An information-aware visualization for privacy-preserving accelerometer data sharing
暂无分享,去创建一个
Ying Zhao | Dan Meng | Mingming Lu | Chengzhi Li | Fengjun Xiao | Juncai Li | Soumia Menasria | Shangsheng Xie | Ying Zhao | Chengzhi Li | Dan Meng | Shangsheng Xie | Fengjun Xiao | Mingming Lu | Soumia Menasria | Juncai Li
[1] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[2] Ashwin Machanavajjhala,et al. l-Diversity: Privacy Beyond k-Anonymity , 2006, ICDE.
[3] Luís A. Castro,et al. Towards a federated repository of mobile sensing datasets for pervasive healthcare , 2016, PervasiveHealth.
[4] Ahmad Akbari,et al. An improved feature transformation method using mutual information , 2014, Int. J. Speech Technol..
[5] Valli Kumari Vatsavayi,et al. Cooperative privacy game: a novel strategy for preserving privacy in data publishing , 2016, Human-centric Computing and Information Sciences.
[6] Yuqing Chen,et al. A Deep Learning Approach to Human Activity Recognition Based on Single Accelerometer , 2015, 2015 IEEE International Conference on Systems, Man, and Cybernetics.
[7] Jin Li,et al. Privacy-preserving Naive Bayes classifiers secure against the substitution-then-comparison attack , 2018, Inf. Sci..
[8] Yasushi Makihara,et al. The largest inertial sensor-based gait database and performance evaluation of gait-based personal authentication , 2014, Pattern Recognit..
[9] Ninghui Li,et al. t-Closeness: Privacy Beyond k-Anonymity and l-Diversity , 2007, 2007 IEEE 23rd International Conference on Data Engineering.
[10] Cem Ersoy,et al. A Review and Taxonomy of Activity Recognition on Mobile Phones , 2013 .
[11] Gary M. Weiss,et al. Cell phone-based biometric identification , 2010, 2010 Fourth IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS).
[12] Tao Peng,et al. Collaborative trajectory privacy preserving scheme in location-based services , 2017, Inf. Sci..
[13] Mikko Lindholm,et al. Identifying people from gait pattern with accelerometers , 2005, SPIE Defense + Commercial Sensing.
[14] Nathan Chenette,et al. Order-Preserving Symmetric Encryption , 2009, IACR Cryptol. ePrint Arch..
[15] Qin Liu,et al. Hierarchical Multi-Authority and Attribute-Based Encryption Friend Discovery Scheme in Mobile Social Networks , 2016, IEEE Communications Letters.
[16] Arpita Ghosh,et al. Inferential Privacy Guarantees for Differentially Private Mechanisms , 2016, ITCS.
[17] Gary M. Weiss,et al. Activity recognition using cell phone accelerometers , 2011, SKDD.
[18] Paul J. M. Havinga,et al. A Survey of Online Activity Recognition Using Mobile Phones , 2015, Sensors.
[19] Jemal H. Abawajy,et al. Privacy-preserving multi-hop profile-matching protocol for proximity mobile social networks , 2017, Future Gener. Comput. Syst..
[20] Mimmo Parente,et al. An AmI-based and privacy-preserving shopping mall model , 2017, Human-centric Computing and Information Sciences.
[21] Dan Meng,et al. An Information-Aware Privacy-Preserving Accelerometer Data Sharing , 2017, ICPCSEE.
[22] Alastair R. Beresford,et al. Device Analyzer: Understanding Smartphone Usage , 2013, MobiQuitous.
[23] Bruno Lepri,et al. Investigating Factors Affecting Personal Data Disclosure , 2015, WWW.
[24] Siu-Ming Yiu,et al. Multi-key privacy-preserving deep learning in cloud computing , 2017, Future Gener. Comput. Syst..
[25] Jihoon Kim,et al. PRINCESS: Privacy‐protecting Rare disease International Network Collaboration via Encryption through Software guard extensionS , 2017, Bioinform..
[26] Vassilis Koutkias,et al. A Survey of Mobile Phone Sensing, Self-Reporting, and Social Sharing for Pervasive Healthcare , 2017, IEEE Journal of Biomedical and Health Informatics.
[27] Patrick Bours,et al. Gait and activity recognition using commercial phones , 2013, Comput. Secur..
[28] Mark S. Nixon,et al. Gait Feature Subset Selection by Mutual Information , 2007, 2007 First IEEE International Conference on Biometrics: Theory, Applications, and Systems.
[29] Xuan Li,et al. Cloud-assisted privacy-preserving profile-matching scheme under multiple keys in mobile social network , 2018, Cluster Computing.
[30] Corrado Moiso,et al. Anonymous or Not? Understanding the Factors Affecting Personal Mobile Data Disclosure , 2017, ACM Trans. Internet Techn..
[31] Ke Wang,et al. Inferential or Differential: Privacy Laws Dictate , 2012, ArXiv.
[32] Norman Sadeh,et al. Understanding and capturing people's mobile app privacy preferences , 2013 .
[33] Roberto Battiti,et al. Using mutual information for selecting features in supervised neural net learning , 1994, IEEE Trans. Neural Networks.
[34] Wendy Hui Wang,et al. Privacy-preserving data publishing , 2010, 2010 IEEE 26th International Conference on Data Engineering Workshops (ICDEW 2010).
[35] Ramakrishnan Srikant,et al. Privacy-preserving data mining , 2000, SIGMOD '00.
[36] Ashwin Machanavajjhala,et al. Privacy-Preserving Data Publishing , 2009, Found. Trends Databases.
[37] Jane Labadin,et al. Feature selection based on mutual information , 2015, 2015 9th International Conference on IT in Asia (CITA).
[38] Nobuhiko Nishio,et al. HASC Challenge: gathering large scale human activity corpus for the real-world activity understandings , 2011, AH '11.
[39] Jie Wu,et al. Preserving Privacy with Probabilistic Indistinguishability in Weighted Social Networks , 2017, IEEE Transactions on Parallel and Distributed Systems.
[40] Nabil R. Adam,et al. Security-control methods for statistical databases: a comparative study , 1989, ACM Comput. Surv..
[41] Ki-Ryong Kwon,et al. Selective Encryption Algorithm Using Hybrid Transform for GIS Vector Map , 2017, J. Inf. Process. Syst..
[42] Keke Gai,et al. Privacy-Preserving Data Encryption Strategy for Big Data in Mobile Cloud Computing , 2017, IEEE Transactions on Big Data.
[43] Philip S. Yu,et al. Privacy-preserving data publishing: A survey of recent developments , 2010, CSUR.
[44] Xianxia Zou,et al. Query with SUM Aggregate Function on Encrypted Floating-Point Numbers in Cloud , 2017, J. Inf. Process. Syst..
[45] Sabina Jeschke,et al. Mobile Crowd‐Sensing for Smart Cities , 2017 .
[46] Cynthia Dwork. International Conference on Theory and Applications of Models of Computation , 2008 .