Predictive analytics and protection of massive data

Zusammenfassung 1

[1]  John Krumm,et al.  Hidden Markov map matching through noise and sparseness , 2009, GIS.

[2]  Dieter Pfoser,et al.  On Map-Matching Vehicle Tracking Data , 2005, VLDB.

[3]  Ashwin Machanavajjhala,et al.  l-Diversity: Privacy Beyond k-Anonymity , 2006, ICDE.

[4]  Stephen B. Seidman,et al.  Network structure and minimum degree , 1983 .

[5]  Özgür Ulusoy,et al.  A data mining approach for location prediction in mobile environments , 2005, Data Knowl. Eng..

[6]  Wei-Ying Ma,et al.  Understanding mobility based on GPS data , 2008, UbiComp.

[7]  Thomas Seidl,et al.  TMC-pattern: holistic trajectory extraction, modeling and mining , 2012, BigSpatial '12.

[8]  Divesh Srivastava,et al.  Differentially Private Spatial Decompositions , 2011, 2012 IEEE 28th International Conference on Data Engineering.

[9]  Philip S. Yu,et al.  A Condensation Approach to Privacy Preserving Data Mining , 2004, EDBT.

[10]  Thomas Seidl,et al.  UrbanHubble: Location Prediction and Geo-Social Analytics in LBSN , 2015, ECML/PKDD.

[11]  Nikos Mamoulis,et al.  Privacy Preservation in the Publication of Trajectories , 2008, The Ninth International Conference on Mobile Data Management (mdm 2008).

[12]  Xing Xie,et al.  GeoMF: joint geographical modeling and matrix factorization for point-of-interest recommendation , 2014, KDD.

[13]  Walid G. Aref,et al.  Casper*: Query processing for location services without compromising privacy , 2006, TODS.

[14]  Cynthia Dwork,et al.  Practical privacy: the SuLQ framework , 2005, PODS.

[15]  Wen-Chih Peng,et al.  Exploring Social Influence on Location-Based Social Networks , 2014, 2014 IEEE International Conference on Data Mining.

[16]  Xing Xie,et al.  Mining correlation between locations using human location history , 2009, GIS.

[17]  Thomas Seidl,et al.  BodyGuards: A Clairvoyant Location Predictor Using Frequent Neighbors and Markov Model , 2013, 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing.

[18]  Jorge Nocedal,et al.  On the limited memory BFGS method for large scale optimization , 1989, Math. Program..

[19]  Thomas Seidl,et al.  Context-based location clustering and prediction using conditional random fields , 2014, MUM.

[20]  M Sun,et al.  A method for measuring mechanical work and work efficiency during human activities. , 1993, Journal of biomechanics.

[21]  G. R. Nudd,et al.  The Viterbi Algorithm , 1993 .

[22]  Thad Starner,et al.  Using GPS to learn significant locations and predict movement across multiple users , 2003, Personal and Ubiquitous Computing.

[23]  Jiawei Han,et al.  Data Mining: Concepts and Techniques , 2000 .

[24]  Anna Monreale,et al.  WhereNext: a location predictor on trajectory pattern mining , 2009, KDD.

[25]  Sung-Bae Cho,et al.  Activity Recognition Using Hierarchical Hidden Markov Models on a Smartphone with 3D Accelerometer , 2011, HAIS.

[26]  Kunal Talwar,et al.  Mechanism Design via Differential Privacy , 2007, 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07).

[27]  Umeshwar Dayal,et al.  PrefixSpan: Mining Sequential Patterns by Prefix-Projected Growth , 2001, ICDE 2001.

[28]  Gary M. Weiss,et al.  Activity recognition using cell phone accelerometers , 2011, SKDD.

[29]  G. Pflug Kernel Smoothing. Monographs on Statistics and Applied Probability - M. P. Wand; M. C. Jones. , 1996 .

[30]  Cynthia Dwork,et al.  Calibrating Noise to Sensitivity in Private Data Analysis , 2006, TCC.

[31]  Philip S. Yu,et al.  Privacy-preserving social network publication against friendship attacks , 2011, KDD.

[32]  Francesco Bonchi,et al.  Never Walk Alone: Uncertainty for Anonymity in Moving Objects Databases , 2008, 2008 IEEE 24th International Conference on Data Engineering.

[33]  Alex Pentland,et al.  Reality mining: sensing complex social systems , 2006, Personal and Ubiquitous Computing.

[34]  Robert M. Gray,et al.  An Algorithm for Vector Quantizer Design , 1980, IEEE Trans. Commun..

