4.8 Article

Privacy-Aware Data Fusion and Prediction With Spatial-Temporal Context for Smart City Industrial Environment

期刊

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
卷 17, 期 6, 页码 4159-4167

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TII.2020.3012157

关键词

Data fusion and prediction; locality-sensitive hashing (LSH); privacy; smart city industrial environment; spatial-temporal context

资金

  1. National Natural Science Foundation of China [91846301, 61872219]
  2. Natural Science Foundation of Shandong Province [ZR2019MF001]
  3. Open Project of State Key Laboratory for Novel Software Technology [KFKT2020B08]

向作者/读者索取更多资源

Smart cities generate a significant amount of industrial data related to transportation, healthcare, business, and social activities. Protecting user privacy, especially in terms of spatial-temporal context information, is crucial when integrating and analyzing this data. A novel privacy-aware data fusion and prediction approach based on locality-sensitive hashing technique is proposed in this article, showing better prediction performances compared to other methods through real-world dataset experiments.
As one of the cyber-physical-social systems that plays a key role in people's daily activities, a smart city is producing a considerable amount of industrial data associated with transportation, healthcare, business, social activities, and so on. Effectively and efficiently fusing and mining such data from multiple sources can contribute much to the development and improvements of various smart city applications. However, the industrial data collected from the smart city are often sensitive and contain partial user privacy such as spatial-temporal context information. Therefore, it is becoming a necessity to secure user privacy hidden in the smart city data before these data are integrated together for further mining, analyses, and prediction. However, due to the inherent tradeoff between data privacy and data availability, it is often a challenging task to protect users' context privacy while guaranteeing accurate data analysis and prediction results after data fusion. Considering this challenge, a novel privacy-aware data fusion and prediction approach for the smart city industrial environment is put forward in this article, which is based on the classic locality-sensitive hashing technique. At last, our proposal is evaluated by a set of experiments based on a real-world dataset. Experimental results show better prediction performances of our approach compared to other competitive ones.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.8
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

Article Computer Science, Software Engineering

Differentially private locality sensitive hashing based federated recommender system

Hongsheng Hu, Gillian Dobbie, Zoran Salcic, Meng Liu, Jianbing Zhang, Lingjuan Lyu, Xuyun Zhang

Summary: Recommender systems are important in big data analytics for their potential to bring high profit. However, privacy concerns and regulations make it difficult to integrate scattered data. Existing privacy-preserving recommender system models based on cryptography lack flexibility. This paper proposes a differentially private LSH approach that guarantees privacy preservation while offering efficient and accurate recommendations.

CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE (2023)

Article Automation & Control Systems

C-FDRL: Context-Aware Privacy-Preserving Offloading Through Federated Deep Reinforcement Learning in Cloud-Enabled IoT

Yang Xu, Md Zakirul Alam Bhuiyan, Tian Wang, Xiaokang Zhou, Amit Kumar Singh

Summary: In this article, we propose a framework called C-fDRL to protect the context-aware privacy of task offloading using context-aware federated deep reinforcement learning. The framework operates in three stages (CloudAI, EdgeAI, and DeviceAI) of the overall system, decoupling data from tasks through a context-aware data management approach for local and edge computation, leading to improved data privacy protection.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2023)

Article Computer Science, Information Systems

Towards Robust Task Assignment in Mobile Crowdsensing Systems

Liang Wang, Zhiwen Yu, Kaishun Wu, Dingqi Yang, En Wang, Tian Wang, Yihan Mei, Bin Guo

Summary: Mobile Crowdsensing (MCS) is an appealing paradigm for collaboratively collecting data from surrounding environments by assigning outsourced sensing tasks to volunteer workers. However, unpredictable disruptions during task implementation often result in task execution failure and impair the benefit of MCS systems. In this work, we propose a robust task assignment scheme that proactively creates assignments offline, aiming to strengthen the robustness of the scheme and minimize workers' traveling detour cost. By leveraging workers' spatiotemporal mobility, we construct an assignment graph and use an evolutionary multi-tasking optimization algorithm (EMTRA) to achieve adequate Pareto-optimal schemes. Comprehensive experiments on real-world datasets validate the effectiveness and applicability of our approach.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2023)

