-
1
-
-
77956382087
-
A survey of mobile phone sensing
-
Sep.
-
N. D. Lane, E. Miluzzo, H. Lu, D. Peebles, T. Choudhury, and A. T. Campbell, "A survey of mobile phone sensing," IEEE Commun. Mag., vol. 48, no. 9, pp. 140-150, Sep. 2010.
-
(2010)
IEEE Commun. Mag.
, vol.48
, Issue.9
, pp. 140-150
-
-
Lane, N.D.1
Miluzzo, E.2
Lu, H.3
Peebles, D.4
Choudhury, T.5
Campbell, A.T.6
-
2
-
-
38049062859
-
Participatory sensing
-
ACM
-
J. A. Burke, D. Estrin, M. Hansen, A. Parker, N. Ramanathan, S. Reddy, and M. B. Srivastava, "Participatory sensing," in Proc. Workshop on World-Sensor-Web (WSW'06): Mobile Device Centric Sensor Networks and Applications, 2006, pp. 117-134, ACM.
-
(2006)
Proc. Workshop on World-Sensor-Web (WSW'06): Mobile Device Centric Sensor Networks and Applications
, pp. 117-134
-
-
Burke, J.A.1
Estrin, D.2
Hansen, M.3
Parker, A.4
Ramanathan, N.5
Reddy, S.6
Srivastava, M.B.7
-
3
-
-
70350551971
-
People-centric urban sensing
-
ACM
-
A. T. Campbell, S. B. Eisenman, N. D. Lane, E. Miluzzo, and R. A. Peterson, "People-centric urban sensing," in Proc. 2nd Ann. Int. Workshop on Wireless Internet, 2006, p. 18, ACM.
-
(2006)
Proc. 2nd Ann. Int. Workshop on Wireless Internet
, pp. 18
-
-
Campbell, A.T.1
Eisenman, S.B.2
Lane, N.D.3
Miluzzo, E.4
Peterson, R.A.5
-
4
-
-
34247356882
-
CarTel: A distributed mobile sensor computing system
-
DOI 10.1145/1182807.1182821, SenSys'06: Proceedings of the Fourth International Conference on Embedded Networked Sensor Systems
-
B. Hull, V. Bychkovsky, Y. Zhang, K. Chen, M. Goraczko, A. Miu, E. Shih, H. Balakrishnan, and S. Madden, "Cartel: A distributed mobile sensor computing system," in Proc. 4th Int. Conf. Embedded Networked Sensor Systems, 2006, pp. 125-138, ACM. (Pubitemid 47168682)
-
(2006)
SenSys'06: Proceedings of the Fourth International Conference on Embedded Networked Sensor Systems
, pp. 125-138
-
-
Hull, B.1
Bychkovsky, V.2
Zhang, Y.3
Chen, K.4
Goraczko, M.5
Miu, A.6
Shih, E.7
Balakrishnan, H.8
Madden, S.9
-
5
-
-
75149165677
-
Bikenet: A mobile sensing system for cyclist experience mapping
-
S. B. Eisenman, E. Miluzzo, N. D. Lane, R. A. Peterson, G. S. Ahn, and A. T. Campbell, "Bikenet: A mobile sensing system for cyclist experience mapping," ACM Trans. Sensor Netw. (TOSN), vol. 6, no. 1, p. 6, 2009.
-
(2009)
ACM Trans. Sensor Netw. (TOSN)
, vol.6
, Issue.1
, pp. 6
-
-
Eisenman, S.B.1
Miluzzo, E.2
Lane, N.D.3
Peterson, R.A.4
Ahn, G.S.5
Campbell, A.T.6
-
6
-
-
37849004929
-
Image browsing, processing, and clustering for participatory sensing: Lessons from a dietsense prototype
-
ACM
-
S. Reddy, A. Parker, J. Hyman, J. Burke, D. Estrin, and M. Hansen, "Image browsing, processing, and clustering for participatory sensing: Lessons from a dietsense prototype," in Proc. 4th Workshop on Embedded Networked Sensors, 2007, pp. 13-17, ACM.
