Introduction : Location Privacy in Mobile Applications

[1]  Frank Dürr,et al.  A classification of location privacy attacks and approaches , 2012, Personal and Ubiquitous Computing.

[2]  Yulong Gu,et al.  We Know Where You Are: Home Location Identification in Location-Based Social Networks , 2016, 2016 25th International Conference on Computer Communication and Networks (ICCCN).

[3]  Eija Kaasinen,et al.  User needs for location-aware mobile services , 2003, Personal and Ubiquitous Computing.

[4]  Tianqing Zhu,et al.  Location Privacy and Its Applications: A Systematic Study , 2018, IEEE Access.

[5]  Jeffrey Nichols,et al.  Home Location Identification of Twitter Users , 2014, TIST.

[6]  Christian S. Jensen,et al.  Location-Related Privacy in Geo-Social Networks , 2011, IEEE Internet Computing.

[7]  Qinghua Li,et al.  Enhancing privacy through caching in location-based services , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).

[8]  Sabrina De Capitani di Vimercati,et al.  An Obfuscation-Based Approach for Protecting Location Privacy , 2011, IEEE Transactions on Dependable and Secure Computing.

[9]  Hajime Watanabe,et al.  Localization Attacks Using Matrix and Tensor Factorization , 2016, IEEE Transactions on Information Forensics and Security.

[10]  Sébastien Gambs,et al.  De-anonymization attack on geolocated data , 2014, J. Comput. Syst. Sci..

[11]  Ilya Kostrikov,et al.  PlaNet - Photo Geolocation with Convolutional Neural Networks , 2016, ECCV.

[12]  Rinku Dewri,et al.  Driving Habits Data: Location Privacy Implications and Solutions , 2017, IEEE Security & Privacy.

[13]  Chi-Yin Chow,et al.  Privacy of Spatial Trajectories , 2011, Computing with Spatial Trajectories.

[14]  Haojin Zhu,et al.  All your location are belong to us: breaking mobile social networks for automated user location tracking , 2013, MobiHoc '14.

[15]  Ken Barker,et al.  A Data Privacy Taxonomy , 2009, BNCOD.