Privacy in Geospatial Applications and Location-Based Social Networks
暂无分享,去创建一个
[1] Stanislaw P. Radziszowski,et al. Homomorphic proximity computation in geosocial networks , 2016, 2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[2] Klemens Böhm,et al. Understanding User Preferences and Awareness: Privacy Mechanisms in Location-Based Services , 2009, OTM Conferences.
[3] Krishna P. Gummadi,et al. Analyzing facebook privacy settings: user expectations vs. reality , 2011, IMC '11.
[4] Shane D. Johnson,et al. UK open source crime data: accuracy and possibilities for research , 2015 .
[5] Mirco Musolesi,et al. Privacy and the City: User Identification and Location Semantics in Location-Based Social Networks , 2015, ICWSM.
[6] Debra Herrmann,et al. Complete Guide to Security and Privacy Metrics: Measuring Regulatory Compliance, Operational Resilience, and ROI , 2007 .
[7] Yin Zhang,et al. Secure friend discovery in mobile social networks , 2011, 2011 Proceedings IEEE INFOCOM.
[8] Amy J. Blatt,et al. The Benefits and Risks of Volunteered Geographic Information , 2015 .
[9] Alessandro Acquisti,et al. Silent Listeners: The Evolution of Privacy and Disclosure on Facebook , 2013, J. Priv. Confidentiality.
[10] Satish V. Ukkusuri,et al. Location Contexts of User Check-Ins to Model Urban Geo Life-Style Patterns , 2015, PloS one.
[11] Graham D. Burchell,et al. The Foucault Effect: Studies in Governmentality , 1991 .
[12] Gang Wang,et al. On the validity of geosocial mobility traces , 2013, HotNets.
[13] Jean-Yves Le Boudec,et al. Quantifying Location Privacy , 2011, 2011 IEEE Symposium on Security and Privacy.
[14] Jeremy W. Crampton,et al. Mapping: A Critical Introduction to Cartography and GIS , 2010 .
[15] Pern Hui Chia,et al. Interdependent Privacy: Let Me Share Your Data , 2013, Financial Cryptography.
[16] Jun Han,et al. ACCessory: password inference using accelerometers on smartphones , 2012, HotMobile '12.
[17] S. Utz,et al. The privacy paradox on social network sites revisited: The role of individual characteristics and group norms , 2009 .
[18] Sabine Trepte,et al. Is the privacy paradox a relic of the past? An in‐depth analysis of privacy attitudes and privacy behaviors , 2015 .
[19] Alessandro Acquisti,et al. Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook , 2006, Privacy Enhancing Technologies.
[20] Vitaly Shmatikov,et al. Membership Inference Attacks Against Machine Learning Models , 2016, 2017 IEEE Symposium on Security and Privacy (SP).
[21] Norman Joseph William Thrower. Maps and Civilization: Cartography in Culture and Society , 1996 .
[22] Marco Furini. Users Behavior in Location-Aware Services: Digital Natives versus Digital Immigrants , 2014, Adv. Hum. Comput. Interact..
[23] Bartha M Knoppers,et al. Sharing health-related data: a privacy test? , 2016, npj Genomic Medicine.
[24] M. Goodchild. Citizens as sensors: the world of volunteered geography , 2007 .
[25] Vladlena Benson,et al. Information disclosure of social media users: Does control over personal information, user awareness and security notices matter? , 2015, Inf. Technol. People.
[26] D. Lazer,et al. The Parable of Google Flu: Traps in Big Data Analysis , 2014, Science.
[27] Satish V. Ukkusuri,et al. Understanding Social Influence in Activity Location Choice and Lifestyle Patterns Using Geolocation Data from Social Media , 2016, Front. ICT.
[28] Esma Aïmeur,et al. Privacy Issues in Geosocial Networks , 2014, CRiSIS.
[29] Timothy Baldwin,et al. Text-Based Twitter User Geolocation Prediction , 2014, J. Artif. Intell. Res..
[30] R. Kitchin,et al. The real-time city? Big data and smart urbanism , 2013, GeoJournal.
[31] Leysia Palen,et al. From Crowdsourced Mapping to Community Mapping: The Post-earthquake Work of OpenStreetMap Haiti , 2014, COOP.
[32] Krzysztof Janowicz,et al. Can Twitter data be used to validate travel demand models , 2015 .
[33] Bandana Kar,et al. Is My Information Private? Geo-Privacy in the World of Social Media , 2014, GIO@GIScience.
[34] Christian S. Jensen,et al. Location-Related Privacy in Geo-Social Networks , 2011, IEEE Internet Computing.
[35] K. Bowers,et al. Crime Mapping On-line: Public Perception of Privacy Issues , 2014, European Journal on Criminal Policy and Research.
[36] Rafail Ostrovsky,et al. Public Key Encryption That Allows PIR Queries , 2007, CRYPTO.
[37] Jeff A. Bilmes,et al. Inferring colocation and conversation networks from privacy-sensitive audio with implications for computational social science , 2011, TIST.
