Filters








8 Hits in 6.7 sec

Guest Editorial Spectrum Sharing and Aggregation for Future Wireless Networks, Part I

Theodoros A. Tsiftsis, Guoru Ding, Yulong Zou, George K. Karagiannidis, Zhu Han, Lajos Hanzo
2016 IEEE Journal on Selected Areas in Communications  
Muriel Medard, JSAC Editor-in-Chief, to the Executive Editor Laurel Greenidge and to the Senior Editor Prof. Max Henrique Machado Costa for the encouragement they have provided.  ...  They provided both the Reviewers and Editors with a fascinating snapshot of the range of ongoing research in the area of spectrum sharing and aggregation.  ...  A pair of joint differentially private Gale-Shapley mechanisms guaranteeing reliable privacy protection for mobile traffic offloading systems are proposed.  ... 
doi:10.1109/jsac.2016.2606819 fatcat:ihhh3dafh5bm7nmcla4puptblm

More Than Privacy: Applying Differential Privacy in Key Areas of Artificial Intelligence [article]

Tianqing Zhu and Dayong Ye and Wei Wang and Wanlei Zhou and Philip S. Yu
2020 arXiv   pre-print
For this reason, differential privacy has been broadly applied in AI but to date, no study has documented which differential privacy mechanisms can or have been leveraged to overcome its issues or the  ...  In this paper, we show that differential privacy can do more than just privacy preservation.  ...  They used the Gale-Shapley algorithm [128] to optimize the offloading station allocation plan for mobile phone users.  ... 
arXiv:2008.01916v1 fatcat:ujmxv7eq6jcppndfu5shbzkdom

More Than Privacy: Applying Differential Privacy in Key Areas of Artificial Intelligence

Tianqing Zhu, Dayong Ye, Wei Wang, Wanlei Zhou, Philip Yu
2020 IEEE Transactions on Knowledge and Data Engineering  
For this reason, differential privacy has been broadly applied in AI but to date, no study has documented which differential privacy mechanisms can or have been leveraged to overcome its issues or the  ...  In this paper, we show that differential privacy can do more than just privacy preservation.  ...  They used the Gale-Shapley algorithm [128] to optimize the offloading station allocation plan for mobile phone users.  ... 
doi:10.1109/tkde.2020.3014246 fatcat:33rl6jxy5rgexpnuel5rvlkg5a

A Review on Application of Blockchain in 5G and Beyond Networks: Taxonomy, Field-trials, Challenges and Opportunities

Mohammad Tahir, Mohammed Hadi Habaebi, Mohammad Dabbagh, Amna Mughees, Abdul Ahad, Kazi Istiaque Ahmed
2020 IEEE Access  
To provide privacy, a differential privacy mechanism is used in the local gradient computing process.  ...  Both SU and PU prepare a preference list and are matched using the Gale-Shapley algorithm.  ...  and the PhD degree in computer and communication system engineering from University Putra Malaysia, in 2001.  ... 
doi:10.1109/access.2020.3003020 fatcat:s4wcxzjccbcvxkmnwn7tsxtvvu

Energy Efficient Secure Computation Offloading in NOMA-based mMTC Networks for IoT

Shujun Han, Xiaodong Xu, Sisai Fang, Yan Sun, Yue Cao, Xiaofeng Tao, Ping Zhang
2019 IEEE Internet of Things Journal  
Furthermore, we formulate the joint computation and communication resource allocation algorithm for secure computation offloading.  ...  Exploiting these benefits, we focus on the energy efficient secure computation offloading in NOMA based mMTC networks for IoT, where the relay equipped with an MEC server and a passive malicious eavesdropper  ...  In the IoT era, it is necessary to establish differentiated service mechanisms for various requirements of IoT devices. The SR is applicable for the rate-sensitive applications.  ... 
doi:10.1109/jiot.2019.2904741 fatcat:meaq5ef5ercdzlq3kvem5mm254

When Machine Learning Meets Spectrum Sharing Security: Methodologies and Challenges [article]

Qun Wang, Haijian Sun, Rose Qingyang Hu, Arupjyoti Bhuyan
2022 arXiv   pre-print
Complicated and dynamic SS systems can be exposed to different potential security and privacy issues, requiring protection mechanisms to be adaptive, reliable, and scalable.  ...  In particular, we elaborate the state-of-the-art methodologies for improving the performance of SS communication systems for various vital aspects, including ML based cognitive radio networks (CRNs), ML  ...  It was shown that the proposed method satisfied joint differential privacy. 3) Privacy Protection for ML Algorithms The sensitive training data in ML-based applications faced distinct privacy issues.  ... 
arXiv:2201.04677v1 fatcat:gb73bku37fatncamax67buwkea

Electronic Markets and Auctions (Dagstuhl Seminar 13461) Computational Models of Language Meaning in Context (Dagstuhl Seminar 13462) Synchronous Programming (Dagstuhl Seminar 13471) Global Measurement Framework (Dagstuhl Seminar 13472) Unleashing Operational Process Mining (Dagstuhl Seminar 13481) Forensic Computing (Dagstuhl Seminar 13482)

Saul Greenberg, Kasper Hornbaek, Aaron Quigley, Harald Reiterer, Roman, Yishay Mansour, Benny Moldovanu, Noam Nisan, Berthold, Hans Kamp, Alessandro Lenci, James (+14 others)
2013 unpublished
The seminar can be seen as a good starting point to identify the role of Proxemics in Human-Computer Interaction.  ...  However, it still remains an open research area and its place in HCI needs to be better understood. Acknowledgements.  ...  and allocation problems have not been considered in the differential privacy literature, and for good reason: they are plainly impossible to solve under the standard notion of differential privacy.  ... 
fatcat:fl5xhx4dpbeklg6o6xhmuvuety

Correct and Efficient Accelerator Programming (Dagstuhl Seminar 13142)

Bernadette Charron-Bost, Stepahn Merz, Andrey Rybalchenko, Josef Widder, Albert Cohen, Alastair Donaldson, Marieke Huisman, Joost-Pieter Katoen, Stephen Kobourov, Martin Nöllenburg, Monique, Sergiu Hart (+2 others)
2013 unpublished
In the last part I also mention an algorithm of Drysdale, Rote, and Sturm [1] for smooth (tangent-continuous) approximation by biarcs.  ...  This is a survey of algorithms for approximating a curve by a simpler curve, mostly by a polygon with few edges.  ...  The second, privacy, requires the mechanism not reveal "much" about any agent's type to other agents. We propose a notion of privacy we call Joint Differential Privacy.  ... 
fatcat:m7452gw4cvecbd2vi6w3uha5ai