Zaobo He

Learn More
1 Proof of Theorem 1 Theorem 1. To satisfy that any r(x) (x ∈ S(t)) can be extracted with error O(M j), where M j ⊆ S(t) ⊆ M j+1 and 1 ≤ j ≤ log n, the condition |I| − µ ≤ |A| ≤ |I| should be ensured, where µ = 1 − 1 β · h · |M j |. Proof. As presented in Section IV.A, the querying process for r(x) in T is a traversal process over T. Assuming for each(More)
The rising popularity of mobile social media enables personalization of various content sharing and subscribing services. These two types of services entail serious privacy concerns not only to the confidentiality of shared content, but also to the privacy of end users such as their identities, interests and social relationships. Previous works established(More)
Mobile Wireless Sensor Networks (MWSNs) are employed in many fields, such as intelligent transportation, community health monitoring, and animal behavior monitoring. However, MWSNs may be vulnerable to malicious interference because of the large-scale characteristics. One of the threats is to inject malware into some nodes, especially mobile nodes. When a(More)
The rise of sensor-equipped smart phones has enabled a variety of classification based applications that provide personalized services based on user data extracted from sensor readings. However, malicious applications aggressively collect sensitive information from inherent user data without permissions. Furthermore, they can mine sensitive information from(More)
The huge amount of sensory data collected from mobile devices has offered great potentials to promote more significant services based on user data extracted from sensor readings. However, releasing user data could also seriously threaten user privacy. It is possible to directly collect sensitive information from released user data without user permissions.(More)