Spatio-temporal techniques for user identification by means of GPS mobility data
暂无分享,去创建一个
[1] Wei-Ying Ma,et al. Understanding mobility based on GPS data , 2008, UbiComp.
[2] Matthias Grossglauser,et al. CRAWDAD dataset epfl/mobility (v.2009-02-24) , 2009 .
[3] Chris Thornton. Separability is a Learner's Best Friend , 1997, NCPW.
[4] Albert-László Barabási,et al. Understanding individual human mobility patterns , 2008, Nature.
[5] Thad Starner,et al. Using GPS to learn significant locations and predict movement across multiple users , 2003, Personal and Ubiquitous Computing.
[6] Matthias Grossglauser,et al. A parsimonious model of mobile partitioned networks with clustering , 2009, 2009 First International Communication Systems and Networks and Workshops.
[7] Donald J. Berndt,et al. Using Dynamic Time Warping to Find Patterns in Time Series , 1994, KDD Workshop.
[8] Mirco Musolesi,et al. It's the way you check-in: identifying users in location-based social networks , 2014, COSN '14.
[9] Michael Rohs,et al. Social, Economic, and Ethical Implications of Ambient Intelligence and Ubiquitous Computing , 2005, Ambient Intelligence.
[10] Anil K. Jain,et al. A modified Hausdorff distance for object matching , 1994, Proceedings of 12th International Conference on Pattern Recognition.
[11] A. Robinson. Elements of Cartography , 1953 .
[12] Franz Aurenhammer,et al. Handbook of Computational Geometry , 2000 .
[13] C. Robusto. The Cosine-Haversine Formula , 1957 .
[14] Xing Xie,et al. Destination prediction by sub-trajectory synthesis and privacy protection against such prediction , 2013, 2013 IEEE 29th International Conference on Data Engineering (ICDE).
[15] Y. de Montjoye,et al. Unique in the shopping mall: On the reidentifiability of credit card metadata , 2015, Science.
[16] Francesco Bonchi,et al. Never Walk Alone: Uncertainty for Anonymity in Moving Objects Databases , 2008, 2008 IEEE 24th International Conference on Data Engineering.
[17] Antonio Corradi,et al. CRAWDAD dataset dartmouth/cenceme (v.2008-08-13) , 2008 .
[18] John Krumm,et al. Inference Attacks on Location Tracks , 2007, Pervasive.
[19] Hui Zang,et al. Are call detail records biased for sampling human mobility? , 2012, MOCO.
[20] Marco Gruteser,et al. On the Anonymity of Periodic Location Samples , 2005, SPC.
[21] John Krumm,et al. A survey of computational location privacy , 2009, Personal and Ubiquitous Computing.
[22] Antonio Corradi,et al. Supporting Energy-Efficient Uploading Strategies for Continuous Sensing Applications on Mobile Phones , 2010, Pervasive.
[23] Dieter Pfoser,et al. On Map-Matching Vehicle Tracking Data , 2005, VLDB.
[24] Eamonn J. Keogh,et al. Everything you know about Dynamic Time Warping is Wrong , 2004 .
[25] Philippe Golle,et al. On the Anonymity of Home/Work Location Pairs , 2009, Pervasive.
[26] Francesca Pratesi,et al. Privacy-by-design in big data analytics and social mining , 2014, EPJ Data Science.
[27] Latanya Sweeney,et al. Achieving k-Anonymity Privacy Protection Using Generalization and Suppression , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[28] George Danezis,et al. GENERAL TERMS , 2003 .
[29] Gaetano Borriello,et al. Location Systems for Ubiquitous Computing , 2001, Computer.
[30] Mario A. Gomarasca,et al. Elements of Cartography , 2009 .
[31] César A. Hidalgo,et al. Unique in the Crowd: The privacy bounds of human mobility , 2013, Scientific Reports.
[32] Arthur H. Robinson,et al. Elements of Cartography. Second Edition , 1960 .