Faking contextual data for fun, profit, and privacy
暂无分享,去创建一个
[1] Carlos Fernández-Valdivielso,et al. Disappearing for a while - using white lies in pervasive computing , 2007, WPES '07.
[2] Hao Chen,et al. Noise Injection for Search Privacy Protection , 2009, 2009 International Conference on Computational Science and Engineering.
[3] Ashwin Machanavajjhala,et al. Privacy: Theory meets Practice on the Map , 2008, 2008 IEEE 24th International Conference on Data Engineering.
[4] John Krumm,et al. Inference Attacks on Location Tracks , 2007, Pervasive.
[5] Jun-Lin Lin,et al. Privacy preserving itemset mining through fake transactions , 2007, SAC '07.
[6] Irit Dinur,et al. Revealing information while preserving privacy , 2003, PODS.
[7] John Krumm. Realistic Driving Trips For Location Privacy , 2009, Pervasive.
[8] Ninghui Li,et al. End-User Privacy in Human–Computer Interaction , 2009 .
[9] Theodore P. Hill,et al. The Difficulty of Faking Data , 1999 .