A Survey of Privacy Vulnerabilities of Mobile Device Sensors
暂无分享,去创建一个
Farzin Deravi | Ruben Vera-Rodriguez | Richard Guest | Ruben Tolosana | Paula Delgado-Santos | Giuseppe Stragapede | F. Deravi | R. Vera-Rodríguez | Rubén Tolosana | R. Guest | Paula Delgado-Santos | Giuseppe Stragapede
[1] Aythami Morales,et al. SensitiveNets: Learning Agnostic Representations with Application to Face Images. , 2020, IEEE transactions on pattern analysis and machine intelligence.
[2] Catuscia Palamidessi,et al. Geo-indistinguishability: differential privacy for location-based systems , 2012, CCS.
[3] Charu C. Aggarwal,et al. On the design and quantification of privacy preserving data mining algorithms , 2001, PODS.
[4] Niclas Palmius,et al. SleepAp: An automated obstructive sleep apnoea screening application for smartphones , 2013, Computing in Cardiology 2013.
[5] TemplMatthias. Statistical Disclosure Control for Microdata Using the R-Package sdcMicro , 2008 .
[6] Devu Manikantan Shila,et al. Side channel attack on smartphone sensors to infer gender of the user: poster abstract , 2019, SenSys.
[7] Ge Lin,et al. Classifying Human Activity Patterns from Smartphone Collected GPS data: A Fuzzy Classification and Aggregation Approach , 2016, Trans. GIS.
[8] R. Poovendran,et al. CARAVAN: Providing Location Privacy for VANET , 2005 .
[9] Vivek Kanhangad,et al. Gender recognition in smartphones using touchscreen gestures , 2019, Pattern Recognit. Lett..
[10] Maxim Raya,et al. Mix-Zones for Location Privacy in Vehicular Networks , 2007 .
[11] Hamed Haddadi,et al. A Hybrid Deep Learning Architecture for Privacy-Preserving Mobile Analytics , 2017, IEEE Internet of Things Journal.
[12] Masud Ahmed,et al. Challenges in Sensor-based Human Activity Recognition and a Comparative Analysis of Benchmark Datasets: A Review , 2019, 2019 Joint 8th International Conference on Informatics, Electronics & Vision (ICIEV) and 2019 3rd International Conference on Imaging, Vision & Pattern Recognition (icIVPR).
[13] Amitava Mukherjee,et al. Pervasive Computing: A Paradigm for the 21st Century , 2003, Computer.
[14] Halgurd S. Maghdid,et al. Gait-based Gender Classification Using Smartphone Accelerometer Sensor , 2019, 2019 5th International Conference on Frontiers of Signal Processing (ICFSP).
[15] Dan Suciu,et al. The Boundary Between Privacy and Utility in Data Publishing , 2007, VLDB.
[16] Charu C. Aggarwal,et al. On k-Anonymity and the Curse of Dimensionality , 2005, VLDB.
[17] Mustafa Ahmet Afacan,et al. Reliability of smartphone measurements of vital parameters: A prospective study using a reference method. , 2019, The American journal of emergency medicine.
[18] Sanjay Kumar Singh,et al. Privacy preservation for soft biometrics based multimodal recognition system , 2016, Comput. Secur..
[19] Alberto Machì,et al. From proximity to accurate indoor localization for context awareness in mobile museum guides , 2016, MobileHCI Adjunct.
[20] Samit Bhattacharya,et al. Towards affective touch interaction: predicting mobile user emotion from finger strokes , 2015, Journal of Interaction Science.
[21] Hui Xiong,et al. Preserving privacy in gps traces via uncertainty-aware path cloaking , 2007, CCS '07.
[22] Vincenzo Piuri,et al. Biometric Privacy Protection: Guidelines and Technologies , 2011, ICETE.
[23] Arun Ross,et al. 50 years of biometric research: Accomplishments, challenges, and opportunities , 2016, Pattern Recognit. Lett..
[24] Muhammad Usman Ilyas,et al. Activity recognition using smartphone sensors , 2013, 2013 IEEE 10th Consumer Communications and Networking Conference (CCNC).
[25] Sabrina De Capitani di Vimercati,et al. Data Privacy: Definitions and Techniques , 2012, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[26] Naser Damer,et al. Learning privacy-enhancing face representations through feature disentanglement , 2020, 2020 15th IEEE International Conference on Automatic Face and Gesture Recognition (FG 2020).
