LRM: A Location Recombination Mechanism for Achieving Trajectory $k$ -Anonymity Privacy Protection
暂无分享,去创建一个
Yang Xin | Yunfeng Wang | Shoushan Luo | Mingzhen Li | Yuling Chen | Yixian Yang | Hongliang Zhu | Guangcan Yang
[1] Xiaodong Lin,et al. PLAM: A privacy-preserving framework for local-area mobile social networks , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.
[2] Long Hu,et al. ASA: Against statistical attacks for privacy-aware users in Location Based Service , 2017, Future Gener. Comput. Syst..
[3] Peng Liu,et al. A Mobile Terminal Based Trajectory Preserving Strategy for Continuous Querying LBS Users , 2012, 2012 IEEE 8th International Conference on Distributed Computing in Sensor Systems.
[4] Ke Cheng,et al. TMarkov: LBS Trajectory Prediction for Crowdsourcing Recommendation , 2018, 2018 International Conference on Networking and Network Applications (NaNA).
[5] Xinwen Fu,et al. Protection of query privacy for continuous location based services , 2011, 2011 Proceedings IEEE INFOCOM.
[6] Reza Shokri,et al. Synthesizing Plausible Privacy-Preserving Location Traces , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[7] Catuscia Palamidessi,et al. Geo-indistinguishability: differential privacy for location-based systems , 2012, CCS.
[8] Feifei Li,et al. Secure nearest neighbor revisited , 2013, 2013 IEEE 29th International Conference on Data Engineering (ICDE).
[9] Qinghua Li,et al. Achieving k-anonymity in privacy-aware location-based services , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.
[10] Di Chen,et al. PAPERS: Private and Precise Range Search for Location Based Services , 2015, 2015 IEEE International Conference on Communications (ICC).
[11] Michael Terry,et al. BusMate: Understanding Mobility Behavior for Trajectory-Based Advertising , 2015, 2015 16th IEEE International Conference on Mobile Data Management.
[12] Tao Peng,et al. Collaborative trajectory privacy preserving scheme in location-based services , 2017, Inf. Sci..
[13] Xiaoming Fu,et al. Trajectory Recovery From Ash: User Privacy Is NOT Preserved in Aggregated Mobility Data , 2017, WWW.
[14] Gang Sun,et al. The framework and algorithm for preserving user trajectory while using location-based services in IoT-cloud systems , 2017, Cluster Computing.
[15] Ching-Nung Yang,et al. Scalable secret image sharing scheme with essential shadows , 2017, Signal Process. Image Commun..
[16] Ching-Nung Yang,et al. Threshold changeable secret image sharing scheme based on interpolation polynomial , 2019, Multimedia Tools and Applications.
[17] Nasser Yazdani,et al. Hierarchical anonymization algorithms against background knowledge attack in data releasing , 2016, Knowl. Based Syst..
[18] Hai Liu,et al. Spatiotemporal correlation-aware dummy-based privacy protection scheme for location-based services , 2017, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.
[19] Guangzhong Sun,et al. A Novel Dummy-Based Mechanism to Protect Privacy on Trajectories , 2014, 2014 IEEE International Conference on Data Mining Workshop.
[20] Ian Goldberg,et al. Revisiting the Computational Practicality of Private Information Retrieval , 2011, Financial Cryptography.
[21] Hui Lin,et al. A Trajectory Privacy-Preserving Algorithm Based on Road Networks in Continuous Location-Based Services , 2017, 2017 IEEE Trustcom/BigDataSE/ICESS.
[22] Ching-Nung Yang,et al. Enhanced embedding capacity for the SMSD-based data-hiding method , 2019, Signal Process. Image Commun..
[23] Elisa Bertino,et al. Practical k nearest neighbor queries with location privacy , 2014, 2014 IEEE 30th International Conference on Data Engineering.
[24] Benjamin C. M. Fung,et al. Anonymizing trajectory data for passenger flow analysis , 2014 .
[25] Jemal H. Abawajy,et al. A trajectory privacy-preserving scheme based on query exchange in mobile social networks , 2018, Soft Comput..
[26] Zhiqiang Xie,et al. The privacy preserving method for dynamic trajectory releasing based on adaptive clustering , 2017, Inf. Sci..
[27] Isao Echizen,et al. Lightweight Collaborative Semantic Scheme for Generating an Obfuscated Region to Ensure Location Privacy , 2018, 2018 IEEE International Conference on Systems, Man, and Cybernetics (SMC).
[28] Qiong Wu,et al. Trajectory Protection Schemes Based on a Gravity Mobility Model in IoT , 2019, Electronics.
[29] Luis Martínez-López,et al. Analyzing the performance of classical consensus models in large scale group decision making: A comparative study , 2017, Appl. Soft Comput..
[30] Rupak Kharel,et al. An energy efficient long hop (LH) first scheduling algorithm for scalable Internet of Things (IoT) networks , 2017, 2017 Eleventh International Conference on Sensing Technology (ICST).
[31] Xiaofeng Meng,et al. You Can Walk Alone: Trajectory Privacy-Preserving through Significant Stays Protection , 2012, DASFAA.
[32] Eugenio Cesario,et al. Trajectory Pattern Mining for Urban Computing in the Cloud , 2017, IEEE Transactions on Parallel and Distributed Systems.
[33] Wen-Chih Peng,et al. Dummy-Based Schemes for Protecting Movement Trajectories , 2012, J. Inf. Sci. Eng..
[34] John D. Kelleher,et al. Examining the Limits of Predictability of Human Mobility , 2019, Entropy.
[35] Cong Sun,et al. Balancing trajectory privacy and data utility using a personalized anonymization model , 2014, J. Netw. Comput. Appl..
[36] Francisco Herrera,et al. MENTOR: A graphical monitoring tool of preferences evolution in large-scale group decision making , 2014, Knowl. Based Syst..
[37] Benjamin C. M. Fung,et al. Privacy-preserving trajectory data publishing by local suppression , 2013, Inf. Sci..
[38] Jianfeng Ma,et al. TrPF: A Trajectory Privacy-Preserving Framework for Participatory Sensing , 2013, IEEE Transactions on Information Forensics and Security.
[39] Marco Fiore,et al. Preserving mobile subscriber privacy in open datasets of spatiotemporal trajectories , 2017, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.
[40] Takahiro Hara,et al. A dummy-based anonymization method based on user trajectory with pauses , 2012, SIGSPATIAL/GIS.
[41] Cecilia Mascolo,et al. Mining User Mobility Features for Next Place Prediction in Location-Based Services , 2012, 2012 IEEE 12th International Conference on Data Mining.
[42] Qinghua Li,et al. A novel attack to spatial cloaking schemes in location-based services , 2015, Future Gener. Comput. Syst..