Article Computer Science, Information Systems

TANTO: An Effective Trust-Based Unmanned Aerial Vehicle Computing System for the Internet of Things

Jing Bai, Zhiwen Zeng, Tian Wang, Shaobo Zhang, Neal N. Xiong, Anfeng Liu

Summary: In this article, a trust-based active notice task offloading (TANTO) scheme is proposed to provide trust and low-delay task offloading for resource-limited IoT devices in areas with no available communication infrastructure. The main innovations of TANTO include a novel task offloading mechanism, a trust calculation and reasoning method, and an online UAV trajectory optimization algorithm. Experimental results show that TANTO outperforms previous studies in terms of task completion rate, tasks' average completion time, and UAV's flight cost.

IEEE INTERNET OF THINGS JOURNAL (2023)

Article Computer Science, Information Systems

MRMondrian: Scalable Multidimensional Anonymisation for Big Data Privacy Preservation

Xuyun Zhang, Lianyong Qi, Wanchun Dou, Qiang He, Christopher Leckie, Ramamohanarao Kotagiri, Zoran Salcic

Summary: Scalable data processing platforms built on cloud computing are becoming more attractive for supporting big data applications. However, privacy concerns hinder the use of public cloud platforms. In this paper, a scalable approach based on MapReduce is proposed to address the scalability issues of multidimensional anonymisation when handling big data. The approach also demonstrates applicability to differential privacy.

IEEE TRANSACTIONS ON BIG DATA (2022)

Article Computer Science, Theory & Methods

Identifying fraud in medical insurance based on blockchain and deep learning

Guoming Zhang, Xuyun Zhang, Muhammad Bilal, Wanchun Dou, Xiaolong Xu, Joel J. P. C. Rodrigues

Summary: With the rapid growth of medical costs, controlling medical expenses has become an important task for the Health Insurance Department. Traditional per-service payment methods in medical insurance lead to many unreasonable expenses. To address this issue, the use of single-disease payment mechanisms has become popular, but it also carries the risk of fraud. This study proposes a framework based on consortium blockchain and deep learning to identify fraud in medical insurance, automating the recognition of suspicious medical records and ensuring valid implementation of single-disease payments, while reducing the workload of medical insurance auditors.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2022)

Article Computer Science, Information Systems

AntiConcealer: Reliable Detection of Adversary Concealed Behaviors in EdgeAI-Assisted IoT

Jiwei Zhang, Md Zakirul Alam Bhuiyan, Xu Yang, Tian Wang, Xuesong Xu, Thaier Hayajneh, Faiza Khan

Summary: Internet of Things (IoT) is a rapidly developing technology that is vulnerable to cyberattacks and anomalies. This article proposes a framework called AntiConcealer, which uses edge artificial intelligence (EdgeAI) to detect adversary concealed behaviors in the IoT. The usability and reliability of the framework are verified through evaluation using honeypots integrated with edge servers.

IEEE INTERNET OF THINGS JOURNAL (2022)

Article Computer Science, Information Systems

Auditory Receptive Field Net Based Automatic Snore Detection for Wearable Devices

Xiyuan Hu, Jingpeng Sun, Jinping Dong, Xuyun Zhang

Summary: We proposed a deep learning-based accurate snore detection model for long-term home monitoring of snoring during sleep. The model outperformed other traditional approaches and deep learning models in terms of snore detection. It predicted candidate boxes and confidence scores based on the feature maps derived by the feature extraction network.

IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS (2023)

Article Engineering, Electrical & Electronic

Digital-Twin-Enabled 6G Mobile Network Video Streaming Using Mobile Crowdsourcing

Lianyong Qi, Xiaolong Xu, Xiaotong Wu, Qiang Ni, Yuan Yuan, Xuyun Zhang

Summary: This paper investigates the opportunities and challenges of mobile video streaming services in the sixth generation (6G) network using digital twin technology and cloud-centric architecture. The authors propose a solution using crowdsourcing to attract mobile users to follow a specified path and share network resources, alleviating the problem of increasing traffic demands. They present algorithms for user recruitment optimization and evaluate the system performance through extensive experiments.