[27] Reza Vahidnia,et al. Wearables and the Internet of Things (IoT), Applications, Opportunities, and Challenges: A Survey , 2020, IEEE Access.
[28] Rui Zhang,et al. A Hybrid Approach to Privacy-Preserving Federated Learning , 2018, Informatik Spektrum.
[29] Robert Weibel,et al. Travelers or locals? Identifying meaningful sub-populations from human movement data in the absence of ground truth , 2018, EPJ Data Science.
[30] Marimuthu Palaniswami,et al. Privacy-preserving collaborative fuzzy clustering , 2018, Data Knowl. Eng..
[31] Ernesto Damiani,et al. Location Privacy Protection Through Obfuscation-Based Techniques , 2007, DBSec.
[32] Anil K. Jain,et al. Biometric Template Protection: Bridging the performance gap between theory and practice , 2015, IEEE Signal Processing Magazine.
[33] Nasir D. Memon,et al. Kid on The Phone! Toward Automatic Detection of Children on Mobile Devices , 2018, Comput. Secur..
[34] M. Egger,et al. Body mass index in midlife and dementia: Systematic review and meta-regression analysis of 589,649 men and women followed in longitudinal studies , 2017, Alzheimer's & dementia.
[35] Z. Shinar,et al. Validation of Contact-Free Sleep Monitoring Device with Comparison to Polysomnography. , 2017, Journal of clinical sleep medicine : JCSM : official publication of the American Academy of Sleep Medicine.
[36] Fangyuan Zhao,et al. Feasibility of Reidentifying Individuals in Large National Physical Activity Data Sets From Which Protected Health Information Has Been Removed With Use of Machine Learning , 2018, JAMA network open.
[37] Gregory D. Abowd,et al. A practical approach for recognizing eating moments with wrist-mounted inertial sensing , 2015, UbiComp.
[38] Maarten De Vos,et al. Detecting Bipolar Depression From Geographic Location Data , 2016, IEEE Transactions on Biomedical Engineering.
[39] Antoine Boutet,et al. DySan: Dynamically Sanitizing Motion Sensor Data Against Sensitive Inferences through Adversarial Networks , 2020, AsiaCCS.
[40] Tomasz Imielinski,et al. Mining association rules between sets of items in large databases , 1993, SIGMOD Conference.
[41] Kato Mivule,et al. Utilizing Noise Addition for Data Privacy, an Overview , 2013, ArXiv.
[42] J. Dobner,et al. Body mass index and the risk of infection - from underweight to obesity. , 2018, Clinical microbiology and infection : the official publication of the European Society of Clinical Microbiology and Infectious Diseases.
[43] Rama Chellappa,et al. Continuous User Authentication on Mobile Devices: Recent progress and remaining challenges , 2016, IEEE Signal Processing Magazine.
[44] Aythami Morales,et al. GaitPrivacyON: Privacy-Preserving Mobile Gait Biometrics using Unsupervised Learning , 2021, ArXiv.
[45] Fanglin Chen,et al. Unobtrusive sleep monitoring using smartphones , 2013, 2013 7th International Conference on Pervasive Computing Technologies for Healthcare and Workshops.
[46] Sin Kit Lo,et al. A Systematic Literature Review on Federated Machine Learning: From A Software Engineering Perspective , 2020, ArXiv.
[47] Dan Boneh,et al. Differentially Private Learning Needs Better Features (or Much More Data) , 2020, ICLR.
[48] Jesús Francisco Vargas-Bonilla,et al. Characterization of the Handwriting Skills as a Biomarker for Parkinson’s Disease , 2019, 2019 14th IEEE International Conference on Automatic Face & Gesture Recognition (FG 2019).
[49] Daniel Gatica-Perez,et al. DrinkSense: Characterizing Youth Drinking Behavior Using Smartphones , 2018, IEEE Transactions on Mobile Computing.
[50] Arun Ross,et al. What Else Does Your Biometric Data Reveal? A Survey on Soft Biometrics , 2016, IEEE Transactions on Information Forensics and Security.
[51] Catuscia Palamidessi,et al. Broadening the Scope of Differential Privacy Using Metrics , 2013, Privacy Enhancing Technologies.
[52] Dejing Dou,et al. Differential Privacy Preservation for Deep Auto-Encoders: an Application of Human Behavior Prediction , 2016, AAAI.
[53] Julian Fierrez,et al. BioTouchPass2: Touchscreen Password Biometrics Using Time-Aligned Recurrent Neural Networks , 2020, IEEE Transactions on Information Forensics and Security.
