Privacy-preserving high-quality map generation with participatory sensing
暂无分享,去创建一个
Xi Chen | Yunhao Liu | Xiaopei Wu | Xiang-Yang Li | Yuan He | X. Chen | Xiangyang Li | Yunhao Liu | Xiaopei Wu | Yuan He
[1] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[2] Peter Steenkiste,et al. Protecting Access to People Location Information , 2003, SPC.
[3] Taeho Jung,et al. Search me if you can: Privacy-preserving location query service , 2012, 2013 Proceedings IEEE INFOCOM.
[4] Dominique Attali. R-regular Shape Reconstruction from Unorganized Points , 1998, Comput. Geom..
[5] Guobin Shen,et al. Walkie-Markie: Indoor Pathway Mapping Made Easy , 2013, NSDI.
[6] Yunhao Liu,et al. Accurate Indoor Localization Using Acoustic Direction Finding via Smart Phones , 2013, ArXiv.
[7] Desheng Zhang,et al. Acc: generic on-demand accelerations for neighbor discovery in mobile applications , 2012, SenSys '12.
[8] Kazuo Murota,et al. A fast Voronoi-diagram algorithm with applications to geographical optimization problems , 1984 .
[9] Frank Stajano,et al. Location Privacy in Pervasive Computing , 2003, IEEE Pervasive Comput..
[10] Yin Wang,et al. CrowdAtlas: self-updating maps for cloud and personal use , 2013, MobiSys '13.
[11] Wenliang Du,et al. Secure multi-party computation problems and their applications: a review and open problems , 2001, NSPW '01.
[12] Samir Khuller,et al. The Budgeted Maximum Coverage Problem , 1999, Inf. Process. Lett..
[13] Suman Nath,et al. MaskIt: privately releasing user context streams for personalized mobile applications , 2012, SIGMOD Conference.
[14] Xiang-Yang Li,et al. Privacy preserving cloud data access with multi-authorities , 2012, 2013 Proceedings IEEE INFOCOM.
[15] Qin Zhang,et al. Applying Filtering Techniques to Improve GPS Positioning Accuracy , 2001 .
[16] Dominique Attali,et al. r-regular shape reconstruction from unorganized points , 1997, SCG '97.
[17] David Eppstein,et al. The Crust and the beta-Skeleton: Combinatorial Curve Reconstruction , 1998, Graph. Model. Image Process..
[18] L. Figueiredo,et al. Computational morphology of curves , 1994, The Visual Computer.
[19] Remco C. Veltkamp,et al. The gamma-neighborhood Graph , 1992, Comput. Geom..
[20] Yunhao Liu,et al. Localization of Wireless Sensor Networks in the Wild: Pursuit of Ranging Quality , 2013, IEEE/ACM Transactions on Networking.
[21] D. Kirkpatrick,et al. A Framework for Computational Morphology , 1985 .
[22] Nigel Davies,et al. Preserving Privacy in Environments with Location-Based Applications , 2003, IEEE Pervasive Comput..
[23] Tetsuji Satoh,et al. An anonymous communication technique using dummies for location-based services , 2005, ICPS '05. Proceedings. International Conference on Pervasive Services, 2005..
[24] Xiang-Yang Li,et al. SmartLoc: push the limit of the inertial sensor based metropolitan localization using smartphone , 2013, MobiCom.
[25] Chandrajit L. Bajaj,et al. Sampling and reconstructing manifolds using alpha-shapes , 1997, CCCG.
[26] Patrick Weber,et al. OpenStreetMap: User-Generated Street Maps , 2008, IEEE Pervasive Computing.
[27] Xiang-Yang Li,et al. You're driving and texting: detecting drivers using personal smart phones by leveraging inertial sensors , 2013, MobiCom.
[28] Jiung-yao Huang,et al. Improve GPS positioning accuracy with context awareness , 2008, 2008 First IEEE International Conference on Ubi-Media Computing.
[29] Frank Stajano,et al. Mix zones: user privacy in location-aware services , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.
[30] Malcolm Hall,et al. ProtectMyPrivacy: detecting and mitigating privacy leaks on iOS devices using crowdsourcing , 2013, MobiSys '13.
[31] D. Mavriplis. An advancing front Delaunay triangulation algorithm designed for robustness , 1993 .