A differentially private algorithm for location data release
暂无分享,去创建一个
[1] J. Da Rugna,et al. Tourist behavior analysis through geotagged photographies: A method to identify the country of origin , 2012, 2012 IEEE 13th International Symposium on Computational Intelligence and Informatics (CINTI).
[2] Alexei A. Efros,et al. Image sequence geolocation with human travel priors , 2009, 2009 IEEE 12th International Conference on Computer Vision.
[3] Shen-Shyang Ho,et al. Differential privacy for location pattern mining , 2011, SPRINGL '11.
[4] Marco Gruteser,et al. Protecting Location Privacy Through Path Confusion , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[5] Richard Szeliski,et al. Modeling the World from Internet Photo Collections , 2008, International Journal of Computer Vision.
[6] Daniel Kifer,et al. Attacks on privacy and deFinetti's theorem , 2009, SIGMOD Conference.
[7] Ickjai Lee,et al. Mining Points-of-Interest Association Rules from Geo-tagged Photos , 2013, 2013 46th Hawaii International Conference on System Sciences.
[8] Francesco Bonchi,et al. Anonymization of moving objects databases by clustering and perturbation , 2010, Inf. Syst..
[9] Cynthia Dwork,et al. Practical privacy: the SuLQ framework , 2005, PODS.
[10] Alexei A. Efros,et al. IM2GPS: estimating geographic information from a single image , 2008, 2008 IEEE Conference on Computer Vision and Pattern Recognition.
[11] Raymond Chi-Wing Wong,et al. Minimality Attack in Privacy Preserving Data Publishing , 2007, VLDB.
[12] Tat-Seng Chua,et al. Mining Travel Patterns from Geotagged Photos , 2012, TIST.
[13] Panos Kalnis,et al. Location Diversity: Enhanced Privacy Protection in Location Based Services , 2009, LoCA.
[14] Jean-Yves Le Boudec,et al. Quantifying Location Privacy , 2011, 2011 IEEE Symposium on Security and Privacy.
[15] Aaron Roth,et al. A learning theory approach to noninteractive database privacy , 2011, JACM.
[16] Walid G. Aref,et al. Casper*: Query processing for location services without compromising privacy , 2006, TODS.
[17] Mor Naaman,et al. How flickr helps us make sense of the world: context and content in community-contributed media collections , 2007, ACM Multimedia.
[18] Luc Van Gool,et al. World-scale mining of objects and events from community photo collections , 2008, CIVR '08.
[19] Jianliang Xu,et al. Protecting Location Privacy against Location-Dependent Attacks in Mobile Services , 2008, IEEE Transactions on Knowledge and Data Engineering.
[20] Claude Castelluccia,et al. Differentially private sequential data publication via variable-length n-grams , 2012, CCS.
[21] Adam D. Smith,et al. Composition attacks and auxiliary information in data privacy , 2008, KDD.
[22] Catuscia Palamidessi,et al. A Predictive Differentially-Private Mechanism for Location Privacy , 2013, ArXiv.
[23] Tianqing Zhu,et al. Differential privacy for neighborhood-based Collaborative Filtering , 2013, 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2013).
[24] Liviu Iftode,et al. Privately querying location-based services with SybilQuery , 2009, UbiComp.
[25] Catuscia Palamidessi,et al. Geo-indistinguishability: differential privacy for location-based systems , 2012, CCS.
[26] Keiji Yanai,et al. Detecting cultural differences using consumer-generated geotagged photos , 2009, LOCWEB '09.
[27] Panos Kalnis,et al. Private queries in location based services: anonymizers are not necessary , 2008, SIGMOD Conference.
[28] Tetsuji Satoh,et al. Protection of Location Privacy using Dummies for Location-based Services , 2005, 21st International Conference on Data Engineering Workshops (ICDEW'05).
[29] Ling Liu,et al. Location Privacy in Mobile Systems: A Personalized Anonymization Model , 2005, 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05).
[30] Cynthia Dwork,et al. Differential Privacy , 2006, ICALP.
[31] Franco Zambonelli,et al. Automatic Analysis of Geotagged Photos for Intelligent Tourist Services , 2010, 2010 Sixth International Conference on Intelligent Environments.
[32] Cynthia Dwork,et al. Differential Privacy: A Survey of Results , 2008, TAMC.
[33] Charu C. Aggarwal,et al. On k-Anonymity and the Curse of Dimensionality , 2005, VLDB.
[34] Tianqing Zhu,et al. Deferentially Private Tagging Recommendation Based on Topic Model , 2014, PAKDD.
[35] Philip S. Yu,et al. Privacy-preserving data publishing: A survey of recent developments , 2010, CSUR.