[35]  Cynthia Dwork,et al.  Differential Privacy , 2006, ICALP.

[36]  Thomas Seidl,et al.  Near-Optimal Activity Prediction through Efficient Wavelet Modulus Maxima Partitioning and Conditional Random Fields , 2014, 2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 IEEE 11th Intl Conf on Autonomic and Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops.

[37]  Thomas Seidl,et al.  Activity recognition from sensors using dyadic wavelets and Hidden Markov Model , 2014, 2014 IEEE 10th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).

[38]  Padhraic Smyth,et al.  Modeling human location data with mixtures of kernel densities , 2014, KDD.

[39]  K. Liu,et al.  Towards identity anonymization on graphs , 2008, SIGMOD Conference.

[40]  Philip S. Yu,et al.  Differentially private data release for data mining , 2011, KDD.

[41]  Ernesto Damiani,et al.  Location Privacy Protection Through Obfuscation-Based Techniques , 2007, DBSec.

[42]  Sean Chester,et al.  k-Anonymization of Social Networks by Vertex Addition , 2011, ADBIS.

[43]  Thomas Seidl,et al.  Differential Private Trajectory Obfuscation , 2012, MobiQuitous.

[44]  Jon M. Kleinberg,et al.  Wherefore art thou R3579X? , 2011, Commun. ACM.

[45]  Klaus H. Hinrichs,et al.  Managing uncertainty in moving objects databases , 2004, TODS.

[46]  Kyriakos Mouratidis,et al.  Preventing Location-Based Identity Inference in Anonymous Spatial Queries , 2007, IEEE Transactions on Knowledge and Data Engineering.

[47]  Philip S. Yu,et al.  Structural Diversity for Privacy in Publishing Social Networks , 2011, SDM.

[48]  Duncan J. Watts,et al.  Everyone's an influencer: quantifying influence on twitter , 2011, WSDM '11.

[49]  Albert-László Barabási,et al.  Statistical mechanics of complex networks , 2001, ArXiv.

[50]  Muhammad Tayyab Asif,et al.  Online map-matching based on Hidden Markov model for real-time traffic sensing applications , 2012, 2012 15th International IEEE Conference on Intelligent Transportation Systems.

[51]  Mingyan Liu,et al.  Building realistic mobility models from coarse-grained traces , 2006, MobiSys '06.

[52]  Brian D. Noble,et al.  BreadCrumbs: forecasting mobile connectivity , 2008, MobiCom '08.

[53]  Qing Liu,et al.  A Hybrid Prediction Model for Moving Objects , 2008, 2008 IEEE 24th International Conference on Data Engineering.

[54]  Mikolaj Morzy,et al.  Mining Frequent Trajectories of Moving Objects for Location Prediction , 2007, MLDM.

[55]  Bo Hu,et al.  Social Topic Modeling for Point-of-Interest Recommendation in Location-Based Social Networks , 2014, 2014 IEEE International Conference on Data Mining.

[56]  Ravi Kumar,et al.  Influence and correlation in social networks , 2008, KDD.

[57]  Agata Brajdic,et al.  Walk detection and step counting on unconstrained smartphones , 2013, UbiComp.

[58]  Jian Pei,et al.  Preserving Privacy in Social Networks Against Neighborhood Attacks , 2008, 2008 IEEE 24th International Conference on Data Engineering.

[59]  Jeffrey M. Hausdorff,et al.  Falls and freezing of gait in Parkinson's disease: A review of two interconnected, episodic phenomena , 2004, Movement disorders : official journal of the Movement Disorder Society.

[60]  Thomas Seidl,et al.  Preserving privacy of moving objects via temporal clustering of spatio-temporal data streams , 2011, SPRINGL '11.

[61]  Thomas Seidl,et al.  (k, d)-core anonymity: structural anonymization of massive networks , 2014, SSDBM '14.

[62]  Christian S. Jensen,et al.  Discovery of convoys in trajectory databases , 2008, Proc. VLDB Endow..

[63]  Jeffrey M. Hausdorff,et al.  Wearable Assistant for Parkinson’s Disease Patients With the Freezing of Gait Symptom , 2010, IEEE Transactions on Information Technology in Biomedicine.

[64]  Edsger W. Dijkstra,et al.  Communication with an Automatic Computer , 1959 .

[65]  Marco Gruteser,et al.  Protecting Location Privacy Through Path Confusion , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[66]  Dino Pedreschi,et al.  Trajectory pattern mining , 2007, KDD '07.

