Analysis of privacy and utility tradeoffs in anonymized mobile context streams

[1]  H. Vincent Poor,et al.  A theory of utility and privacy of data sources , 2010, 2010 IEEE International Symposium on Information Theory.

[2]  Kazuhiro Minami Preventing denial-of-request inference attacks in location-sharing services , 2014, 2014 Seventh International Conference on Mobile Computing and Ubiquitous Networking (ICMU).

[3]  Suman Nath,et al.  MaskIt: privately releasing user context streams for personalized mobile applications , 2012, SIGMOD Conference.

[4]  Lorrie Faith Cranor,et al.  Location-Sharing Technologies: Privacy Risks and Controls , 2009 .

[5]  Ninghui Li,et al.  On the tradeoff between privacy and utility in data publishing , 2009, KDD.

[6]  Andreas Krause,et al.  A Utility-Theoretic Approach to Privacy in Online Services , 2010, J. Artif. Intell. Res..

[7]  Vitaly Shmatikov,et al.  The cost of privacy: destruction of data-mining utility in anonymized data publishing , 2008, KDD.

[8]  Nikita Borisov,et al.  Protecting location privacy against inference attacks , 2010, WPES '10.

[9]  Tzung-Pei Hong,et al.  Anonymizing Shortest Paths on Social Network Graphs , 2011, ACIIDS.

[10]  Sung-Bae Cho,et al.  Predicting user Activities in the Sequence of Mobile Context for Ambient Intelligence Environment using Dynamic Bayesian Network , 2010, ICAART.

[11]  Hao Chen,et al.  AndroidLeaks: Automatically Detecting Potential Privacy Leaks in Android Applications on a Large Scale , 2012, TRUST.

[12]  Yan Zhu,et al.  Tap-Wave-Rub: lightweight malware prevention for smartphones using intuitive human gestures , 2013, WiSec '13.

[13]  Meng-Chieh Chiu,et al.  Leveraging graphical models to improve accuracy and reduce privacy risks of mobile sensing , 2013, MobiSys '13.

[14]  Tzung-Pei Hong,et al.  Anonymizing Set-Valued Social Data , 2010, 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing.

[15]  Malcolm Hall,et al.  ProtectMyPrivacy: detecting and mitigating privacy leaks on iOS devices using crowdsourcing , 2013, MobiSys '13.