[54] Yasushi Makihara,et al. OU-ISIR Wearable Sensor-based Gait Challenge: Age and Gender , 2019, 2019 International Conference on Biometrics (ICB).
[55] Stanley Robson de Medeiros Oliveira,et al. Privacy preserving frequent itemset mining , 2002 .
[56] Keke Chen,et al. Privacy preserving data classification with rotation perturbation , 2005, Fifth IEEE International Conference on Data Mining (ICDM'05).
[57] Juan C. Quiroz,et al. Emotion Recognition Using Smart Watch Sensor Data: Mixed-Design Study , 2018, JMIR mental health.
[58] Wouter Joosen,et al. Data Privatizer for Biometric Applications and Online Identity Management , 2019, Privacy and Identity Management.
[59] Steven M. Bellovin,et al. "I don't have a photograph, but you can have my footprints.": Revealing the Demographics of Location Data , 2015, ICWSM.
[60] M. Hansen,et al. Participatory Sensing , 2019, Internet of Things.
[61] Simson L. Garfinkel,et al. De-Identification of Personal Information , 2015 .
[62] Emmanuel Agu,et al. Smartphone Inference of Alcohol Consumption Levels from Gait , 2015, 2015 International Conference on Healthcare Informatics.
[63] Anil K. Jain,et al. Soft Biometric Traits for Personal Recognition Systems , 2004, ICBA.
[64] Xingquan Zhu,et al. Hashing Techniques: A Survey and Taxonomy , 2017, ACM Comput. Surv..
[65] Jin Ye,et al. Motion-To-BMI: Using Motion Sensors to Predict the Body Mass Index of Smartphone Users , 2020, Sensors.
[66] Kamalika Chaudhuri,et al. When Random Sampling Preserves Privacy , 2006, CRYPTO.
[67] Sébastien Marcel,et al. Keystroke Biometrics Ongoing Competition , 2016, IEEE Access.
[68] Shuigeng Zhou,et al. A novel privacy preserving method for data publication , 2019, Inf. Sci..
[69] William E. Winkler,et al. Multiplicative Noise for Masking Continuous Data , 2001 .
[70] P. Kostopoulos,et al. StayActive: An Application for Detecting Stress , 2015 .
[71] Aythami Morales,et al. Blockchain in the Internet of Things: Architectures and Implementation , 2020, 2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC).
[72] Richard B. Parker. A Definition of Privacy , 2017 .
[73] Martin Raubal,et al. Correlating mobile phone usage and travel behavior - A case study of Harbin, China , 2012, Comput. Environ. Urban Syst..
[74] Joydeep Ghosh,et al. Privacy-preserving distributed clustering using generative models , 2003, Third IEEE International Conference on Data Mining.
[75] DeraviFarzin,et al. Touch-dynamics based Behavioural Biometrics on Mobile Devices ? A Review from a Usability and Performance Perspective , 2020 .
[76] Hao Chen,et al. TouchLogger: Inferring Keystrokes on Touch Screen from Smartphone Motion , 2011, HotSec.
[77] L. O'Gorman,et al. Comparing passwords, tokens, and biometrics for user authentication , 2003, Proceedings of the IEEE.
[78] Peter Richtárik,et al. Federated Optimization: Distributed Machine Learning for On-Device Intelligence , 2016, ArXiv.
[79] Jun Han,et al. ACCessory: password inference using accelerometers on smartphones , 2012, HotMobile '12.
[80] Julian Fiérrez,et al. Exploiting complexity in pen- and touch-based signature biometrics , 2020, International Journal on Document Analysis and Recognition (IJDAR).
[81] H. Brendan McMahan,et al. Learning Differentially Private Recurrent Language Models , 2017, ICLR.
[82] Richard M. Guest,et al. Predicting sex as a soft-biometrics from device interaction swipe gestures , 2016, Pattern Recognit. Lett..
[83] Vassilios S. Verykios,et al. Disclosure limitation of sensitive rules , 1999, Proceedings 1999 Workshop on Knowledge and Data Engineering Exchange (KDEX'99) (Cat. No.PR00453).
[84] Emin Anarim,et al. Age group detection using smartphone motion sensors , 2017, 2017 25th European Signal Processing Conference (EUSIPCO).
[85] David Eckhoff,et al. Metrics : a Systematic Survey , 2018 .
[86] Yufei Tao,et al. M-invariance: towards privacy preserving re-publication of dynamic datasets , 2007, SIGMOD '07.
