Privacy- and Context-aware Release of Trajectory Data
暂无分享,去创建一个
James Bailey | Lars Kulik | Elham Naghizade | Egemen Tanin | J. Bailey | E. Tanin | L. Kulik | Elham Naghizade
[1] Helmut Alt,et al. Computing the Fréchet distance between two polygonal curves , 1995, Int. J. Comput. Geom. Appl..
[2] Thomas Brinkhoff,et al. A Framework for Generating Network-Based Moving Objects , 2002, GeoInformatica.
[3] Dimitrios Gunopulos,et al. Discovering similar multidimensional trajectories , 2002, Proceedings 18th International Conference on Data Engineering.
[4] Marco Gruteser,et al. USENIX Association , 1992 .
[5] Frank Stajano,et al. Location Privacy in Pervasive Computing , 2003, IEEE Pervasive Comput..
[6] Johannes Gehrke,et al. Query Processing in Sensor Networks , 2003, CIDR.
[7] Lars Kulik,et al. A Formal Model of Obfuscation and Negotiation for Location Privacy , 2005, Pervasive.
[8] Tetsuji Satoh,et al. An anonymous communication technique using dummies for location-based services , 2005, ICPS '05. Proceedings. International Conference on Pervasive Services, 2005..
[9] Hanan Samet,et al. Foundations of multidimensional and metric data structures , 2006, Morgan Kaufmann series in data management systems.
[10] John Krumm,et al. Inference Attacks on Location Tracks , 2007, Pervasive.
[11] Vania Bogorny,et al. A model for enriching trajectories with semantic geographical information , 2007, GIS.
[12] Nikos Mamoulis,et al. Privacy Preservation in the Publication of Trajectories , 2008, The Ninth International Conference on Mobile Data Management (mdm 2008).
[13] Yücel Saygin,et al. Towards trajectory anonymization: a generalization-based approach , 2008, SPRINGL '08.
[14] Francesco Bonchi,et al. Never Walk Alone: Uncertainty for Anonymity in Moving Objects Databases , 2008, 2008 IEEE 24th International Conference on Data Engineering.
[15] Xing Xie,et al. Mining interesting locations and travel sequences from GPS trajectories , 2009, WWW '09.
[16] Frank McSherry,et al. Privacy integrated queries: an extensible platform for privacy-preserving data analysis , 2009, SIGMOD Conference.
[17] Elisa Bertino,et al. Protecting location privacy against spatial inferences: the PROBE approach , 2009, SPRINGL '09.
[18] Walid G. Aref,et al. Casper*: Query processing for location services without compromising privacy , 2006, TODS.
[19] Ninghui Li,et al. On the tradeoff between privacy and utility in data publishing , 2009, KDD.
[20] Christian S. Jensen,et al. Mining significant semantic locations from GPS data , 2010, Proc. VLDB Endow..
[21] Vania Bogorny,et al. Preserving privacy in semantic-rich trajectories of human mobility , 2010, SPRINGL '10.
[22] K. Tan,et al. ρ-uncertainty , 2010, The Happiness Problem.
[23] Chedy Raïssi,et al. ρ-uncertainty , 2010, Proc. VLDB Endow..
[24] D. Mohr,et al. Harnessing Context Sensing to Develop a Mobile Intervention for Depression , 2011, Journal of medical Internet research.
[25] Injong Rhee,et al. On the levy-walk nature of human mobility , 2011, TNET.
[26] Jong Kim,et al. Protecting location privacy using location semantics , 2011, KDD.
[27] Claude Castelluccia,et al. Differentially private sequential data publication via variable-length n-grams , 2012, CCS.
[28] Yunhao Liu,et al. Mining Frequent Trajectory Patterns for Activity Monitoring Using Radio Frequency Tag Arrays , 2012, IEEE Transactions on Parallel and Distributed Systems.
[29] Benjamin C. M. Fung,et al. Differentially private transit data publication: a case study on the montreal transportation system , 2012, KDD.
[30] Xiaofeng Meng,et al. You Can Walk Alone: Trajectory Privacy-Preserving through Significant Stays Protection , 2012, DASFAA.
[31] Stéphane Bressan,et al. Publishing trajectories with differential privacy guarantees , 2013, SSDBM.
[32] Tanzima Hashem,et al. Countering overlapping rectangle privacy attack for moving kNN queries , 2013, Inf. Syst..
[33] L. Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[34] Basile Chaix,et al. GPS tracking in neighborhood and health studies: a step forward for environmental exposure assessment, a step backward for causal inference? , 2013, Health & place.
[35] Catuscia Palamidessi,et al. Optimal Geo-Indistinguishable Mechanisms for Location Privacy , 2014, CCS.
[36] Xuan Song,et al. Prediction of human emergency behavior and their mobility following large-scale disaster , 2014, KDD.
[37] Xingshe Zhou,et al. Disorientation detection by mining GPS trajectories for cognitively-impaired elders , 2015, Pervasive Mob. Comput..
[38] Divesh Srivastava,et al. DPT: Differentially Private Trajectory Synthesis Using Hierarchical Reference Systems , 2015, Proc. VLDB Endow..
[39] Heng Tao Shen,et al. Personalized semantic trajectory privacy preservation through trajectory reconstruction , 2017, World Wide Web.
[40] Liehuang Zhu,et al. Achieving differential privacy of trajectory data publishing in participatory sensing , 2017, Inf. Sci..