Analysis of privacy and utility tradeoffs in anonymized mobile context streams
暂无分享,去创建一个
[1] H. Vincent Poor,et al. A theory of utility and privacy of data sources , 2010, 2010 IEEE International Symposium on Information Theory.
[2] Kazuhiro Minami. Preventing denial-of-request inference attacks in location-sharing services , 2014, 2014 Seventh International Conference on Mobile Computing and Ubiquitous Networking (ICMU).
[3] Suman Nath,et al. MaskIt: privately releasing user context streams for personalized mobile applications , 2012, SIGMOD Conference.
[4] Lorrie Faith Cranor,et al. Location-Sharing Technologies: Privacy Risks and Controls , 2009 .
[5] Ninghui Li,et al. On the tradeoff between privacy and utility in data publishing , 2009, KDD.
[6] Andreas Krause,et al. A Utility-Theoretic Approach to Privacy in Online Services , 2010, J. Artif. Intell. Res..
[7] Vitaly Shmatikov,et al. The cost of privacy: destruction of data-mining utility in anonymized data publishing , 2008, KDD.
[8] Nikita Borisov,et al. Protecting location privacy against inference attacks , 2010, WPES '10.
[9] Tzung-Pei Hong,et al. Anonymizing Shortest Paths on Social Network Graphs , 2011, ACIIDS.
[10] Sung-Bae Cho,et al. Predicting user Activities in the Sequence of Mobile Context for Ambient Intelligence Environment using Dynamic Bayesian Network , 2010, ICAART.
[11] Hao Chen,et al. AndroidLeaks: Automatically Detecting Potential Privacy Leaks in Android Applications on a Large Scale , 2012, TRUST.
[12] Yan Zhu,et al. Tap-Wave-Rub: lightweight malware prevention for smartphones using intuitive human gestures , 2013, WiSec '13.
[13] Meng-Chieh Chiu,et al. Leveraging graphical models to improve accuracy and reduce privacy risks of mobile sensing , 2013, MobiSys '13.
[14] Tzung-Pei Hong,et al. Anonymizing Set-Valued Social Data , 2010, 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing.
[15] Malcolm Hall,et al. ProtectMyPrivacy: detecting and mitigating privacy leaks on iOS devices using crowdsourcing , 2013, MobiSys '13.