[87] Yoo-Joo Choi,et al. Augmented-Reality Survey: from Concept to Application , 2017, KSII Trans. Internet Inf. Syst..
[88] Adam J. Aviv,et al. Practicality of accelerometer side channels on smartphones , 2012, ACSAC '12.
[89] Arun Ross,et al. Semi-adversarial Networks: Convolutional Autoencoders for Imparting Privacy to Face Images , 2017, 2018 International Conference on Biometrics (ICB).
[90] Oscar Mayora-Ibarra,et al. Mobile phones as medical devices in mental disorder treatment: an overview , 2014, Personal and Ubiquitous Computing.
[91] Cecilia Mascolo,et al. Mobile Sensing at the Service of Mental Well-being: a Large-scale Longitudinal Study , 2017, WWW.
[92] D. Liu,et al. Efficient Data Perturbation for Privacy Preserving and Accurate Data Stream Mining , 2018, Pervasive Mob. Comput..
[93] Vassilios S. Verykios,et al. Privacy Preserving Blocking and Meta-Blocking , 2015, ECML/PKDD.
[94] Aythami Morales,et al. TypeNet: Deep Learning Keystroke Biometrics , 2021, IEEE Transactions on Biometrics, Behavior, and Identity Science.
[95] Hamed Haddadi,et al. Privacy Leakage in Mobile Computing: Tools, Methods, and Characteristics , 2014, ArXiv.
[96] Chris Clifton,et al. When do data mining results violate privacy? , 2004, KDD.
[97] Elisa Bertino,et al. State-of-the-art in privacy preserving data mining , 2004, SGMD.
[98] Ian Butterworth,et al. Detection of Motor Impairment in Parkinson's Disease Via Mobile Touchscreen Typing , 2017, IEEE Transactions on Biomedical Engineering.
[99] Bambang Parmanto,et al. Systematic Review of Mobile Health Applications in Rehabilitation. , 2019, Archives of physical medicine and rehabilitation.
[100] Jean-Yves Le Boudec,et al. Quantifying Location Privacy , 2011, 2011 IEEE Symposium on Security and Privacy.
[101] C. E. SHANNON,et al. A mathematical theory of communication , 1948, MOCO.
[102] Aythami Morales,et al. Assessing the Quality of Swipe Interactions for Mobile Biometric Systems , 2020, 2020 IEEE International Joint Conference on Biometrics (IJCB).
[103] Lin Sun,et al. Activity Recognition on an Accelerometer Embedded Mobile Phone with Varying Positions and Orientations , 2010, UIC.
[104] Hoeteck Wee,et al. Toward Privacy in Public Databases , 2005, TCC.
[105] K. Sarawadekar,et al. Gender Recognition using in-built Inertial Sensors of Smartphone , 2020, 2020 IEEE REGION 10 CONFERENCE (TENCON).
[106] David Mohaisen,et al. Sensor-Based Continuous Authentication of Smartphones’ Users Using Behavioral Biometrics: A Contemporary Survey , 2021, IEEE Internet of Things Journal.
[107] Balachander Krishnamurthy,et al. On the leakage of personally identifiable information via online social networks , 2009, CCRV.
[108] Naser Damer,et al. Suppressing Gender and Age in Face Templates Using Incremental Variable Elimination , 2019, 2019 International Conference on Biometrics (ICB).
[109] Ruth Brand,et al. Microdata Protection through Noise Addition , 2002, Inference Control in Statistical Databases.
[110] Aythami Morales,et al. Child-Computer Interaction: Recent Works, New Dataset, and Age Detection , 2021, ArXiv.
[111] T. Neal,et al. Mood Versus Identity: Studying the Influence of Affective States on Mobile Biometrics , 2020, 2020 15th IEEE International Conference on Automatic Face and Gesture Recognition (FG 2020).
[112] Julian Fiérrez,et al. MultiLock: Mobile Active Authentication based on Multiple Biometric and Behavioral Patterns , 2019, Advanced Sciences and Technologies for Security Applications.
[113] Ninghui Li,et al. t-Closeness: Privacy Beyond k-Anonymity and l-Diversity , 2007, 2007 IEEE 23rd International Conference on Data Engineering.
[114] Jano Moreira de Souza,et al. Towards an observatory for mobile participatory sensing applications , 2017, 2017 IEEE 21st International Conference on Computer Supported Cooperative Work in Design (CSCWD).
