Browsing by Author "Zhang, Xinyue"
Now showing 1 - 2 of 2
- Results Per Page
- Sort Options
Item Location and Data Privacy Preservation in Intelligent Systems(2021-05) Zhang, Xinyue; Pan, Miao; Han, Zhu; Nguyen, Hien Van; Fu, Xin; Li, MingDue to the ubiquitous mobile devices with embedded sensors and connectivity over the internet, the Internet of things (IoT) has evolved. The IoT brings the explosive growth of devices connected and controlled by the Internet. The enormous collection of connected sensors and devices makes a significant contribution to the volume of data collected, which brings us to the big data era. Intelligent system (IS) becomes an emerging paradigm for integrating big data, analytics, privacy, and artificial intelligence. The IS is any formal or informal system to manage data gathering, to obtain and process the data, to interpret the data, and to provide reasoned judgments to decision makers as a basis for action. In order to keep up with the continuous influx of data, machine learning is one of the best solutions for big data analysis, which is fast evolving during the last decade. With the development of machine learning technologies, it plays a critical role in IS. The IS, which integrates computations, communications and decision making, interacts with humans through many new modalities. However, privacy is an essential concern in IS since a large volume of users’ daily and sensitive data is used in constituting systems, and users become increasingly concerned about the compromise of their personal information. Therefore, it is necessary to develop innovative privacy preserving approaches to prevent users' confidential information from illegal revealing while efficiently utilizing massive data generated from users. In fact, there are trade-offs between the effectiveness of privacy protection and the convenience of data collection, communications, and energy consumption, which need proper considerations in system designs. The objectives of this dissertation are to develop efficient and reliable data analysis methods in various IS applications and protect the data privacy against malicious attacks through a combination of theoretical, simulation, and experimental studies. Given the challenge of privacy preservation and reliable data analysis, this work endeavors to develop a series of privacy preserving data analytic and processing methodologies through machine learning, optimization and differential privacy; and focuses on effectively integrating the data analysis and data privacy preservation techniques to provide the most desirable solutions for the state-of-the-art IS with various application-specific requirements.Item TPP: Trajectory Privacy Preservation Against Tensor Voting Based Inference Attacks(IEEE Access, 12/3/2018) Zhang, Xinyue; Wang, Jingyi; Shu, Minglei; Wang, Yinglong; Pan, Miao; Han, ZhuThe popularity of mobile devices with global positioning system (GPS) has boosted various wireless location-based services (LBSs). Certain honest-but-curious or even dishonest LBS servers may learn the users' trajectories from location trace files, and the users' privacy can be compromised. In this paper, we propose a quantitative approach to model trajectory inference attacks via tensor voting, which can be widely applied in computer vision and machine learning as a perceptual organization. To counter the tensor voting based attacks, we propose a novel trajectory privacy preservation TPP scheme, in which LBS users will intentionally generate dummy trajectories to obfuscate LBS servers. Meanwhile, the LBS users have the option to disclose their trajectories to trustworthy parties (e.g., users' parents) by sending those parties a few more encrypted locations. Considering the power constraint of hand-held mobile devices, we mathematically formulate the trajectory privacy preservation problem into a mixed integer linear programming optimization problem and propose the algorithms for optimizing solutions. Through simulations and analysis, we show that the proposed scheme can effectively preserve LBS users' trajectory privacy against tensor voting-based inference attacks with limited power consumption.