A pipeline approach for privacy preservation against poisoning attacks in a Mobile Edge Computing environment.
Joelle KabdjouElie Tagne FuteDanda B. RawatJaime C. AcostaCharles A. KamhouaPublished in: Ad Hoc Networks (2024)
Keyphrases
- computing environments
- privacy preservation
- data publishing
- privacy preserving
- protection mechanisms
- mobile computing
- data privacy
- data mining
- service discovery
- mobile agents
- sensitive information
- data quality
- pervasive computing
- privacy protection
- private information
- pervasive computing environments
- distributed systems
- data mining applications
- context aware
- nearest neighbor
- management system
- data model