[38] Janus Dam Nielsen,et al. Location privacy via actively secure private proximity testing , 2012, 2012 IEEE International Conference on Pervasive Computing and Communications Workshops.
[39] Hisashi Kobayashi,et al. Signal strength based indoor geolocation , 2002, 2002 IEEE International Conference on Communications. Conference Proceedings. ICC 2002 (Cat. No.02CH37333).
[40] Jonathan Katz,et al. Quid-Pro-Quo-tocols: Strengthening Semi-honest Protocols with Dual Execution , 2012, 2012 IEEE Symposium on Security and Privacy.
[41] Valtteri Niemi,et al. Big Brother Knows Your Friends: On Privacy of Social Communities in Pervasive Networks , 2012, Pervasive.
[42] Hyang-Sook Kim,et al. What drives you to check in on Facebook? Motivations, privacy concerns, and mobile phone involvement for location-based information sharing , 2016, Comput. Hum. Behav..
[43] Sang Michael Xie,et al. Combining satellite imagery and machine learning to predict poverty , 2016, Science.
[44] Susan B. Barnes,et al. A privacy paradox: Social networking in the United States , 2006, First Monday.
[45] Xing Xie,et al. Collaborative activity recognition via check-in history , 2011, LBSN '11.
[46] Dan Boneh,et al. Location Privacy via Private Proximity Testing , 2011, NDSS.
[47] Robert G. Capra,et al. Factors mediating disclosure in social network sites , 2011, Comput. Hum. Behav..
[48] Lilian Mitrou,et al. Which side are you on? A new Panopticon vs. privacy , 2013, 2013 International Conference on Security and Cryptography (SECRYPT).
[49] Jessica Vitak,et al. Digital footprints: online identity management and search in the age of transparency , 2007 .
[50] S. Gorman,et al. Volunteered Geographic Information and Crowdsourcing Disaster Relief: A Case Study of the Haitian Earthquake , 2010 .
[51] G. Annas. HIPAA regulations - a new era of medical-record privacy? , 2003, The New England journal of medicine.
[52] Kôiti Hasida,et al. Inferring Long-term User Properties Based on Users' Location History , 2007, IJCAI.
[53] Mary J. Culnan,et al. Strategies for reducing online privacy risks: Why consumers read (or don't read) online privacy notices , 2004 .
[54] Christian S. Jensen,et al. Effective Privacy-Preserving Online Route Planning , 2011, 2011 IEEE 12th International Conference on Mobile Data Management.
[55] Hua Lu,et al. Location Privacy Techniques in Client-Server Architectures , 2009, Privacy in Location-Based Applications.
[56] Mehmet Hadi Gunes,et al. How to Find Hidden Users: A Survey of Attacks on Anonymity Networks , 2015, IEEE Communications Surveys & Tutorials.
[57] Igor Bilogrevic,et al. (Smart)watch your taps: side-channel keystroke inference attacks using smartwatches , 2015, SEMWEB.
[58] Abdulmotaleb El-Saddik,et al. Absence Privacy Loss , 2015, Computer.
[59] Rasika Dayarathna,et al. Taxonomy for Information Privacy Metrics , 2011 .
[60] Jean-Noël Ezingeard,et al. The role of security notices and online consumer behaviour: An empirical study of social networking users , 2015, Int. J. Hum. Comput. Stud..
[61] Davy Janssens,et al. Characterizing activity sequences using profile Hidden Markov Models , 2015, Expert Syst. Appl..
[62] Daniel J. Solove. A Taxonomy of Privacy , 2006 .
[63] Daqing Zhang,et al. Modeling User Activity Preference by Leveraging User Spatial Temporal Characteristics in LBSNs , 2015, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[64] Kang G. Shin,et al. Privacy protection for users of location-based services , 2012, IEEE Wireless Communications.
[65] Jean-Pierre Hubaux,et al. How Others Compromise Your Location Privacy: The Case of Shared Public IPs at Hotspots , 2013, Privacy Enhancing Technologies.
[66] Paul A. Zandbergen,et al. Accuracy of iPhone Locations: A Comparison of Assisted GPS, WiFi and Cellular Positioning , 2009 .
[67] Niki Pissinou,et al. A survey of privacy vulnerabilities and defenses in geosocial networks , 2013, IEEE Communications Magazine.
[68] Lorrie Faith Cranor,et al. Location-Sharing Technologies: Privacy Risks and Controls , 2009 .
[69] David Jurgens,et al. That's What Friends Are For: Inferring Location in Online Social Media Platforms Based on Social Relationships , 2013, ICWSM.
[70] Alex Pentland,et al. Reality mining: sensing complex social systems , 2006, Personal and Ubiquitous Computing.
[71] Panayiotis Kotzanikolaou,et al. Lightweight private proximity testing for geospatial social networks , 2016, Comput. Commun..
[72] Louis D. Brandeis,et al. The Right to Privacy , 1890 .
[73] P. Meier. Crisis Mapping in Action: How Open Source Software and Global Volunteer Networks Are Changing the World, One Map at a Time , 2012 .
[74] Jeremy W. Crampton,et al. Cartographic Rationality and the Politics of Geosurveillance and Security , 2003 .
