Inference Attacks on Location Tracks
暂无分享,去创建一个
[1] Massimo Barbaro,et al. A Face Is Exposed for AOL Searcher No , 2006 .
[2] George Danezis,et al. How Much Is Location Privacy Worth? , 2005, WEIS.
[3] David J. Scott,et al. Spatial Security Policies for Mobile Agents in a Sentient Computing Environment , 2003, FASE.
[4] Paul Dourish,et al. UbiComp 2006: Ubiquitous Computing, 8th International Conference, UbiComp 2006, Orange County, CA, USA, September 17-21, 2006 , 2006, UbiComp.
[5] Henry A. Kautz,et al. Location-Based Activity Recognition using Relational Markov Networks , 2005, IJCAI.
[6] Lars Kulik,et al. Location privacy and location-aware computing , 2006 .
[7] Hannes Federrath. Designing Privacy Enhancing Technologies , 2001, Lecture Notes in Computer Science.
[8] Jeff A. Bilmes,et al. Recognizing Activities and Spatial Context Using Wearable Sensors , 2006, UAI.
[9] Krzysztof Z. Gajos,et al. Opportunity Knocks: A System to Provide Cognitive Assistance with Transportation Services , 2004, UbiComp.
[10] Stefan Lorkowski,et al. TOWARDS AREA-WIDE TRAFFIC MONITORING-APPLICATIONS DERIVED FROM PROBE VEHICLE DATA , 2004 .
[11] Tara Matthews,et al. Location disclosure to social relations: why, when, & what people want to share , 2005, CHI.
[12] Eric Horvitz,et al. Web-Enhanced GPS , 2005, LoCA.
[13] Jun Rekimoto,et al. UbiComp 2005: Ubiquitous Computing, 7th International Conference, UbiComp 2005, Tokyo, Japan, September 11-14, 2005, Proceedings , 2005, UbiComp.
[14] Thad Starner,et al. Using GPS to learn significant locations and predict movement across multiple users , 2003, Personal and Ubiquitous Computing.
[15] Gaetano Borriello,et al. Extracting places from traces of locations , 2004, MOCO.
[16] Marco Gruteser,et al. USENIX Association , 1992 .
[17] Yehuda Lindell,et al. Privacy Preserving Data Mining , 2002, Journal of Cryptology.
[18] Andreas Pfitzmann,et al. Anonymity, Unobservability, and Pseudonymity - A Proposal for Terminology , 2000, Workshop on Design Issues in Anonymity and Unobservability.
[19] Pierangela Samarati,et al. Location privacy in pervasive computing , 2008 .
[20] Gregory D. Abowd,et al. Control, Deception, and Communication: Evaluating the Deployment of a Location-Enhanced Messaging Service , 2005, UbiComp.
[21] Eric Horvitz,et al. Trip Router with Individualized Preferences (TRIP): Incorporating Personalization into Route Planning , 2006, AAAI.
[22] Natalia Marmasse,et al. Providing lightweight telepresence in mobile communication to enhance collaborative living , 2004 .
[23] George Buchanan,et al. An Evaluation of WebTwig - A Site Outliner for Handheld Web Access , 1999, HUC.
[24] Chris Schmandt,et al. Location-Aware Information Delivery with ComMotion , 2000, HUC.
[25] Hui Xiong,et al. Enhancing Security and Privacy in Traffic-Monitoring Systems , 2006, IEEE Pervasive Computing.
[26] Eric Horvitz,et al. Predestination: Inferring Destinations from Partial Trajectories , 2006, UbiComp.
[27] Eija Kaasinen,et al. User needs for location-aware mobile services , 2003, Personal and Ubiquitous Computing.
[28] Marco Gruteser,et al. Wireless Location Privacy Protection , 2003, Computer.
[29] Sunny Consolvo,et al. Learning and Recognizing the Places We Go , 2005, UbiComp.
[30] Kentaro Toyama,et al. Project Lachesis: Parsing and Modeling Location Histories , 2004, GIScience.
[31] Perdita Stevens,et al. Modelling Recursive Calls with UML State Diagrams , 2003, FASE.
[32] Nigel Davies,et al. UbiComp 2004: Ubiquitous Computing , 2004, Lecture Notes in Computer Science.
[33] Bernt Schiele,et al. Location- and Context-Awareness, Third International Symposium, LoCA 2007, Oberpfaffenhofen, Germany, September 20-21, 2007, Proceedings , 2007, LoCA.