-
(2007)
Proc. 4th Workshop on Embedded Networked Sensors
, pp. 13-17
-
-
Reddy, S.1
Parker, A.2
Hyman, J.3
Burke, J.4
Estrin, D.5
Hansen, M.6
-
7
-
-
70450248480
-
Peir, the personal environmental impact report, as a platform for participatory sensing systems research
-
ACM
-
M. Mun, S. Reddy, K. Shilton, N. Yau, J. Burke, D. Estrin, M. Hansen, E. Howard, R. West, and P. Boda, "Peir, the personal environmental impact report, as a platform for participatory sensing systems research," in Proc. 7th Int. Conf. Mobile Systems, Applications, and Services, 2009, pp. 55-68, ACM.
-
(2009)
Proc. 7th Int. Conf. Mobile Systems, Applications, and Services
, pp. 55-68
-
-
Mun, M.1
Reddy, S.2
Shilton, K.3
Yau, N.4
Burke, J.5
Estrin, D.6
Hansen, M.7
Howard, E.8
West, R.9
Boda, P.10
-
8
-
-
80052696161
-
A survey on privacy in mobile participatory sensing applications
-
D. Christin, A. Reinhardt, S. Kanhere, and M. Hollick, "A survey on privacy in mobile participatory sensing applications," J. Syst. Softw., vol. 84, no. 11, pp. 1928-1946, 2011.
-
(2011)
J. Syst. Softw.
, vol.84
, Issue.11
, pp. 1928-1946
-
-
Christin, D.1
Reinhardt, A.2
Kanhere, S.3
Hollick, M.4
-
9
-
-
77955274113
-
Preserving privacy in participatory sensing systems
-
K. L. Huang, S. S. Kanhere, and W. Hu, "Preserving privacy in participatory sensing systems," Comput. Commun., vol. 33, no. 11, pp. 1266-1280, 2010.
-
(2010)
Comput. Commun.
, vol.33
, Issue.11
, pp. 1266-1280
-
-
Huang, K.L.1
Kanhere, S.S.2
Hu, W.3
-
12
-
-
84866489655
-
Poolview: Stream privacy for grassroots participatory sensing
-
ACM
-
R. K. Ganti, N. Pham, Y. E. Tsai, and T. F. Abdelzaher, "Poolview: Stream privacy for grassroots participatory sensing," in Proc. 6th ACM Conf. Embedded Network Sensor Systems, 2008, pp. 281-294, ACM.
-
(2008)
Proc. 6th ACM Conf. Embedded Network Sensor Systems
, pp. 281-294
-
-
Ganti, R.K.1
Pham, N.2
Tsai, Y.E.3
Abdelzaher, T.F.4
-
13
-
-
2942524994
-
Location privacy in pervasive computing
-
A. R. Beresford and F. Stajano, "Location privacy in pervasive computing," IEEE Pervasive Comput., vol. 2, no. 1, pp. 46-55, 2003.
-
(2003)
IEEE Pervasive Comput.
, vol.2
, Issue.1
, pp. 46-55
-
-
Beresford, A.R.1
Stajano, F.2
-
15
-
-
66449131619
-
Mix-zones for location privacy in vehicular networks
-
Vancouver, BC, Canada
-
J. Freudiger, M. Raya, M. Flegyhzi, P. Papadimitratos, and J. P. Hubaux, "Mix-zones for location privacy in vehicular networks," in Proc. 1st Int. Workshop on Wireless Networking for Intelligent Transportation Systems (WiN-ITS 07), Vancouver, BC, Canada, 2007.
-
(2007)
Proc. 1st Int. Workshop on Wireless Networking for Intelligent Transportation Systems (WiN-ITS 07)
-
-
Freudiger, J.1
Raya, M.2
Flegyhzi, M.3
Papadimitratos, P.4
Hubaux, J.P.5
-
17
-
-
44649150419
-
Anonysense: Opportunistic and privacy-preserving context collection
-
A. Kapadia, N. Triandopoulos, C. Cornelius, D. Peebles, and D. Kotz, "Anonysense: Opportunistic and privacy-preserving context collection," Pervasive Comput., vol. 5013, pp. 280-297, 2008.
-
(2008)
Pervasive Comput.
