Leading Attacks in Privacy Protection Domain

[1]  Shengli Xie,et al.  MixGroup: Accumulative Pseudonym Exchanging for Location Privacy Enhancement in Vehicular Social Networks , 2016, IEEE Transactions on Dependable and Secure Computing.

[2]  Jie Yang,et al.  Multi-lateral privacy-preserving localization in pervasive environments , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[3]  Xu An Wang,et al.  A privacy-preserving fuzzy interest matching protocol for friends finding in social networks , 2018, Soft Comput..

[4]  Claudio Bettini,et al.  JS-Reduce: Defending Your Data from Sequential Background Knowledge Attacks , 2012, IEEE Transactions on Dependable and Secure Computing.

[5]  Qi Li,et al.  Achieving Content-Oriented Anonymity with CRISP , 2017, IEEE Transactions on Dependable and Secure Computing.

[6]  Xiao Lu,et al.  Real-Time and Spatio-Temporal Crowd-Sourced Social Network Data Publishing with Differential Privacy , 2018, IEEE Transactions on Dependable and Secure Computing.

[7]  Qian Zhang,et al.  Privacy Preservation for Context Sensing on Smartphone , 2016, IEEE/ACM Transactions on Networking.

[8]  Ahmed Ahmim,et al.  Privacy-Preserving Schemes for Ad Hoc Social Networks: A Survey , 2016, IEEE Communications Surveys & Tutorials.

[9]  Haining Wang,et al.  Privacy Risk Assessment on Email Tracking , 2018, IEEE INFOCOM 2018 - IEEE Conference on Computer Communications.

[10]  Amir Houmansadr,et al.  Comprehensive Privacy Analysis of Deep Learning: Passive and Active White-box Inference Attacks against Centralized and Federated Learning , 2018, 2019 IEEE Symposium on Security and Privacy (SP).

[11]  Jiguo Yu,et al.  Mutual Privacy Preserving $k$ -Means Clustering in Social Participatory Sensing , 2017, IEEE Transactions on Industrial Informatics.

[12]  K. Liu,et al.  Towards identity anonymization on graphs , 2008, SIGMOD Conference.

[13]  Emiliano De Cristofaro,et al.  Privacy in content-oriented networking: threats and countermeasures , 2012, CCRV.

[14]  Xiaolei Dong,et al.  Security and privacy in cloud-assisted wireless wearable communications: Challenges, solutions, and future directions , 2015, IEEE Wireless Communications.

[15]  Peng Gao,et al.  Exploiting Temporal Dynamics in Sybil Defenses , 2015, CCS.

[16]  Hai Liu,et al.  Spatiotemporal correlation-aware dummy-based privacy protection scheme for location-based services , 2017, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.

[17]  Hong Li,et al.  Image and Attribute Based Convolutional Neural Network Inference Attacks in Social Networks , 2020, IEEE Transactions on Network Science and Engineering.

[18]  H. T. Mouftah,et al.  Privacy preserving broadcast message authentication protocol for VANETs , 2013, J. Netw. Comput. Appl..

[19]  Elisa Bertino,et al.  Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks , 2015, IEEE Transactions on Dependable and Secure Computing.

[20]  Yaoxue Zhang,et al.  Socially-Driven Learning-Based Prefetching in Mobile Online Social Networks , 2017, IEEE/ACM Transactions on Networking.

[21]  Yizheng Chen,et al.  Practical Attacks Against Graph-based Clustering , 2017, CCS.

[22]  Shui Yu,et al.  Big Privacy: Challenges and Opportunities of Privacy Study in the Age of Big Data , 2016, IEEE Access.

[23]  Agusti Solanas,et al.  The pursuit of citizens' privacy: a privacy-aware smart city is possible , 2013, IEEE Communications Magazine.

[24]  Frank Stajano,et al.  Location Privacy in Pervasive Computing , 2003, IEEE Pervasive Comput..

[25]  Sherali Zeadally,et al.  An Analysis of RFID Authentication Schemes for Internet of Things in Healthcare Environment Using Elliptic Curve Cryptography , 2015, IEEE Internet of Things Journal.

[26]  Shouling Ji,et al.  General Graph Data De-Anonymization , 2016, ACM Trans. Inf. Syst. Secur..

[27]  Prateek Mittal,et al.  Graph Data Anonymization, De-Anonymization Attacks, and De-Anonymizability Quantification: A Survey , 2017, IEEE Communications Surveys & Tutorials.

[28]  Daniele Quercia,et al.  Sybil Attacks Against Mobile Users: Friends and Foes to the Rescue , 2010, 2010 Proceedings IEEE INFOCOM.

[29]  Jong Kim,et al.  Inference Attack on Browsing History of Twitter Users Using Public Click Analytics and Twitter Metadata , 2016, IEEE Transactions on Dependable and Secure Computing.