[115] Flávio du Pin Calmon,et al. Privacy against statistical inference , 2012, 2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[116] Pieter H. Hartel,et al. Putting the privacy paradox to the test: Online privacy and security behaviors among users with technical knowledge, privacy awareness, and financial resources , 2019, Telematics Informatics.
[117] Lina Yao,et al. Deep Learning for Sensor-based Human Activity Recognition , 2021, ACM Comput. Surv..
[118] Zhen Lin,et al. Using binning to maintain confidentiality of medical data , 2002, AMIA.
[119] Xiaojiang Chen,et al. SleepGuard , 2018, Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies.
[120] Miguel A. Ferrer,et al. Handwriting Biometrics: Applications and Future Trends in e-Security and e-Health , 2020, Cognitive Computation.
[121] M. Köppen,et al. The Curse of Dimensionality , 2010 .
[122] Qiang Yang,et al. Federated Machine Learning , 2019, ACM Trans. Intell. Syst. Technol..
[123] Moni Naor,et al. Our Data, Ourselves: Privacy Via Distributed Noise Generation , 2006, EUROCRYPT.
[124] Qihui Wu,et al. A survey of machine learning for big data processing , 2016, EURASIP Journal on Advances in Signal Processing.
[125] Jun Han,et al. ACComplice: Location inference using accelerometers on smartphones , 2012, 2012 Fourth International Conference on Communication Systems and Networks (COMSNETS 2012).
[126] Raymond Chi-Wing Wong,et al. (α, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing , 2006, KDD '06.
[127] Ian Goodfellow,et al. Deep Learning with Differential Privacy , 2016, CCS.
[128] Aythami Morales,et al. BeCAPTCHA: Bot Detection in Smartphone Interaction using Touchscreen Biometrics and Mobile Sensors , 2020, ArXiv.
[129] Gang Zhou,et al. Location- and Person-Independent Activity Recognition with WiFi, Deep Neural Networks, and Reinforcement Learning , 2021, ACM Trans. Internet Things.
[130] Michael Riegler,et al. Mental health monitoring with multimodal sensing and machine learning: A survey , 2018, Pervasive Mob. Comput..
[131] Tempestt J. Neal,et al. A gender-specific behavioral analysis of mobile device usage data , 2018, 2018 IEEE 4th International Conference on Identity, Security, and Behavior Analysis (ISBA).
[132] Patrick Bours,et al. Studying WiFi and Accelerometer Data Based Authentication Method on Mobile Phones , 2018, ICBEA '18.
[133] Omer Reingold,et al. Computational Differential Privacy , 2009, CRYPTO.
[134] Jung-Hsien Chiang,et al. Predicting Negative Emotions Based on Mobile Phone Usage Patterns: An Exploratory Study , 2016, JMIR research protocols.
[135] Chris Clifton,et al. Hiding the presence of individuals from shared databases , 2007, SIGMOD '07.
[136] Lin Yao,et al. A sensitive data aggregation scheme for body sensor networks based on data hiding , 2012, Personal and Ubiquitous Computing.
[137] Philip S. Yu,et al. A Survey of Randomization Methods for Privacy-Preserving Data Mining , 2008, Privacy-Preserving Data Mining.
[138] Dhiren R. Patel,et al. Blocking Based Approach for Classification Rule Hiding to Preserve the Privacy in Database , 2011, 2011 International Symposium on Computer Science and Society.
[139] Jingyu Hua,et al. We Can Track You if You Take the Metro: Tracking Metro Riders Using Accelerometers on Smartphones , 2015, IEEE Transactions on Information Forensics and Security.
[140] Wei Cui,et al. WiFi CSI Based Passive Human Activity Recognition Using Attention Based BLSTM , 2019, IEEE Transactions on Mobile Computing.
[141] Philip S. Yu,et al. A Condensation Approach to Privacy Preserving Data Mining , 2004, EDBT.
[142] ASHWIN MACHANAVAJJHALA,et al. L-diversity: privacy beyond k-anonymity , 2006, 22nd International Conference on Data Engineering (ICDE'06).
[143] Adam Glowacz,et al. Security Framework for IoT Based Real-Time Health Applications , 2021, Electronics.
[144] Simon Parkinson,et al. Biometric Systems Utilising Health Data from Wearable Devices , 2020, ACM Comput. Surv..
[145] Kanishka Bhaduri,et al. Privacy-Preserving Outlier Detection Through Random Nonlinear Data Distortion , 2011, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[146] Alexandre V. Evfimievski,et al. Privacy preserving mining of association rules , 2002, Inf. Syst..