, vol.5013
, pp. 280-297
-
-
Kapadia, A.1
Triandopoulos, N.2
Cornelius, C.3
Peebles, D.4
Kotz, D.5
-
19
-
-
77958449487
-
Security and privacy objectives for sensing applications in wireless community networks
-
D. Christin, M. Hollick, and M. Manulis, "Security and privacy objectives for sensing applications in wireless community networks," in Proc. IEEE 19th Int. Conf. Computer Communications and Networks (ICCCN), 2010, pp. 1-6.
-
(2010)
Proc. IEEE 19th Int. Conf. Computer Communications and Networks (ICCCN)
, pp. 1-6
-
-
Christin, D.1
Hollick, M.2
Manulis, M.3
-
20
-
-
66549119801
-
Opportunistic sensing: Security challenges for the new paradigm
-
A. Kapadia, D. Kotz, and N. Triandopoulos, "Opportunistic sensing: Security challenges for the new paradigm," in Proc. IEEE 1st Int. Communication Systems and Networks and Workshops, 2009, pp. 1-10.
-
(2009)
Proc. IEEE 1st Int. Communication Systems and Networks and Workshops
, pp. 1-10
-
-
Kapadia, A.1
Kotz, D.2
Triandopoulos, N.3
-
21
-
-
84866628169
-
Trajectory privacy in location-based services and data publication
-
C. Y. Chow and M. F. Mokbel, "Trajectory privacy in location-based services and data publication," ACM SIGKDD Explorations Newsletter, vol. 13, no. 1, pp. 19-29, 2011.
-
(2011)
ACM SIGKDD Explorations Newsletter
, vol.13
, Issue.1
, pp. 19-29
-
-
Chow, C.Y.1
Mokbel, M.F.2
-
22
-
-
85011022727
-
From data privacy to location privacy: Models and algorithms
-
VLDB Endowment
-
L. Liu, "From data privacy to location privacy: Models and algorithms," in Proc. 33rd Int. Conf. Very Large Data Bases (VLDB2007), 2007, pp. 1429-1430, VLDB Endowment.
-
(2007)
Proc. 33rd Int. Conf. Very Large Data Bases (VLDB2007)
, pp. 1429-1430
-
-
Liu, L.1
-
23
-
-
67650320950
-
A survey of computational location privacy
-
J. Krumm, "A survey of computational location privacy," Personal and Ubiquitous Comput., vol. 13, no. 6, pp. 391-399, 2009.
-
(2009)
Personal and Ubiquitous Comput.
, vol.13
, Issue.6
, pp. 391-399
-
-
Krumm, J.1
-
25
-
-
80051982003
-
A unified framework for location privacy
-
R. Shokri, J. Freudiger, and J. P. Hubaux, "A unified framework for location privacy," in Proc. 9th Int. Symp. Privacy Enhancing Technologies (PETS'10), 2010, pp. 203-214.
-
(2010)
Proc. 9th Int. Symp. Privacy Enhancing Technologies (PETS'10)
, pp. 203-214
-
-
Shokri, R.1
Freudiger, J.2
Hubaux, J.P.3
-
26
-
-
33745725717
-
An anonymous communication technique using dummies for location-based services
-
DOI 10.1109/PERSER.2005.1506394, 1506394, Proceedings - International Conference on Pervasive Services, ICPS '05
-
H. Kido, Y. Yanagisawa, and T. Satoh, "An anonymous communication technique using dummies for location-based services," in Proc. Int. Conf. Pervasive Services, 2005, pp. 88-97. (Pubitemid 43996462)
-
(2005)
Proceedings - International Conference on Pervasive Services, ICPS '05
, vol.2005
, pp. 88-97
-
-
Kido, H.1
Yanagisawa, Y.2
Satoh, T.3
-
27
-
-
70349144789
-
Pad: Privacy-area aware, dummy-based location privacy in mobile services
-
ACM
-
H. Lu, C. S. Jensen, and M. L. Yiu, "Pad: Privacy-area aware, dummy-based location privacy in mobile services," in Proc. 7th ACM Int. Workshop on Data Engineering for Wireless and Mobile Access, 2008, pp. 16-23, ACM.
