti; Naseer Alalwan; Ahmed Ibrahim Alzahrani
Journal:  Sensors (Basel)       Date:  2019-05-02       Impact factor: 3.576

  3 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.