This work is licensed under the Creative Commons Attribution 4.0 International License.
Wang, Y., Liang, X., Hei, X., Ji, W., & Zhu, L. (2021). Deep learning data privacy protection based on homomorphic encryption in aiot. Mobile Information Systems, 2021(2), 1-11.Search in Google Scholar
Alraja, M. N., Barhamgi, H., Rattrout, A., & Barhamgi, M. (2021). An integrated framework for privacy protection in iot — applied to smart healthcare. Computers & Electrical Engineering, 91(1), 107060.Search in Google Scholar
Zhang, L., Huo, Y., Ge, Q., Ma, Y., Liu, Q., & Ouyang, W. (2021). A privacy protection scheme for iot big data based on time and frequency limitation. Wireless Communications and Mobile Computing.Search in Google Scholar
Campbell, A., Mccarty, D., Rieckmann, T., Mcneely, J., Rotrosen, J., & Wu, L. T., et al. (2019). Interpretation and integration of the federal substance use privacy protection rule in integrated health systems: a qualitative analysis. Journal of substance abuse treatment, 97, 41-46.Search in Google Scholar
Li, Y., & Hu, X. (2019). Social network analysis of law information privacy protection of cybersecurity based on rough set theory. Library Hi Tech, ahead-of-print (ahead-of-print).Search in Google Scholar
Rodriguez-Priego, N., Porcu, L., & Kitchen, P. J. (2022). Sharing but caring: location based mobile applications (lbma) and privacy protection motivation. Journal of business research (Feb.), 140.Search in Google Scholar
Tawalbeh, L. A., Muheidat, F., Tawalbeh, M., & Quwaider, M. (2020). IoT Privacy and security: Challenges and solutions. Applied Sciences, 10(12), 4102.Search in Google Scholar
Hassan, M. U., Rehmani, M. H., & Chen, J. (2019). Privacy preservation in blockchain based IoT systems: Integration issues, prospects, challenges, and future research directions. Future Generation Computer Systems, 97, 512-529.Search in Google Scholar
Kshetri, N. (2017). Blockchain’s roles in strengthening cybersecurity and protecting privacy. Telecommunications policy, 41(10), 1027-1038.Search in Google Scholar
Abouelmehdi, K., Beni-Hessane, A., & Khaloufi, H. (2018). Big healthcare data: preserving security and privacy. Journal of big data, 5(1), 1-18.Search in Google Scholar
Gao, S., Ma, J., Shi, W., & Zhan, G. (2017). Ltppm: a location and trajectory privacy protection mechanism in participatory sensing. Wireless Communications and Mobile Computing, 15(1), 155-169.Search in Google Scholar
Singh, N. K., & Mahajan, V. (2021). End-user privacy protection scheme from cyber intrusion in smart grid advanced metering infrastructure. International Journal of Critical Infrastructure Protection, 100410.Search in Google Scholar
Zhang, P., Durresi, M., & Durresi, A. (2019). Multi-access edge computing aided mobility for privacy protection in internet of things. Computing, 101(7), 729-742.Search in Google Scholar
Li, H., Xue, X., Li, Z., Li, L., & Xiong, J. (2021). Location privacy protection scheme for lbs in iot. Wireless Communications and Mobile Computing.Search in Google Scholar
Mothukuri, V., Parizi, R. M., Pouriyeh, S., Huang, Y., Dehghantanha, A., & Srivastava, G. (2021). A survey on security and privacy of federated learning. Future Generation Computer Systems, 115, 619-640.Search in Google Scholar
Prince, P. B., & Lovesum, S. J. (2020). Privacy enforced access control model for secured data handling in cloud-based pervasive health care system. SN Computer Science, 1(5), 239.Search in Google Scholar
Hu, Z., & Yang, J. (2020). Differential privacy protection method based on published trajectory cross-correlation constraint. PLoS ONE, 15(8), e0237158.Search in Google Scholar
Zhang, Q., Zhang, X., Wang, M., & Li, X. (2021). Dplq: location-based service privacy protection scheme based on differential privacy. IET information security (6), 15.Search in Google Scholar
Zhou, J., Cao, Z., Dong, X., & Vasilakos, A. V. (2017). Security and privacy for cloud-based IoT: Challenges. IEEE Communications Magazine, 55(1), 26-33.Search in Google Scholar
Gai, K., Wu, Y., Zhu, L., Xu, L., & Zhang, Y. (2019). Permissioned blockchain and edge computing empowered privacy-preserving smart grid networks. IEEE Internet of Things Journal, 6(5), 7992-8004.Search in Google Scholar
Wei, K., Li, J., Ding, M., Ma, C., Yang, H. H., Farokhi, F., & Poor, H. V. (2020). Federated learning with differential privacy: Algorithms and performance analysis. IEEE Transactions on Information Forensics and Security, 15, 3454-3469.Search in Google Scholar