-
(2008)
Proc. 7th ACM Int. Workshop on Data Engineering for Wireless and Mobile Access
, pp. 16-23
-
-
Lu, H.1
Jensen, C.S.2
Yiu, M.L.3
-
28
-
-
84869594082
-
Towards location and trajectory privacy protection in participatory sensing
-
S. Gao, J. Ma, W. Shi, and G. Zhan, "Towards location and trajectory privacy protection in participatory sensing," in Proc. Mobile Computing, Applications and Services, Los Angles, CA, USA, 2011, pp. 381-386.
-
(2011)
Proc. Mobile Computing, Applications and Services, Los Angles, CA, USA
, pp. 381-386
-
-
Gao, S.1
Ma, J.2
Shi, W.3
Zhan, G.4
-
29
-
-
0036811662
-
K-anonymity: A model for protecting privacy
-
DOI 10.1142/S0218488502001648
-
L. Sweeney, "k-anonymity: A model for protecting privacy," Int. J. Uncertainty Fuzziness and Knowl. Based Syst., vol. 10, no. 5, pp. 557-570, 2002. (Pubitemid 35384857)
-
(2002)
International Journal of Uncertainty, Fuzziness and Knowlege-Based Systems
, vol.10
, Issue.5
, pp. 557-570
-
-
Sweeney, L.1
-
31
-
-
36549043405
-
Protecting location privacy with personalized k-anonymity: Architecture and algorithms
-
DOI 10.1109/TMC.2007.1062
-
B. Gedik and L. Liu, "Protecting location privacy with personalized k-anonymity: Architecture and algorithms," IEEE Trans. Mobile Comput., vol. 7, no. 1, pp. 1-18, Jan. 2008. (Pubitemid 350183929)
-
(2008)
IEEE Transactions on Mobile Computing
, vol.7
, Issue.1
, pp. 1-18
-
-
Gedik, B.1
Liu, L.2
-
32
-
-
85020160358
-
Anonymity in location-based services: Towards a general framework
-
C. Bettini, S. Mascetti, X. S. Wang, and S. Jajodia, "Anonymity in location-based services: Towards a general framework," in Proc. IEEE Int. Conf. Mobile Data Management, 2007, pp. 69-76.
-
(2007)
Proc. IEEE Int. Conf. Mobile Data Management
, pp. 69-76
-
-
Bettini, C.1
Mascetti, S.2
Wang, X.S.3
Jajodia, S.4
-
33
-
-
24944432404
-
A formal model of obfuscation and negotiation for location privacy
-
Pervasive Computing: Third International Conference, PERVASIVE 2005, Proceedings
-
M. Duckham and L. Kulik, "A formal model of obfuscation and negotiation for location privacy," in Proc. 3rd Int. Conf. Pervasive Computing (PERVASIVE'05), 2005, pp. 152-170. (Pubitemid 41313330)
-
(2005)
Lecture Notes in Computer Science
, vol.3468
, pp. 152-170
-
-
Duckham, M.1
Kulik, L.2
-
34
-
-
37849032496
-
Location privacy protection through obfuscation-based techniques
-
C. Ardagna, M. Cremonini, E. Damiani, S. De Capitani Di Vimercati, and P. Samarati, "Location privacy protection through obfuscation-based techniques," Data and Applications Security XXI, pp. 47-60, 2007.
-
(2007)
Data and Applications Security XXI
, pp. 47-60
-
-
Ardagna, C.1
Cremonini, M.2
Damiani, E.3
De Vimercati Di Capitani, S.4
Samarati, P.5
-
35
-
-
77953316394
-
On the age of pseudonyms in mobile ad hoc networks
-
J. Freudiger, M. H. Manshaei, J. Y. Le Boudec, and J. P. Hubaux, "On the age of pseudonyms in mobile ad hoc networks," in Proc. IEEE INFOCOM, 2010, pp. 1-9.
