Leading Attacks in Privacy Protection Domain
暂无分享,去创建一个
[1] Shengli Xie,et al. MixGroup: Accumulative Pseudonym Exchanging for Location Privacy Enhancement in Vehicular Social Networks , 2016, IEEE Transactions on Dependable and Secure Computing.
[2] Jie Yang,et al. Multi-lateral privacy-preserving localization in pervasive environments , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.
[3] Xu An Wang,et al. A privacy-preserving fuzzy interest matching protocol for friends finding in social networks , 2018, Soft Comput..
[4] Claudio Bettini,et al. JS-Reduce: Defending Your Data from Sequential Background Knowledge Attacks , 2012, IEEE Transactions on Dependable and Secure Computing.
[5] Qi Li,et al. Achieving Content-Oriented Anonymity with CRISP , 2017, IEEE Transactions on Dependable and Secure Computing.
[6] Xiao Lu,et al. Real-Time and Spatio-Temporal Crowd-Sourced Social Network Data Publishing with Differential Privacy , 2018, IEEE Transactions on Dependable and Secure Computing.
[7] Qian Zhang,et al. Privacy Preservation for Context Sensing on Smartphone , 2016, IEEE/ACM Transactions on Networking.
[8] Ahmed Ahmim,et al. Privacy-Preserving Schemes for Ad Hoc Social Networks: A Survey , 2016, IEEE Communications Surveys & Tutorials.
[9] Haining Wang,et al. Privacy Risk Assessment on Email Tracking , 2018, IEEE INFOCOM 2018 - IEEE Conference on Computer Communications.
[10] Amir Houmansadr,et al. Comprehensive Privacy Analysis of Deep Learning: Passive and Active White-box Inference Attacks against Centralized and Federated Learning , 2018, 2019 IEEE Symposium on Security and Privacy (SP).
[11] Jiguo Yu,et al. Mutual Privacy Preserving $k$ -Means Clustering in Social Participatory Sensing , 2017, IEEE Transactions on Industrial Informatics.
[12] K. Liu,et al. Towards identity anonymization on graphs , 2008, SIGMOD Conference.
[13] Emiliano De Cristofaro,et al. Privacy in content-oriented networking: threats and countermeasures , 2012, CCRV.
[14] Xiaolei Dong,et al. Security and privacy in cloud-assisted wireless wearable communications: Challenges, solutions, and future directions , 2015, IEEE Wireless Communications.
[15] Peng Gao,et al. Exploiting Temporal Dynamics in Sybil Defenses , 2015, CCS.
[16] Hai Liu,et al. Spatiotemporal correlation-aware dummy-based privacy protection scheme for location-based services , 2017, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.
[17] Hong Li,et al. Image and Attribute Based Convolutional Neural Network Inference Attacks in Social Networks , 2020, IEEE Transactions on Network Science and Engineering.
[18] H. T. Mouftah,et al. Privacy preserving broadcast message authentication protocol for VANETs , 2013, J. Netw. Comput. Appl..
[19] Elisa Bertino,et al. Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks , 2015, IEEE Transactions on Dependable and Secure Computing.
[20] Yaoxue Zhang,et al. Socially-Driven Learning-Based Prefetching in Mobile Online Social Networks , 2017, IEEE/ACM Transactions on Networking.
[21] Yizheng Chen,et al. Practical Attacks Against Graph-based Clustering , 2017, CCS.
[22] Shui Yu,et al. Big Privacy: Challenges and Opportunities of Privacy Study in the Age of Big Data , 2016, IEEE Access.
[23] Agusti Solanas,et al. The pursuit of citizens' privacy: a privacy-aware smart city is possible , 2013, IEEE Communications Magazine.
[24] Frank Stajano,et al. Location Privacy in Pervasive Computing , 2003, IEEE Pervasive Comput..
[25] Sherali Zeadally,et al. An Analysis of RFID Authentication Schemes for Internet of Things in Healthcare Environment Using Elliptic Curve Cryptography , 2015, IEEE Internet of Things Journal.
[26] Shouling Ji,et al. General Graph Data De-Anonymization , 2016, ACM Trans. Inf. Syst. Secur..
[27] Prateek Mittal,et al. Graph Data Anonymization, De-Anonymization Attacks, and De-Anonymizability Quantification: A Survey , 2017, IEEE Communications Surveys & Tutorials.
[28] Daniele Quercia,et al. Sybil Attacks Against Mobile Users: Friends and Foes to the Rescue , 2010, 2010 Proceedings IEEE INFOCOM.
[29] Jong Kim,et al. Inference Attack on Browsing History of Twitter Users Using Public Click Analytics and Twitter Metadata , 2016, IEEE Transactions on Dependable and Secure Computing.