More Value, Less Privacy, How to Evaluate the Privacy Based on Trajectories Visualization & Analyzation
暂无分享,去创建一个
Yi Shen | Xiaolin Gui | Huijun Dai | Xiaolin Gui | Huijun Dai | Yi Shen
[1] Karim Emara,et al. On evaluation of location privacy preserving schemes for VANET safety applications , 2015, Comput. Commun..
[2] Zhonghui Wang,et al. Protecting trajectory privacy: A user-centric analysis , 2017, J. Netw. Comput. Appl..
[3] John Krumm,et al. A survey of computational location privacy , 2009, Personal and Ubiquitous Computing.
[4] Xiaoru Yuan,et al. Visual Analysis of Multiple Route Choices Based on General GPS Trajectories , 2017, IEEE Transactions on Big Data.
[5] Peter Nijkamp,et al. Mobile phone data from GSM networks for traffic parameter and urban spatial pattern assessment: a review of applications and opportunities , 2011, GeoJournal.
[6] Ling Liu,et al. Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms , 2008, IEEE Transactions on Mobile Computing.
[7] César A. Hidalgo,et al. Unique in the Crowd: The privacy bounds of human mobility , 2013, Scientific Reports.
[8] Nikos Mamoulis,et al. Local Suppression and Splitting Techniques for Privacy Preserving Publication of Trajectories , 2017, IEEE Transactions on Knowledge and Data Engineering.
[9] Meng Xiao. PrivateCheckIn:Trajectory Privacy-Preserving for Check-In Services in MSNS , 2013 .
[10] Benjamin C. M. Fung,et al. Privacy-preserving trajectory data publishing by local suppression , 2013, Inf. Sci..
[11] Suman Nath,et al. Differentially private aggregation of distributed time-series with transformation and encryption , 2010, SIGMOD Conference.
[12] Reza Shokri,et al. Evaluating the Privacy Risk of Location-Based Services , 2011, Financial Cryptography.
[13] Bingru Yang,et al. A Personalized Privacy Preserving Parallel (alpha, k) -anonymity Model , 2012 .
[14] K. Premalatha,et al. A survey on privacy preserving data mining , 2015, 2015 2nd International Conference on Electronics and Communication Systems (ICECS).
[15] Matthew Roughan,et al. Multi-Observer Privacy-Preserving Hidden Markov Models , 2012, IEEE Transactions on Signal Processing.