-
1
-
-
52649110568
-
Never walk alone: Uncertainty for anonymity in moving objects database
-
Cancun, Mexico, Apr
-
O. Abul, F. Bonchi, and M. Nanni, "Never walk alone: Uncertainty for anonymity in moving objects database, " in Proc. IEEE ICDE, Cancun, Mexico, Apr. 2008, pp. 376-385.
-
(2008)
Proc. IEEE ICDE
, pp. 376-385
-
-
Abul, O.1
Bonchi, F.2
Nanni, M.3
-
2
-
-
0041783510
-
Privacy-preserving data mining
-
R. Agrawal and R. Srikant, "Privacy-preserving data mining, " SIGMOD Rec., vol. 29, no. 2, pp. 439-450, 2000.
-
(2000)
SIGMOD Rec.
, vol.29
, Issue.2
, pp. 439-450
-
-
Agrawal, R.1
Srikant, R.2
-
3
-
-
28444449426
-
Data privacy through optimal k-anonymization
-
Tokyo, Japan, Apr
-
R. J. Bayardo and R. Agrawal, "Data privacy through optimal k-anonymization, " in Proc. IEEE ICDE, Tokyo, Japan, Apr. 2005, pp. 217-228.
-
(2005)
Proc. IEEE ICDE
, pp. 217-228
-
-
Bayardo, R.J.1
Agrawal, R.2
-
4
-
-
79952449865
-
Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments
-
C.-Y. Chow, M. F. Mokbel, and X. Liu, "Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments, " GeoInformatica, vol. 15, no. 2, pp. 351-380, 2011.
-
(2011)
GeoInformatica
, vol.15
, Issue.2
, pp. 351-380
-
-
Chow, C.-Y.1
Mokbel, M.F.2
Liu, X.3
-
5
-
-
77955220391
-
Playing devil's advocate: Inferring sensitive information from anonymized network traces
-
San Diego, CA, Feb
-
S. E. Coull, C. V. Wright, F. Monrose, M. P. Collins, and M. K. Reiter, "Playing devil's advocate: Inferring sensitive information from anonymized network traces, " in Proc. NDSS, San Diego, CA, Feb. 2007, pp. 16-28.
-
(2007)
Proc. NDSS
, pp. 16-28
-
-
Coull, S.E.1
Wright, C.V.2
Monrose, F.3
Collins, M.P.4
Reiter, M.K.5
-
7
-
-
85081455321
-
-
Dartmouth College, Hanover, NH, "CRAWDAD, " 2012 [Online]. Available: http://crawdad. cs. dartmouth. edu/
-
(2012)
CRAWDAD
-
-
College, D.1
Hanover2
Nh3
-
8
-
-
33745556605
-
Calibrating noise to sensitivity in private data analysis
-
Mar
-
C. Dwork, F. McSherry, K. Nissim, and A. Smith, "Calibrating noise to sensitivity in private data analysis, " in Proc. TCC, Mar. 2006, pp. 265-284.
-
(2006)
Proc. TCC
, pp. 265-284
-
-
Dwork, C.1
McSherry, F.2
Nissim, K.3
Smith, A.4
-
9
-
-
70349305273
-
Differential privacy, a survey of results
-
Xi'an, China, Apr
-
C. Dwork, "Differential privacy, a survey of results, " in Proc. TAMC, Xi'an, China, Apr. 2008, pp. 1-19.
-
(2008)
Proc. TAMC
, pp. 1-19
-
-
Dwork, C.1
-
10
-
-
57349124799
-
The pothole patrol: Using a mobile sensor network for road surface monitoring
-
Breckenridge, CO, Jun
-
J. Eriksson, L. Girod, B. Hull, R. Newton, S. Madden, and H. Balakrishnan, "The pothole patrol: Using a mobile sensor network for road surface monitoring, " in Proc. ACM MobiSys, Breckenridge, CO, Jun. 2008, pp. 29-39.