[67]  Thomas Seidl,et al.  Effective Map Matching Using Curve Tangents and Hidden Markov Model , 2014, 2014 10th International Conference on Mobile Ad-hoc and Sensor Networks.

[68]  Lei Zou,et al.  K-Automorphism: A General Framework For Privacy Preserving Network Publication , 2009, Proc. VLDB Endow..

[69]  Suman Nath,et al.  Differentially private aggregation of distributed time-series with transformation and encryption , 2010, SIGMOD Conference.

[70]  Jiawei Han,et al.  Swarm: Mining Relaxed Temporal Moving Object Clusters , 2010, Proc. VLDB Endow..

[71]  Torben Bach Pedersen,et al.  Privacy: preserving trajectory collection , 2008, GIS '08.

[72]  Ninghui Li,et al.  t-Closeness: Privacy Beyond k-Anonymity and l-Diversity , 2007, 2007 IEEE 23rd International Conference on Data Engineering.

[73]  M S Waterman,et al.  Identification of common molecular subsequences. , 1981, Journal of molecular biology.

[74]  Richard L. Tweedie,et al.  Markov Chains and Stochastic Stability , 1993, Communications and Control Engineering Series.

[75]  W. Ondo,et al.  Ambulatory monitoring of freezing of gait in Parkinson's disease , 2008, Journal of Neuroscience Methods.

[76]  Qingguo Wang,et al.  A Fast Multiple Longest Common Subsequence (MLCS) Algorithm , 2011, IEEE Transactions on Knowledge and Data Engineering.

[77]  Jure Leskovec,et al.  Friendship and mobility: user movement in location-based social networks , 2011, KDD.

[78]  Yann LeCun,et al.  Transformation Invariance in Pattern Recognition - Tangent Distance and Tangent Propagation , 2012, Neural Networks: Tricks of the Trade.

[79]  Haim Kaplan,et al.  Private coresets , 2009, STOC '09.

[80]  Fan-Ren Chang,et al.  Moving Average Filters for Faster GPS Receiver Autonomous Integrity Monitoring , 2002 .

[81]  Cecilia Mascolo,et al.  NextPlace: A Spatio-temporal Prediction Framework for Pervasive Systems , 2011, Pervasive.

[82]  Huan Liu,et al.  gSCorr: modeling geo-social correlations for new check-ins on location-based social networks , 2012, CIKM.

[83]  Zhe Zhu,et al.  What's Your Next Move: User Activity Prediction in Location-based Social Networks , 2013, SDM.

[84]  Todd R. Ogden,et al.  Wavelet Methods for Time Series Analysis , 2002 .

[85]  Hans-Peter Kriegel,et al.  Density-Connected Subspace Clustering for High-Dimensional Data , 2004, SDM.

[86]  Jia Liu,et al.  K-isomorphism: privacy preserving network publication against structural attacks , 2010, SIGMOD Conference.

[87]  Sofya Raskhodnikova,et al.  Smooth sensitivity and sampling in private data analysis , 2007, STOC '07.

[88]  Xing Xie,et al.  Mining user similarity based on location history , 2008, GIS '08.

[89]  H. B. Kekre,et al.  Vector Quantized Codebook Optimization using K-Means , 2009 .

[90]  Donald F. Towsley,et al.  Resisting structural re-identification in anonymized social networks , 2010, The VLDB Journal.

[91]  Zhenyu He,et al.  Activity recognition from accelerometer signals based on Wavelet-AR model , 2010, 2010 IEEE International Conference on Progress in Informatics and Computing.

[92]  Chengyang Zhang,et al.  Map-matching for low-sampling-rate GPS trajectories , 2009, GIS.

[93]  Hua Lu,et al.  SpaceTwist: Managing the Trade-Offs Among Location Privacy, Query Performance, and Query Accuracy in Mobile Services , 2008, 2008 IEEE 24th International Conference on Data Engineering.

[94]  Assaf Schuster,et al.  Data mining with differential privacy , 2010, KDD.

[95]  Yücel Saygin,et al.  Towards trajectory anonymization: a generalization-based approach , 2008, SPRINGL '08.

[96]  Ashwin Machanavajjhala,et al.  Privacy: Theory meets Practice on the Map , 2008, 2008 IEEE 24th International Conference on Data Engineering.

[97]  Satoshi Tamura,et al.  Human Action Recognition Using Acceleration Information Based On Hidden Markov Model , 2009 .

[98]  Ilya Mironov,et al.  Differentially private recommender systems: building privacy into the net , 2009, KDD.

