Privacy Protection against Query Prediction in Location-Based Services
暂无分享,去创建一个
[1] Anind K. Dey,et al. Navigate like a cabbie: probabilistic reasoning from observed context-aware behavior , 2008, UbiComp.
[2] Nicholas R. Jennings,et al. Modelling heterogeneous location habits in human populations for location prediction under data sparsity , 2013, UbiComp.
[3] Ahmed Eldawy,et al. MNTG: An Extensible Web-Based Traffic Generator , 2013, SSTD.
[4] Shicong Meng,et al. Anonymizing continuous queries with delay-tolerant mix-zones over road networks , 2014, Distributed and Parallel Databases.
[5] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[6] Ling Liu,et al. MobiMix: Protecting location privacy with mix-zones over road networks , 2011, 2011 IEEE 27th International Conference on Data Engineering.
[7] Wen-Jing Hsu,et al. Brownian Bridge Model for High Resolution Location Predictions , 2014, PAKDD.
[8] Frank Dürr,et al. A classification of location privacy attacks and approaches , 2012, Personal and Ubiquitous Computing.
[9] Elisa Bertino,et al. Privacy-Preserving and Content-Protecting Location Based Queries , 2012, 2012 IEEE 28th International Conference on Data Engineering.
[10] Kyriakos Mouratidis,et al. Shortest Path Computation with No Information Leakage , 2012, Proc. VLDB Endow..
[11] Huiping Lin,et al. Routine Based Analysis for User Classification and Location Prediction , 2012, 2012 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing.
[12] Lorenzo Blanco,et al. Future Locations Prediction with Uncertain Data , 2013, ECML/PKDD.
[13] Hyunjo Lee,et al. Grid-based cloaking area creation scheme supporting continuous location-based services , 2012, SAC '12.
[14] Walid G. Aref,et al. Casper*: Query processing for location services without compromising privacy , 2006, TODS.
[15] Carmela Troncoso,et al. Protecting location privacy: optimal strategy against localization attacks , 2012, CCS.
[16] Marco Gruteser,et al. USENIX Association , 1992 .
[17] Cynthia Dwork,et al. Differential Privacy , 2006, ICALP.
[18] Xing Xie,et al. Destination prediction by sub-trajectory synthesis and privacy protection against such prediction , 2013, 2013 IEEE 29th International Conference on Data Engineering (ICDE).
[19] Jean-Yves Le Boudec,et al. Quantifying Location Privacy , 2011, 2011 IEEE Symposium on Security and Privacy.
[20] Catuscia Palamidessi,et al. Geo-indistinguishability: differential privacy for location-based systems , 2012, CCS.
[21] Stavros Papadopoulos,et al. Nearest neighbor search with strong location privacy , 2010, Proc. VLDB Endow..
[22] Tanzima Hashem,et al. Countering overlapping rectangle privacy attack for moving kNN queries , 2013, Inf. Syst..
[23] Jong Kim,et al. Protecting location privacy using location semantics , 2011, KDD.
[24] Francesco Bonchi,et al. Never Walk Alone: Uncertainty for Anonymity in Moving Objects Databases , 2008, 2008 IEEE 24th International Conference on Data Engineering.
[25] Wang-Chien Lee,et al. Mining geographic-temporal-semantic patterns in trajectories for location prediction , 2013, ACM Trans. Intell. Syst. Technol..
[26] Zhe Zhu,et al. What's Your Next Move: User Activity Prediction in Location-based Social Networks , 2013, SDM.