Differential Private POI Queries via Johnson-Lindenstrauss Transform
暂无分享,去创建一个
[1] Qiong Huang,et al. User-Defined Privacy Grid System for Continuous Location-Based Services , 2015, IEEE Transactions on Mobile Computing.
[2] Stavros Papadopoulos,et al. Nearest neighbor search with strong location privacy , 2010, Proc. VLDB Endow..
[3] Takahiro Hara,et al. Dummy-Based User Location Anonymization Under Real-World Constraints , 2016, IEEE Access.
[4] David Wetherall,et al. Toward trustworthy mobile sensing , 2010, HotMobile '10.
[5] Feng Xia,et al. Heterogeneous incentive mechanism for time-sensitive and location-dependent crowdsensing networks with random arrivals , 2018, Comput. Networks.
[6] Catuscia Palamidessi,et al. Optimal Geo-Indistinguishable Mechanisms for Location Privacy , 2014, CCS.
[7] Cynthia Dwork,et al. Calibrating Noise to Sensitivity in Private Data Analysis , 2006, TCC.
[8] Abhinav Palia,et al. Optimizing noise level for perturbing geo-location data , 2017, ArXiv.
[9] Tianqing Zhu,et al. Silence is Golden: Enhancing Privacy of Location-Based Services by Content Broadcasting and Active Caching in Wireless Vehicular Networks , 2016, IEEE Transactions on Vehicular Technology.
[10] Anupam Gupta,et al. An elementary proof of the Johnson-Lindenstrauss Lemma , 1999 .
[11] Dimitris Achlioptas,et al. Database-friendly random projections: Johnson-Lindenstrauss with binary coins , 2003, J. Comput. Syst. Sci..
[12] Rinku Dewri,et al. Private Retrieval of POI Details in Top-K Queries , 2017, IEEE Transactions on Mobile Computing.
[13] Catuscia Palamidessi,et al. Geo-indistinguishability: differential privacy for location-based systems , 2012, CCS.
[14] Qiang Ni,et al. A K-Anonymity Based Schema for Location Privacy Preservation , 2019, IEEE Transactions on Sustainable Computing.
[15] Cyrus Shahabi,et al. Blind Evaluation of Nearest Neighbor Queries Using Space Transformation to Preserve Location Privacy , 2007, SSTD.
[16] Rinku Dewri,et al. Local Differential Perturbations: Location Privacy under Approximate Knowledge Attackers , 2013, IEEE Transactions on Mobile Computing.
[17] W. B. Johnson,et al. Extensions of Lipschitz mappings into Hilbert space , 1984 .
[18] Catuscia Palamidessi,et al. Geo-indistinguishability: A Principled Approach to Location Privacy , 2015, ICDCIT.
[19] Shui Yu,et al. Big data set privacy preserving through sensitive attribute-based grouping , 2017, 2017 IEEE International Conference on Communications (ICC).
[20] Li Xiong,et al. Protecting Locations with Differential Privacy under Temporal Correlations , 2014, CCS.
[21] Panos Kalnis,et al. Location Diversity: Enhanced Privacy Protection in Location Based Services , 2009, LoCA.
[22] Avrim Blum,et al. The Johnson-Lindenstrauss Transform Itself Preserves Differential Privacy , 2012, 2012 IEEE 53rd Annual Symposium on Foundations of Computer Science.
[23] Andreas Gutscher. Coordinate transformation - a solution for the privacy problem of location based services? , 2006, Proceedings 20th IEEE International Parallel & Distributed Processing Symposium.
[24] Fenghua Li,et al. Time obfuscation-based privacy-preserving scheme for Location-Based Services , 2016, 2016 IEEE Wireless Communications and Networking Conference Workshops (WCNCW).
[25] Elisa Bertino,et al. Practical Approximate k Nearest Neighbor Queries with Location and Query Privacy , 2016, IEEE Transactions on Knowledge and Data Engineering.