[99]  Stéphane Mallat,et al.  A Theory for Multiresolution Signal Decomposition: The Wavelet Representation , 1989, IEEE Trans. Pattern Anal. Mach. Intell..

[100]  Donald P. Percival,et al.  On estimation of the wavelet variance , 1995 .

[101]  Sung-Bae Cho,et al.  Activity recognition with android phone using mixture-of-experts co-trained with labeled and unlabeled data , 2014, Neurocomputing.

[102]  C. Torrence,et al.  A Practical Guide to Wavelet Analysis. , 1998 .

[103]  Thomas Seidl,et al.  Insights and Knowledge Discovery from Big Geospatial Data Using TMC-Pattern , 2014 .

[104]  Jing Lei,et al.  Differentially Private M-Estimators , 2011, NIPS.

[105]  Alessio Vecchio,et al.  A smartphone-based fall detection system , 2012, Pervasive Mob. Comput..

[106]  Leslie Pack Kaelbling,et al.  Activity Recognition from Physiological Data using Conditional Random Fields , 2006 .

[107]  Thomas Seidl,et al.  Private Map Matching: Realistic Private Route Cognition on Road Networks , 2013, 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing.

[108]  Jimeng Sun,et al.  Social influence analysis in large-scale networks , 2009, KDD.

[109]  James Cheng,et al.  Efficient core decomposition in massive networks , 2011, 2011 IEEE 27th International Conference on Data Engineering.

[110]  Lars Kulik,et al.  A Formal Model of Obfuscation and Negotiation for Location Privacy , 2005, Pervasive.

[111]  Stéphane Mallat,et al.  Singularity detection and processing with wavelets , 1992, IEEE Trans. Inf. Theory.

[112]  S. Fahn Description of Parkinson's Disease as a Clinical Syndrome , 2003, Annals of the New York Academy of Sciences.

[113]  Thomas Seidl,et al.  A Model for Context-Aware Location Identity Preservation Using Differential Privacy , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.

[114]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[115]  Jennifer Neville,et al.  Randomization tests for distinguishing social influence and homophily effects , 2010, WWW '10.

[116]  Aris Gkoulalas-Divanis,et al.  A Free Terrain Model for Trajectory K-Anonymity , 2008, DEXA.

[117]  Philip S. Yu,et al.  Identifying the influential bloggers in a community , 2008, WSDM '08.

[118]  Torben Bach Pedersen,et al.  Mining Long, Sharable Patterns in Trajectories of Moving Objects , 2009, STDBM.

[119]  Thomas Seidl,et al.  Differential private trajectory protection of moving objects , 2012, IWGS '12.

[120]  Moni Naor,et al.  Our Data, Ourselves: Privacy Via Distributed Noise Generation , 2006, EUROCRYPT.

[121]  S. B. Needleman,et al.  A general method applicable to the search for similarities in the amino acid sequence of two proteins. , 1970, Journal of molecular biology.

[122]  Yaron Kanza,et al.  Concurrent and robust topological map matching , 2012, SIGSPATIAL/GIS.

[123]  S. Mallat A wavelet tour of signal processing , 1998 .

[124]  Torben Bach Pedersen,et al.  Privacy-Preserving Data Mining on Moving Object Trajectories , 2007, 2007 International Conference on Mobile Data Management.

[125]  Petia Radeva,et al.  Human Activity Recognition from Accelerometer Data Using a Wearable Device , 2011, IbPRIA.

[126]  Hao Wang,et al.  Location recommendation in location-based social networks using user check-in data , 2013, SIGSPATIAL/GIS.

[127]  Thomas Seidl,et al.  Check-in Location Prediction Using Wavelets and Conditional Random Fields , 2014, 2014 IEEE International Conference on Data Mining.

[128]  Ling Liu Privacy and location anonymization in location-based services , 2009, SIGSPACIAL.

[129]  Alessandro Vespignani,et al.  K-core Decomposition: a Tool for the Visualization of Large Scale Networks , 2005, ArXiv.

[130]  Thomas Seidl,et al.  Prediction of freezing of gait from Parkinson's Disease movement time series using conditional random fields , 2014, HealthGIS '14.

[131]  Jong-Hwan Kim,et al.  Adaptive fuzzy-network-based C-measure map-matching algorithm for car navigation system , 2001, IEEE Trans. Ind. Electron..

[132]  Lawrence R. Rabiner,et al.  A tutorial on hidden Markov models and selected applications in speech recognition , 1989, Proc. IEEE.