-
(2010)
Proc. IEEE INFOCOM
, pp. 1-9
-
-
Freudiger, J.1
Manshaei, M.H.2
Le Boudec, J.Y.3
Hubaux, J.P.4
-
36
-
-
69949127837
-
On the optimal placement of mix zones
-
New York, NY, USA: Springer
-
J. Freudiger, R. Shokri, and J. P. Hubaux, "On the optimal placement of mix zones," in Privacy Enhancing Technologies. New York, NY, USA: Springer, 2009, pp. 216-234.
-
(2009)
Privacy Enhancing Technologies
, pp. 216-234
-
-
Freudiger, J.1
Shokri, R.2
Hubaux, J.P.3
-
37
-
-
84861645005
-
Traffic-aware multiple mix zone placement for protecting location privacy
-
X. Liu, H. Zhao, M. Pan, H. Yue, X. Li, and Y. Fang, "Traffic-aware multiple mix zone placement for protecting location privacy," in Proc. IEEE INFOCOM, 2012, pp. 972-980.
-
(2012)
Proc. IEEE INFOCOM
, pp. 972-980
-
-
Liu, X.1
Zhao, H.2
Pan, M.3
Yue, H.4
Li, X.5
Fang, Y.6
-
38
-
-
80054041343
-
History trajectory privacy-preserving through graph partition
-
Z. Huo, Y. Huang, and X. Meng, "History trajectory privacy-preserving through graph partition," in Proc. ACM 1st Int. Workshop on Mobile Location-Based Service, 2011, pp. 71-78.
-
(2011)
Proc. ACM 1st Int. Workshop on Mobile Location-Based Service
, pp. 71-78
-
-
Huo, Z.1
Huang, Y.2
Meng, X.3
-
39
-
-
48649103506
-
Protecting moving trajectories with dummies
-
T. H. You, W. C. Peng, and W. C. Lee, "Protecting moving trajectories with dummies," in Proc. IEEE Int. Conf. Mobile Data Management, 2007, pp. 278-282.
-
(2007)
Proc. IEEE Int. Conf. Mobile Data Management
, pp. 278-282
-
-
You, T.H.1
Peng, W.C.2
Lee, W.C.3
-
41
-
-
70349136172
-
Towards trajectory anonymization: A generalization-based approach
-
M. E. Nergiz, M. Atzori, and Y. Saygin, "Towards trajectory anonymization: A generalization-based approach," in Proc. ACM SIGSPATIAL ACM GIS 2008 Int. Workshop on Security and Privacy in GIS and LBS, 2008, pp. 52-61.
-
(2008)
Proc. ACM SIGSPATIAL ACM GIS 2008 Int. Workshop on Security and Privacy in GIS and LBS
, pp. 52-61
-
-
Nergiz, M.E.1
Atzori, M.2
Saygin, Y.3
-
42
-
-
52649110568
-
Never walk alone: Uncertainty for anonymity in moving objects databases
-
O. Abul, F. Bonchi, and M. Nanni, "Never walk alone: Uncertainty for anonymity in moving objects databases," in Proc. IEEE 24th Int. Conf. Data Engineering (ICDE2008), 2008, pp. 376-385.
-
(2008)
Proc. IEEE 24th Int. Conf. Data Engineering (ICDE2008)
, pp. 376-385
-
-
Abul, O.1
Bonchi, F.2
Nanni, M.3
-
43
-
-
70349095406
-
Anonymizing moving objects: How to hide a mob in a crowd?
-
R. Yarovoy, F. Bonchi, L. V. S. Lakshmanan, and W. H. Wang, "Anonymizing moving objects: How to hide a mob in a crowd?," in Proc. ACM 12th Int. Conf. Extending Database Technology: Advances in Database Technology, 2009, pp. 72-83.
-
(2009)
Proc. ACM 12th Int. Conf. Extending Database Technology: Advances in Database Technology
, pp. 72-83
-
-
Yarovoy, R.1
Bonchi, F.2
Lakshmanan, L.V.S.3
Wang, W.H.4
-
44
-
-
51349083760
-
Exploring historical location data for anonymity preservation in location-based services
-
T. Xu and Y. Cai, "Exploring historical location data for anonymity preservation in location-based services," in Proc. IEEE 27th Conf. Computer Communications (INFOCOM2008), 2008, pp. 547-555.
