Collaborative trajectory privacy preserving scheme in location-based services
暂无分享,去创建一个
Tao Peng | Qin Liu | Guojun Wang | Dacheng Meng | Tao Peng | Guojun Wang | Qin Liu | Dacheng Meng
[1] Thomas Brinkhoff,et al. A Framework for Generating Network-Based Moving Objects , 2002, GeoInformatica.
[2] Sabrina De Capitani di Vimercati,et al. An Obfuscation-Based Approach for Protecting Location Privacy , 2011, IEEE Transactions on Dependable and Secure Computing.
[3] Xiaodong Lin,et al. FINE: A fine-grained privacy-preserving location-based service framework for mobile devices , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.
[4] Panos Kalnis,et al. A reciprocal framework for spatial K-anonymity , 2010, Inf. Syst..
[5] Vishal Saraswat,et al. Analysis-preserving protection of user privacy against information leakage of social-network Likes , 2016, Inf. Sci..
[6] Xuemin Shen,et al. Adaptive and Channel-Aware Detection of Selective Forwarding Attacks in Wireless Sensor Networks , 2016, IEEE Transactions on Wireless Communications.
[7] Indrajit Ray,et al. Query m-Invariance: Preventing Query Disclosures in Continuous Location-Based Services , 2010, 2010 Eleventh International Conference on Mobile Data Management.
[8] Marco Gruteser,et al. USENIX Association , 1992 .
[9] Chi-Yin Chow,et al. Enabling Private Continuous Queries for Revealed User Locations , 2007, SSTD.
[10] Tao Peng,et al. Enhanced Location Privacy Preserving Scheme in Location-Based Services , 2017, IEEE Systems Journal.
[11] Ren-Hung Hwang,et al. A Novel Time-Obfuscated Algorithm for Trajectory Privacy Protection , 2014, IEEE Transactions on Services Computing.
[12] John Krumm,et al. Inference Attacks on Location Tracks , 2007, Pervasive.
[13] Lars Kulik,et al. A Formal Model of Obfuscation and Negotiation for Location Privacy , 2005, Pervasive.
[14] Qinghua Li,et al. Achieving k-anonymity in privacy-aware location-based services , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.
[15] Ling Liu,et al. Location Privacy in Mobile Systems: A Personalized Anonymization Model , 2005, 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05).
[16] Chi-Yin Chow,et al. A peer-to-peer spatial cloaking algorithm for anonymous location-based service , 2006, GIS '06.
[17] Kyriakos Mouratidis,et al. Preventing Location-Based Identity Inference in Anonymous Spatial Queries , 2007, IEEE Transactions on Knowledge and Data Engineering.
[18] Jie Wu,et al. Time-Sensitive Utility-Based Single-Copy Routing in Low-Duty-Cycle Wireless Sensor Networks , 2015, IEEE Transactions on Parallel and Distributed Systems.
[19] Benjamin C. M. Fung,et al. Privacy-preserving trajectory data publishing by local suppression , 2013, Inf. Sci..
[20] Jianfeng Ma,et al. TrPF: A Trajectory Privacy-Preserving Framework for Participatory Sensing , 2013, IEEE Transactions on Information Forensics and Security.
[21] Mingwu Zhang,et al. Anonymous spatial encryption under affine space delegation functionality with full security , 2014, Inf. Sci..
[22] Qin Liu,et al. A Scalable Encryption Scheme for Multi-Privileged Group Communications , 2010, EUC.
[23] Qinghua Li,et al. Enhancing privacy through caching in location-based services , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).
[24] Jianliang Xu,et al. Protecting Location Privacy against Location-Dependent Attacks in Mobile Services , 2008, IEEE Transactions on Knowledge and Data Engineering.
[25] Ying Cai,et al. Exploring Historical Location Data for Anonymity Preservation in Location-Based Services , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[26] Jie Wu,et al. Community-Aware Opportunistic Routing in Mobile Social Networks , 2014, IEEE Transactions on Computers.
[27] Rong Zheng,et al. Efficient algorithms for K-anonymous location privacy in participatory sensing , 2012, 2012 Proceedings IEEE INFOCOM.
[28] Jianhong Zhang,et al. A novel authenticated encryption scheme and its extension , 2015, Inf. Sci..
[29] Li Li,et al. Network Voronoi Diagram on uncertain objects for nearest neighbor queries , 2015, Inf. Sci..
[30] Zhihua Xia,et al. A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data , 2016, IEEE Transactions on Parallel and Distributed Systems.
[31] Chi-Yin Chow,et al. Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments , 2011, GeoInformatica.
[32] Panagiotis Papadimitratos,et al. Ieee Transactions on Dependable and Secure Computing, Special Issue on " Security and Privacy in Mobile Platforms " , 2014 Hiding in the Mobile Crowd: Location Privacy through Collaboration , 2022 .