共 22 条
[1]
Ahire P., Abraham J., Secure cloud model for intellectual privacy protection of arithmetic expressions in source codes using data obfuscation techniques, Theoretical Computer Science, 922, 15, pp. 131-149, (2022)
[2]
Aljeraisy A., Barati M., Rana O., Perera C., Privacy laws and privacy by design schemes for the internet of things: a developer’s perspective, ACM Computing Surveys, 54, 5, pp. 1-38, (2021)
[3]
Du H., Chen L., Qian J., Hou J., Jung T., Li X.Y., PatronuS: a system for privacy-preserving cloud video surveillance, IEEE Journal on Selected Areas in Communications, 38, 6, pp. 1252-1261, (2020)
[4]
Fang X., Luo J., Luo G., Wu W.W., Cai Z.P., Pan Y., Big data transmission in industrial IoT systems with small capacitor supplying energy, IEEE Transactions on Industrial Informatics, 15, 4, pp. 2360-2371, (2019)
[5]
He W., Liu X., Nguyen H., Nahrstedt K., Abdelzaher T., PDA: privacy-preserving data aggregation in wireless sensor networks, 26th IEEE International Conference on Computer Communications, 3, pp. 2045-2053, (2007)
[6]
Herley C., Van Oorschot P.C., Science of security: combining theory and measurement to reflect the observable, IEEE Security & Privacy, 16, 1, pp. 12-22, (2018)
[7]
Hu Z., Li D., Improved heuristic job scheduling method to enhance throughput for big data analytics, Tsinghua Science and Technology, 27, 2, pp. 344-357, (2022)
[8]
Luo B., Li X., Weng J., Guo J., Ma J., Blockchain enabled trust-based location privacy protection scheme in VANET, IEEE Transactions on Vehicular Technology, 69, 2, pp. 2034-2048, (2020)
[9]
Lv Z., Qiao L., Hossain M.S., Choi B.J., Analysis of using blockchain to protect the privacy of drone big data, IEEE Network, 35, 1, pp. 44-49, (2021)
[10]
Ni P., Liu B., He G., An online optimization strategy for a fluid catalytic cracking process using a case-based reasoning method based on big data technology, RSC Adv, 11, 46, pp. 28557-28564, (2021)