An Effective Target Recovery Method from a Source Location in Geo-Indistinguishable Surroundings
暂无分享,去创建一个
[1] Sushil Jajodia,et al. Protecting Privacy Against Location-Based Personal Identification , 2005, Secure Data Management.
[2] John Krumm,et al. A survey of computational location privacy , 2009, Personal and Ubiquitous Computing.
[3] Kang G. Shin,et al. Privacy protection for users of location-based services , 2012, IEEE Wireless Communications.
[4] John Krumm,et al. Inference Attacks on Location Tracks , 2007, Pervasive.
[5] Catuscia Palamidessi,et al. Geo-indistinguishability: differential privacy for location-based systems , 2012, CCS.
[6] Lars Kulik,et al. A Formal Model of Obfuscation and Negotiation for Location Privacy , 2005, Pervasive.
[7] Le Yu,et al. Achieving Differentially Private Location Privacy in Edge-Assistant Connected Vehicles , 2019, IEEE Internet of Things Journal.
[8] Marco Gruteser,et al. USENIX Association , 1992 .
[9] Fengyuan Xu,et al. A Geo-Indistinguishable Location Perturbation Mechanism for Location-Based Services Supporting Frequent Queries , 2017, IEEE Transactions on Information Forensics and Security.
[10] Jun Sakuma,et al. Toward Distribution Estimation under Local Differential Privacy with Small Samples , 2018, Proc. Priv. Enhancing Technol..
[11] Sébastien Gambs,et al. Show me how you move and I will tell you who you are , 2010, SPRINGL '10.
[12] Jean-Yves Le Boudec,et al. Quantifying Location Privacy , 2011, 2011 IEEE Symposium on Security and Privacy.