-
(2008)
Proc. IEEE 27th Conf. Computer Communications (INFOCOM2008)
, pp. 547-555
-
-
Xu, T.1
Cai, Y.2
-
45
-
-
84860700024
-
You can walk alone: Trajectory privacy-preserving through significant stays protection
-
Z. Huo, X. Meng, H. Hu, and Y. Huang, "You can walk alone: Trajectory privacy-preserving through significant stays protection," in Proc. 17th Int. Conf. Database Systems for Advanced Applications (DASFAA2012), 2012, pp. 351-366.
-
(2012)
Proc. 17th Int. Conf. Database Systems for Advanced Applications (DASFAA2012)
, pp. 351-366
-
-
Huo, Z.1
Meng, X.2
Hu, H.3
Huang, Y.4
-
46
-
-
56749150055
-
A clustering-based approach for discovering interesting places in trajectories
-
ACM
-
A. T. Palma, V. Bogorny, B. Kuijpers, and L. O. Alvares, "A clustering-based approach for discovering interesting places in trajectories," in Proc. 2008 ACM Symp. Applied Computing, 2008, pp. 863-868, ACM.
-
(2008)
Proc. 2008 ACM Symp. Applied Computing
, pp. 863-868
-
-
Palma, A.T.1
Bogorny, V.2
Kuijpers, B.3
Alvares, L.O.4
-
47
-
-
80051480636
-
C-safety: A framework for the anonymization of semantic trajectories
-
A. Monreale, R. Trasarti, D. Pedreschi, C. Renso, and V. Bogorny, "C-safety: A framework for the anonymization of semantic trajectories," Trans. Data Privacy, vol. 4, no. 2, pp. 73-101, 2011.
-
(2011)
Trans. Data Privacy
, vol.4
, Issue.2
, pp. 73-101
-
-
Monreale, A.1
Trasarti, R.2
Pedreschi, D.3
Renso, C.4
Bogorny, V.5
-
48
-
-
84865656232
-
Mining interesting locations and travel sequences from gps trajectories
-
Y. Zheng, L. Zhang, X. Xie, and W. Y. Ma, "Mining interesting locations and travel sequences from gps trajectories," in Proc. ACM 18th Int. Conf. World Wide Web, 2009, pp. 791-800.
-
(2009)
Proc. ACM 18th Int. Conf. World Wide Web
, pp. 791-800
-
-
Zheng, Y.1
Zhang, L.2
Xie, X.3
Ma, W.Y.4
-
49
-
-
57349110591
-
Anonysense: Privacy-aware people-centric sensing
-
C. Cornelius, A. Kapadia, D. Kotz, D. Peebles, M. Shin, and N. Trian-dopoulos, "Anonysense: Privacy-aware people-centric sensing," in Proc. ACM 6th Int. Conf. Mobile Systems, Applications, and Services, 2008, pp. 211-224.
-
(2008)
Proc. ACM 6th Int. Conf. Mobile Systems, Applications, and Services
, pp. 211-224
-
-
Cornelius, C.1
Kapadia, A.2
Kotz, D.3
Peebles, D.4
Shin, M.5
Trian-Dopoulos, N.6
-
50
-
-
0002947255
-
A mathematical theory of communication
-
C. E. Shannon, "A mathematical theory of communication," ACM SIG-MOBILE Mobile Comput. Commun. Rev., vol. 5, no. 1, pp. 3-55, 2001.
-
(2001)
ACM SIG-MOBILE Mobile Comput. Commun. Rev.
, vol.5
, Issue.1
, pp. 3-55
-
-
Shannon, C.E.1
-
51
-
-
84891881812
-
Privacy: Understanding what, when, and where inference channels in multicamera surveillance video
-
M. Saini, P. K. Atrey, S. Mehrotra, and M. Kankanhalli,"-privacy: Understanding what, when, and where inference channels in multicamera surveillance video," Multimedia Tools and Applicat., pp. 1-24, 2012.
-
(2012)
Multimedia Tools and Applicat.
, pp. 1-24
-
-
Saini, M.1
Atrey, P.K.2
Mehrotra, S.3
Kankanhalli, M.4
|