Trajectory Protection Schemes Based on a Gravity Mobility Model in IoT
暂无分享,去创建一个
Qiong Wu | Cui Zhang | Qiang Fan | Zhengquan Li | Kan Wang | Hanxu Liu | Qiong Wu | Q. Fan | Cui Zhang | Zhengquan Li | Hanxu Liu | Kan Wang
[1] Benjamin C. M. Fung,et al. Differentially Private Trajectory Data Publication , 2011, ArXiv.
[2] Cong Sun,et al. Balancing trajectory privacy and data utility using a personalized anonymization model , 2014, J. Netw. Comput. Appl..
[3] Ruggero G. Pensa,et al. Pattern-Preserving k-Anonymization of Sequences and its Application to Mobil- ity Data Mining , 2008, PiLBA.
[4] Jordi Forné,et al. Measuring the privacy of user profiles in personalized information systems , 2014, Future Gener. Comput. Syst..
[5] Ying Cai,et al. Feeling-based location privacy protection for location-based services , 2009, CCS.
[6] Reza Shokri,et al. Synthesizing Plausible Privacy-Preserving Location Traces , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[7] Khaled Ben Letaief,et al. Coordinated Beamforming With Artificial Noise for Secure SWIPT Under Non-Linear EH Model: Centralized and Distributed Designs , 2018, IEEE Journal on Selected Areas in Communications.
[8] Tao Peng,et al. Enhanced Location Privacy Preserving Scheme in Location-Based Services , 2017, IEEE Systems Journal.
[9] Xing Xie,et al. GeoLife: A Collaborative Social Networking Service among User, Location and Trajectory , 2010, IEEE Data Eng. Bull..
[10] Christian Kray,et al. Attacking location privacy: exploring human strategies , 2012, UbiComp '12.
[11] Yukio Hayashi,et al. Spatial analysis of centralization and decentralization in the population migration network , 2006, APVIS.
[12] Ke Xiong,et al. Optimal coordinated beamforming with artificial noise for secure SWIPT in multi-cell networks , 2018, EURASIP J. Wirel. Commun. Netw..
[13] Gang Qu,et al. Group Cooperation With Optimal Resource Allocation in Wireless Powered Communication Networks , 2017, IEEE Transactions on Wireless Communications.
[14] Khaled Ben Letaief,et al. Energy Efficiency With Proportional Rate Fairness in Multirelay OFDM Networks , 2015, IEEE Journal on Selected Areas in Communications.
[15] Pingzhi Fan,et al. Optimal Power Allocation With Delay Constraint for Signal Transmission From a Moving Train to Base Stations in High-Speed Railway Scenarios , 2015, IEEE Transactions on Vehicular Technology.
[16] Chi-Yin Chow,et al. Spatiotemporal Sequential Influence Modeling for Location Recommendations , 2015, ACM Trans. Intell. Syst. Technol..
[17] Ying Cai,et al. Exploring Historical Location Data for Anonymity Preservation in Location-Based Services , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[18] E. Jaynes. Information Theory and Statistical Mechanics , 1957 .
[19] Wen-Chih Peng,et al. Dummy-Based Schemes for Protecting Movement Trajectories , 2012, J. Inf. Sci. Eng..
[20] Yücel Saygin,et al. Towards trajectory anonymization: a generalization-based approach , 2008, SPRINGL '08.
[21] Khaled Ben Letaief,et al. Robust Transmit Beamforming With Artificial Redundant Signals for Secure SWIPT System Under Non-Linear EH Model , 2018, IEEE Transactions on Wireless Communications.
[22] Nicholas Jing Yuan,et al. Regularity and Conformity: Location Prediction Using Heterogeneous Mobility Data , 2015, KDD.
[23] Khaled Ben Letaief,et al. Global Energy Efficiency in Secure MISO SWIPT Systems With Non-Linear Power-Splitting EH Model , 2019, IEEE Journal on Selected Areas in Communications.
[24] Pingyi Fan,et al. Delay-Constrained Optimal Link Scheduling in Wireless Sensor Networks , 2010, IEEE Transactions on Vehicular Technology.
[25] Rosen Ivanov. Real-time GPS track simplification algorithm for outdoor navigation of visually impaired , 2012, J. Netw. Comput. Appl..
[26] H. Stanley,et al. Gravity model in the Korean highway , 2007, 0710.1274.
[27] Fenghua Li,et al. Protection of location privacy in continuous LBSs against adversaries with background information , 2016, 2016 International Conference on Computing, Networking and Communications (ICNC).
[28] Wayne K.D. Davies,et al. Urban connectivity in Montana , 1979 .
[29] Muthu Ramachandran,et al. Efficient location privacy algorithm for Internet of Things (IoT) services and applications , 2017, J. Netw. Comput. Appl..
[30] K. J. Ray Liu,et al. Rate-Energy Region of SWIPT for MIMO Broadcasting Under Nonlinear Energy Harvesting Model , 2017, IEEE Transactions on Wireless Communications.
[31] Qinghua Li,et al. Achieving k-anonymity in privacy-aware location-based services , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.
[32] Zhigang Cao,et al. Flexible construction of irregular partitioned permutation LDPC codes with low, error floors , 2005, IEEE Commun. Lett..
[33] Mao Ye,et al. Exploiting geographical influence for collaborative point-of-interest recommendation , 2011, SIGIR.
[34] Guangzhong Sun,et al. A Novel Dummy-Based Mechanism to Protect Privacy on Trajectories , 2014, 2014 IEEE International Conference on Data Mining Workshop.
[35] Hyun Jung La,et al. A conceptual framework for trajectory-based medical analytics with IoT contexts , 2016, J. Comput. Syst. Sci..
[36] S. A. Kulkarni,et al. Real time implementation of k fake location generation algorithm to protect location privacy in location based services , 2017, 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[37] Tetsuji Satoh,et al. An anonymous communication technique using dummies for location-based services , 2005, ICPS '05. Proceedings. International Conference on Pervasive Services, 2005..
[38] F. Calabrese,et al. Urban gravity: a model for inter-city telecommunication flows , 2009, 0905.0692.
[39] Francesco Bonchi,et al. Never Walk Alone: Uncertainty for Anonymity in Moving Objects Databases , 2008, 2008 IEEE 24th International Conference on Data Engineering.
[40] Qiang Li,et al. Influential spatial facility prediction over large scale cyber-physical vehicles in smart city , 2016, EURASIP J. Wirel. Commun. Netw..
[41] Nikos Mamoulis,et al. Privacy Preservation in the Publication of Trajectories , 2008, The Ninth International Conference on Mobile Data Management (mdm 2008).