[147] Arun Ross,et al. PrivacyNet: Semi-Adversarial Networks for Multi-Attribute Face Privacy , 2020, IEEE Transactions on Image Processing.
[148] Vivek Kanhangad,et al. Investigating gender recognition in smartphones using accelerometer and gyroscope sensor readings , 2016, 2016 International Conference on Computational Techniques in Information and Communication Technologies (ICCTICT).
[149] Farzin Deravi,et al. Exploring Mobile Biometric Performance Through Identification of Core Factors and Relationships , 2019, IEEE Transactions on Biometrics, Behavior, and Identity Science.
[150] Javier Hernandez-Ortega,et al. Active detection of age groups based on touch interaction , 2018, IET Biom..
[151] Aaron Roth,et al. The Algorithmic Foundations of Differential Privacy , 2014, Found. Trends Theor. Comput. Sci..
[152] M Jamal Deen,et al. Smartphone Sensors for Health Monitoring and Diagnosis , 2019, Sensors.
[153] Konstantinos Markantonakis,et al. Location Tracking Using Smartphone Accelerometer and Magnetometer Traces , 2019, ARES.
[154] Lei Zheng,et al. DeepMood: Modeling Mobile Phone Typing Dynamics for Mood Detection , 2017, KDD.
[155] Qinghua Li,et al. Efficient and privacy-preserving data aggregation in mobile sensing , 2012, 2012 20th IEEE International Conference on Network Protocols (ICNP).
[156] Wei Jia,et al. Survey of Gait Recognition , 2009, ICIC.
[157] Vishal Singh,et al. Ensemble based real-time indoor localization using stray WiFi signal , 2018, 2018 IEEE International Conference on Consumer Electronics (ICCE).
[158] Roger Clarke,et al. Privacy and consumer risks in cloud computing , 2010, Comput. Law Secur. Rev..
[159] Chris Bevan,et al. Different strokes for different folks? Revealing the physical characteristics of smartphone users from their swipe gestures , 2016, Int. J. Hum. Comput. Stud..
[160] Yehuda Lindell,et al. Privacy Preserving Data Mining , 2002, Journal of Cryptology.
[161] Alex Pentland,et al. Mobile Communication Signatures of Unemployment , 2016, SocInfo.
[162] Qing Zhang,et al. Aggregate Query Answering on Anonymized Tables , 2007, 2007 IEEE 23rd International Conference on Data Engineering.
[163] Tianqing Zhu,et al. Density-Based Location Preservation for Mobile Crowdsensing With Differential Privacy , 2018, IEEE Access.
[164] Klaus David,et al. 6G Vision and Requirements: Is There Any Need for Beyond 5G? , 2018, IEEE Vehicular Technology Magazine.
[165] Liu Yang,et al. Inferring demographics from human trajectories and geographical context , 2019, Comput. Environ. Urban Syst..
[166] Josep Domingo-Ferrer,et al. From t-closeness to differential privacy and vice versa in data anonymization , 2015, Knowl. Based Syst..
[167] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[168] Aaron Roth,et al. Mechanism design in large games: incentives and privacy , 2012, ITCS.
[169] Xiao Ma,et al. Data analytics in a privacy-concerned world , 2021, Journal of Business Research.
[170] Yu Zhang,et al. Preserving User Location Privacy in Mobile Data Management Infrastructures , 2006, Privacy Enhancing Technologies.
[171] Ken Barker,et al. A Data Privacy Taxonomy , 2009, BNCOD.
[172] Charith Perera,et al. Privacy Laws and Privacy by Design Schemes for the Internet of Things , 2021, ACM Comput. Surv..
[173] José María de Fuentes,et al. Privacy-Preserving Sensor-Based Continuous Authentication and User Profiling: A Review , 2020, Sensors.
[174] Jun Luo,et al. An effective value swapping method for privacy preserving data publishing , 2016, Secur. Commun. Networks.
[175] Rama Chellappa,et al. Cancelable Biometrics: A review , 2015, IEEE Signal Processing Magazine.
[176] Yanjiao Chen,et al. Deep Learning on Mobile and Embedded Devices , 2020, ACM Comput. Surv..
[177] M. Petró‐Turza,et al. The International Organization for Standardization. , 2003 .
[178] Chuhan Gao,et al. Privacy Protection for Audio Sensing Against Multi-Microphone Adversaries , 2019, Proc. Priv. Enhancing Technol..