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2023)

Editorial Material Environmental Sciences

Deep Learning for Remote Sensing-Based Earth and Environment Resources Management

Carlos Enrique Montenegro Marin, Xuyun Zhang, Nallappan Gunasekaran

JOURNAL OF THE INDIAN SOCIETY OF REMOTE SENSING (2023)

Article Computer Science, Information Systems

BCGeo: Blockchain-Assisted Geospatial Web Service for Smart Healthcare System

Soubhagya Ranjan Mallick, Rakesh K. Lenka, Veena Goswami, Suraj Sharma, Asish Kumar Dalai, Himansu Das, Rabindra K. Barik

Summary: Recent research in healthcare systems has focused on integrating IoT, Blockchain, and cloud computing to improve IoT device performance, create smart healthcare platforms, and provide optimal healthcare services. Data collection, processing, geolocation, access management, device prioritization, and storage are primary challenges in IoT healthcare systems. The use of Blockchain technology in healthcare platforms offers data privacy, anonymity, and validity. This paper presents a novel decentralized Blockchain-enabled geospatial service architecture called BCGeo for smart healthcare systems, providing online geospatial healthcare services for newcomers in Bhubaneswar, India. The framework includes immutability, scalability, geospatial mapping, patient prioritization, and decentralized privacy protection policies, addressing technical challenges in current healthcare systems.

IEEE ACCESS (2023)

Article Computer Science, Hardware & Architecture

NACA: A Joint Distortion-Based Non-Additive Cost Assignment Method for Video Steganography

Yi Chen, Zoran Salcic, Hongxia Wang, Kim-Kwang Raymond Choo, Xuyun Zhang

Summary: This article proposes a joint distortion-based non-additive cost assignment method to reduce distortion drift and improve security in video steganography. Extensive experiments show that the proposed method achieves enhanced security and visual stego video quality.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2023)

Article Computer Science, Artificial Intelligence

A Correlation Graph Based Approach for Personalized and Compatible Web APIs Recommendation in Mobile APP Development

Lianyong Qi, Wenmin Lin, Xuyun Zhang, Wanchun Dou, Xiaolong Xu, Jinjun Chen

Summary: Using Web APIs registered in service sharing communities for mobile APP development can reduce development period and cost. However, the large number and differences of available APIs make it difficult for selection. To address this challenge, a correlation graph-based approach is proposed for personalized and compatible Web APIs recommendation in mobile APP development. Extensive experiments on a real dataset prove the feasibility of the proposed recommendation approach.

IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2023)

Proceedings Paper Computer Science, Information Systems

Smart Contract Scams Detection with Topological Data Analysis on Account Interaction

Shuhui Fan, Shaojing Fu, Yuchuan Luo, Haoran Xu, Xuyun Zhang, Ming Xu

Summary: The rapid growth of cryptocurrency market value has attracted more investors, but the anonymity of blockchain also makes it a tool for criminals. Smart contract scam detection is crucial for investors, and traditional methods perform poorly in detecting scams with similar codes.

PROCEEDINGS OF THE 31ST ACM INTERNATIONAL CONFERENCE ON INFORMATION AND KNOWLEDGE MANAGEMENT, CIKM 2022 (2022)

Proceedings Paper Computer Science, Information Systems

A Transformer-Based User Satisfaction Prediction for Proactive Interaction Mechanism in DuerOS

Wei Shen, Xiaonan He, Chuheng Zhang, Xuyun Zhang, Jian Xie

Summary: Spoken dialogue systems face challenges in responding accurately due to noisy input, semantic misunderstandings, or lack of knowledge. To improve the user experience, researchers propose a proactive interaction mechanism that predicts user satisfaction and asks clarification questions before providing a response. They develop a pipeline to predict user satisfaction using weak labels and a transformer-based model, and introduce a contextual user satisfaction metric to evaluate the experience. Their model deployed on DuerOS shows a relative improvement in user satisfaction prediction accuracy and user experience.

PROCEEDINGS OF THE 31ST ACM INTERNATIONAL CONFERENCE ON INFORMATION AND KNOWLEDGE MANAGEMENT, CIKM 2022 (2022)

暂无数据