A check-in shielding scheme against acquaintance inference in location-based social networks
暂无分享,去创建一个
[1] Catuscia Palamidessi,et al. Geo-indistinguishability: differential privacy for location-based systems , 2012, CCS.
[2] Margaret Martonosi,et al. DP-WHERE: Differentially private modeling of human mobility , 2013, 2013 IEEE International Conference on Big Data.
[3] Wen-Chih Peng,et al. Exploring Check-in Data to Infer Social Ties in Location Based Social Networks , 2017, PAKDD.
[4] Srikanta J. Bedathur,et al. LoCaTe: Influence Quantification for Location Promotion in Location-based Social Networks , 2017, IJCAI.
[5] Yazhe Wang,et al. Preserving privacy in social networks against connection fingerprint attacks , 2015, 2015 IEEE 31st International Conference on Data Engineering.
[6] Aniket Kittur,et al. Bridging the gap between physical location and online social networks , 2010, UbiComp.
[7] Jian Pei,et al. A brief survey on anonymization techniques for privacy preserving publishing of social network data , 2008, SKDD.
[8] Claude Castelluccia,et al. Study : Privacy Preserving Release of Spatio-temporal Density in Paris , 2014 .
[9] Yuval Elovici,et al. Online Social Networks: Threats and Solutions , 2013, IEEE Communications Surveys & Tutorials.
[10] Yang Zhang,et al. Inferring friendship from check-in data of location-based social networks , 2015, 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM).
[11] Cecilia Mascolo,et al. A Random Walk around the City: New Venue Recommendation in Location-Based Social Networks , 2012, 2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing.
[12] Jure Leskovec,et al. Friendship and mobility: user movement in location-based social networks , 2011, KDD.
[13] Wang-Chien Lee,et al. PGT: Measuring Mobility Relationship Using Personal, Global and Temporal Factors , 2014, 2014 IEEE International Conference on Data Mining.
[14] Philip S. Yu,et al. Privacy Preserving Social Network Publication against Mutual Friend Attacks , 2013, 2013 IEEE 13th International Conference on Data Mining Workshops.
[15] Keith W. Ross,et al. Facebook users have become much more private: A large-scale study , 2012, 2012 IEEE International Conference on Pervasive Computing and Communications Workshops.
[16] David Pisinger,et al. Upper bounds and exact algorithms for p-dispersion problems , 2006, Comput. Oper. Res..
[17] Ben Y. Zhao,et al. Preserving Location Privacy in Geosocial Applications , 2014, IEEE Transactions on Mobile Computing.
[18] Cheng-Te Li,et al. Where You Go Reveals Who You Know: Analyzing Social Ties from Millions of Footprints , 2015, CIKM.
[19] Donald F. Towsley,et al. Resisting structural re-identification in anonymized social networks , 2010, The VLDB Journal.
[20] K. Liu,et al. Towards identity anonymization on graphs , 2008, SIGMOD Conference.
[21] Cyrus Shahabi,et al. Towards integrating real-world spatiotemporal data with social networks , 2011, GIS.
[22] Catuscia Palamidessi,et al. Optimal Geo-Indistinguishable Mechanisms for Location Privacy , 2014, CCS.
[23] Philip S. Yu,et al. Privacy-preserving social network publication against friendship attacks , 2011, KDD.
[24] Yang Zhang,et al. walk2friends: Inferring Social Links from Mobility Profiles , 2017, CCS.
[25] Yan Liu,et al. EBM: an entropy-based model to infer social strength from spatiotemporal data , 2013, SIGMOD '13.