|
[1] V. Vescoukis, N. Doulamis, and S. Karagiorgou, “A service oriented architecture for decision support systems in environmental crisis management,” Future Generation Computer Systems, vol. 28, no. 3, pp. 593 – 604, 2012. [Online]. Available: http://www.sciencedirect.com/science/ article/pii/S0167739X11000380 [2] L.Xu,N.Liang,andQ.Gao,“Anintegratedapproachforagriculturalecosystemmanagement,” IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews), vol. 38, no. 4, pp. 590–599, July 2008. [3] N.D.Lane,E.Miluzzo,H.Lu,D.Peebles,T.Choudhury,andA.T.Campbell,“Asurveyofmobile phone sensing,” IEEE Communications Magazine, vol. 48, no. 9, pp. 140–150, Sept 2010. [4] P. Dutta, P. M. Aoki, N. Kumar, A. Mainwaring, C. Myers, W. Willett, and A. Woodruff, “Common sense: Participatory urban sensing using a network of handheld air quality monitors,” in Proceedings of the 7th ACM Conference on Embedded Networked Sensor Systems, ser. SenSys ’09. New York, NY, USA: ACM, 2009, pp. 349–350. [Online]. Available: http://doi.acm.org/10.1145/1644038.1644095 [5] B. Guo, Z. Wang, Z. Yu, Y. Wang, N. Y. Yen, R. Huang, and X. Zhou, “Mobile crowd sensing and computing: The review of an emerging human-powered sensing paradigm,” ACM Comput. Surv., vol. 48, no. 1, pp. 7:1–7:31, Aug. 2015. [Online]. Available: http://doi.acm.org/10.1145/2794400 [6] R. K. Ganti, F. Ye, and H. Lei, “Mobile crowdsensing: current state and future challenges,” IEEE Communications Magazine, vol. 49, no. 11, pp. 32–39, November 2011. [7] T. Zhou, Z. Cai, K. Wu, Y. Chen, and M. Xu, “Fidc: A framework for improving data credibility in mobile crowdsensing,” Computer Networks, vol. 120, pp. 157 – 169, 2017. [Online]. Available: http://www.sciencedirect.com/science/article/pii/S1389128617301445 [8] T. Zhou, Z. Cai, M. Xu, and Y. Chen, “Leveraging crowd to improve data credibility for mo- bile crowdsensing,” in 2016 IEEE Symposium on Computers and Communication (ISCC), June 2016, pp. 561–568. [9] T. Luo and L. Zeynalvand, “Reshaping mobile crowd sensing using cross validation to improve data credibility,” in GLOBECOM 2017 - 2017 IEEE Global Communications Conference, Dec 2017, pp. 1–7.[10] P. Gilbert, L. P. Cox, J. Jung, and D. Wetherall, “Toward trustworthy mobile sensing,” in Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications, ser. HotMobile ’10. New York, NY, USA: ACM, 2010, pp. 31–36. [Online]. Available: http://doi.acm.org/10.1145/1734583.1734592 [11] U. Rührmair, J. L. Martinez-Hurtado, X. Xu, C. Kraeh, C. Hilgers, D. Kononchuk, J. J. Finley, and W. P. Burleson, “Virtual proofs of reality and their physical implementation,” in 2015 IEEE Symposium on Security and Privacy, May 2015, pp. 70–85. [12] A. Juels and M. Sudan, “A fuzzy vault scheme,” in Proceedings IEEE International Symposium on Information Theory,, 2002, pp. 408–. [13] C. Ellison, C. Hall, R. Milbert, and B. Schneier, “Protecting secret keys with personal entropy,” Future Gener. Comput. Syst., vol. 16, no. 4, pp. 311–318, Feb. 2000. [Online]. Available: http://dx.doi.org/10.1016/S0167-739X(99)00055-2 [14] D.BleichenbacherandP.Q.Nguyen,“Noisypolynomialinterpolationandnoisychineseremain- dering,” in Advances in Cryptology — EUROCRYPT 2000, B. Preneel, Ed. Berlin, Heidelberg: Springer Berlin Heidelberg, 2000, pp. 53–69. [15] U.Uludag,S.Pankanti,andA.K.Jain,“Fuzzyvaultforfingerprints,”inAudio-andVideo-Based Biometric Person Authentication, T. Kanade, A. Jain, and N. K. Ratha, Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005, pp. 310–319. |