[75] Sushil Jajodia,et al. Privacy in geo-social networks: proximity notification with untrusted service providers and curious buddies , 2010, The VLDB Journal.
[76] C. Cottrill,et al. Location privacy preferences: A survey-based analysis of consumer awareness, trade-off and decision-making , 2015 .
[77] Amy J. Blatt,et al. Data Privacy and Ethical Uses of Volunteered Geographic Information , 2015 .
[78] Alessandro Acquisti,et al. Gone in 15 Seconds: The Limits of Privacy Transparency and Control , 2013, IEEE Security & Privacy.
[79] J. Reiman. Driving to the Panopticon: A Philosophical Exploration of the Risks to Privacy Posed by the Highway Technology of the Future , 1995 .
[80] Minh-Triet Tran,et al. Binomial-Mix-Based Location Anonymizer System with Global Dummy Generation to Preserve User Location Privacy in Location-Based Services , 2010, 2010 International Conference on Availability, Reliability and Security.
[81] Michele Bezzi,et al. An information theoretic approach for privacy metrics , 2010, Trans. Data Priv..
[82] Brian Neil Levine,et al. Turning Off GPS Is Not Enough: Cellular Location Leaks over the Internet , 2013, Privacy Enhancing Technologies.
[83] Ian Goldberg,et al. Louis, Lester and Pierre: Three Protocols for Location Privacy , 2007, Privacy Enhancing Technologies.
[84] Ian Goodfellow,et al. Deep Learning with Differential Privacy , 2016, CCS.
[85] Jean-Pierre Hubaux,et al. On Non-cooperative Genomic Privacy , 2015, Financial Cryptography.
[86] M. Foucault,et al. Discipline and Punish: The Birth of the Prison , 2020, On Violence.
[87] Yu Zheng,et al. Location-Based Social Networks: Users , 2011, Computing with Spatial Trajectories.
[88] Jean-Pierre Hubaux,et al. Quantifying Interdependent Privacy Risks with Location Data , 2017, IEEE Transactions on Mobile Computing.
[89] Frédéric Raynal,et al. New threats and attacks on the World Wide Web , 2006, IEEE Security & Privacy.
[90] Panos Kalnis,et al. Private queries in location based services: anonymizers are not necessary , 2008, SIGMOD Conference.
[91] Bartha Maria Knoppers,et al. Exposing participants? Population biobanks go geo , 2015, European Journal of Human Genetics.
[92] Satish V. Ukkusuri,et al. Urban activity pattern classification using topic models from online geo-location data , 2014 .
[93] Marco Gruteser,et al. On the Anonymity of Periodic Location Samples , 2005, SPC.
[94] S. Chainey,et al. Engagement, Empowerment and Transparency: Publishing Crime Statistics using Online Crime Mapping , 2012 .
[95] Xiaohui Liang,et al. Privacy Leakage of Location Sharing in Mobile Social Networks: Attacks and Defense , 2016, IEEE Transactions on Dependable and Secure Computing.
[96] Hui Xiong,et al. Enhancing Security and Privacy in Traffic-Monitoring Systems , 2006, IEEE Pervasive Computing.
[97] Francis Harvey,et al. To Volunteer or to Contribute Locational Information? Towards Truth in Labeling for Crowdsourced Geographic Information , 2013 .
[98] Jianliang Xu,et al. Nearby Friend Alert: Location Anonymity in Mobile Geosocial Networks , 2013, IEEE Pervasive Computing.
[99] Rob Kitchin,et al. Data-Driven, Networked Urbanism , 2015 .
[100] Christian S. Jensen,et al. Preserving location and absence privacy in geo-social networks , 2010, CIKM '10.
[101] Philippe Golle,et al. On the Anonymity of Home/Work Location Pairs , 2009, Pervasive.
[102] Martin Ortlieb,et al. "If You Put All The Pieces Together...": Attitudes Towards Data Combination and Sharing Across Services and Companies , 2016, CHI.
[103] Nikolaos Polatidis,et al. A Method for Privacy-Preserving Context-Aware Mobile Recommendations , 2015, e-Democracy.
[104] Zhe Zhu,et al. What's Your Next Move: User Activity Prediction in Location-based Social Networks , 2013, SDM.
[105] Mirco Musolesi,et al. It's the way you check-in: identifying users in location-based social networks , 2014, COSN '14.
[106] Cristian Borcea,et al. GDC: Group Discovery Using Co-location Traces , 2010, 2010 IEEE Second International Conference on Social Computing.
[107] Anabel Quan-Haase,et al. PRIVACY PROTECTION STRATEGIES ON FACEBOOK , 2013 .
[108] Krzysztof Janowicz,et al. Where is also about time: A location-distortion model to improve reverse geocoding using behavior-driven temporal semantic signatures , 2015, Comput. Environ. Urban Syst..
[109] Ove Andersen,et al. A Location Privacy Aware Friend Locator , 2009, SSTD.
[110] Andrei Sabelfeld,et al. Understanding and Enforcing Opacity , 2015, 2015 IEEE 28th Computer Security Foundations Symposium.