Lclean: A Plausible Approach to Individual Trajectory Data Sanitization
暂无分享,去创建一个
[1] Aris Gkoulalas-Divanis,et al. Revisiting sequential pattern hiding to enhance utility , 2011, KDD.
[2] Xiaojiang Du,et al. A survey of key management schemes in wireless sensor networks , 2007, Comput. Commun..
[3] Xiaojiang Du,et al. Security threats to mobile multimedia applications: Camera-based attacks on mobile phones , 2014, IEEE Communications Magazine.
[4] Longfei Wu,et al. MobiFish: A lightweight anti-phishing scheme for mobile phones , 2014, 2014 23rd International Conference on Computer Communication and Networks (ICCCN).
[5] Xiaojiang Du,et al. Publishing histograms with outliers under data differential privacy , 2016, Secur. Commun. Networks.
[6] Xiaojiang Du,et al. Prometheus: Privacy-aware data retrieval on hybrid cloud , 2013, 2013 Proceedings IEEE INFOCOM.
[7] Xiaojiang Du,et al. Achieving big data privacy via hybrid cloud , 2014, 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[8] Pramod Viswanath,et al. Extremal Mechanisms for Local Differential Privacy , 2014, J. Mach. Learn. Res..
[9] S L Warner,et al. Randomized response: a survey technique for eliminating evasive answer bias. , 1965, Journal of the American Statistical Association.
[10] Rajasekhar Mungara,et al. A Routing-Driven Elliptic Curve Cryptography based Key Management Scheme for Heterogeneous Sensor Networks , 2014 .
[11] Martin J. Wainwright,et al. Local privacy and statistical minimax rates , 2013, 2013 51st Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[12] Mohsen Guizani,et al. An effective key management scheme for heterogeneous sensor networks , 2007, Ad Hoc Networks.
[13] Hongli Zhang,et al. Mobile cloud sensing, big data, and 5G networks make an intelligent and smart world , 2015, IEEE Network.
[14] Mohsen Guizani,et al. Transactions papers a routing-driven Elliptic Curve Cryptography based key management scheme for Heterogeneous Sensor Networks , 2009, IEEE Transactions on Wireless Communications.
[15] Philip S. Yu,et al. A border-based approach for hiding sensitive frequent itemsets , 2005, Fifth IEEE International Conference on Data Mining (ICDM'05).
[16] Anna Monreale,et al. Movement data anonymity through generalization , 2009, SPRINGL '09.
[17] ASHWIN MACHANAVAJJHALA,et al. L-diversity: privacy beyond k-anonymity , 2006, 22nd International Conference on Data Engineering (ICDE'06).
[18] Cynthia Dwork,et al. Calibrating Noise to Sensitivity in Private Data Analysis , 2006, TCC.
[19] Hongxia Jin,et al. An Information-Theoretic Approach to Individual Sequential Data Sanitization , 2016, WSDM.
[20] Francesco Bonchi,et al. Never Walk Alone: Uncertainty for Anonymity in Moving Objects Databases , 2008, 2008 IEEE 24th International Conference on Data Engineering.
[21] Xiaojiang Du,et al. Achieving data privacy on hybrid cloud , 2015, Secur. Commun. Networks.
[22] Benjamin C. M. Fung,et al. Privacy-preserving trajectory data publishing by local suppression , 2013, Inf. Sci..
[23] Suman Nath,et al. MaskIt: privately releasing user context streams for personalized mobile applications , 2012, SIGMOD Conference.
[24] Yingshu Li,et al. Collective Data-Sanitization for Preventing Sensitive Information Inference Attacks in Social Networks , 2018, IEEE Transactions on Dependable and Secure Computing.
[25] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[26] Robert Gwadera,et al. Permutation-Based Sequential Pattern Hiding , 2013, 2013 IEEE 13th International Conference on Data Mining.
[27] Jianzhong Li,et al. Location-privacy-aware review publication mechanism for local business service systems , 2017, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.
[28] Xiaojiang Du,et al. Security in wireless sensor networks , 2008, IEEE Wireless Communications.
[29] Elisa Bertino,et al. Association rule hiding , 2004, IEEE Transactions on Knowledge and Data Engineering.
[30] Jeffrey F. Naughton,et al. Utility-maximizing event stream suppression , 2013, SIGMOD '13.
[31] Kunal Talwar,et al. Mechanism Design via Differential Privacy , 2007, 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07).
[32] Mani B. Srivastava,et al. mSieve: differential behavioral privacy in time series of mobile sensor data , 2016, UbiComp.