-
(2008)
Proc. ACM MobiSys
, pp. 29-39
-
-
Eriksson, J.1
Girod, L.2
Hull, B.3
Newton, R.4
Madden, S.5
Balakrishnan, H.6
-
11
-
-
84888607874
-
Evaluating the privacy risk of location-based services
-
Feb
-
J. Freudiger, R. Shokri, and J.-P. Hubaux, "Evaluating the privacy risk of location-based services, " in Proc. Finan. Cryptogr. Data Security (FC), Feb. 2011, pp. 31-46.
-
(2011)
Proc. Finan. Cryptogr. Data Security (FC)
, pp. 31-46
-
-
Freudiger, J.1
Shokri, R.2
Hubaux, J.-P.3
-
13
-
-
27944454864
-
Location privacy in mobile systems: A personalized anonymization model
-
Columbus, OH, Jun
-
B. Gedik and L. Liu, "Location privacy in mobile systems: A personalized anonymization model, " in Proc. IEEE ICDCS, Columbus, OH, Jun. 2005, pp. 620-629.
-
(2005)
Proc. IEEE ICDCS
, pp. 620-629
-
-
Gedik, B.1
Liu, L.2
-
14
-
-
67650312114
-
On the anonymity of home/work location pairs
-
Nara, Japan, May
-
P. Golle and K. Partridge, "On the anonymity of home/work location pairs, " in Proc. Pervasive, Nara, Japan, May 2009, pp. 390-397.
-
(2009)
Proc. Pervasive
, pp. 390-397
-
-
Golle, P.1
Partridge, K.2
-
15
-
-
85018204196
-
Anonymous usage of location-based services through spatial and temporal cloaking
-
San Francisco, CA, May
-
M. Gruteser and D. Grunwald, "Anonymous usage of location-based services through spatial and temporal cloaking, " in Proc. ACM MobiSys, San Francisco, CA, May 2003, pp. 31-42.
-
(2003)
Proc. ACM MobiSys
, pp. 31-42
-
-
Gruteser, M.1
Grunwald, D.2
-
16
-
-
84555217817
-
Differential privacy for location pattern mining
-
Chicago, IL, Nov
-
S.-S. Ho and S. Ruan, "Differential privacy for location pattern mining, " in Proc. ACM SIGSPATIAL-Int. Workshop Security Privacy GIS LBS, Chicago, IL, Nov. 2011, pp. 17-24.
-
(2011)
Proc. ACM SIGSPATIAL-Int. Workshop Security Privacy GIS LBS
, pp. 17-24
-
-
Ho, S.-S.1
Ruan, S.2
-
17
-
-
79960284481
-
Nuclear threat detection with mobile distributed sensor networks
-
D. S. Hochbaum and B. Fishbain, "Nuclear threat detection with mobile distributed sensor networks, " Ann. Oper. Res., vol. 187, no. 1, pp. 45-63, 2009.
-
(2009)
Ann. Oper. Res.
, vol.187
, Issue.1
, pp. 45-63
-
-
Hochbaum, D.S.1
Fishbain, B.2
-
18
-
-
57349108972
-
Preserving privacy in GPS traces via uncertainty-aware path cloaking
-
Alexandria, VA, Oct
-
B. Hoh, M. Gruteser, H. Xiong, and A. Alrabady, "Preserving privacy in GPS traces via uncertainty-aware path cloaking, " in Proc. ACM CCS, Alexandria, VA, Oct. 2007, pp. 161-171.
-
(2007)
Proc. ACM CCS
, pp. 161-171
-
-
Hoh, B.1
Gruteser, M.2
Xiong, H.3
Alrabady, A.4
-
19
-
-
37749052702
-
Power law and exponential decay of inter contact times between mobile devices
-
Montreal, QC, Canada, Sep
-
T. Karagiannis, J.-Y. L. Boudec, and M. Vojnovic, "Power law and exponential decay of inter contact times between mobile devices, " in Proc. ACM MobiCom, Montreal, QC, Canada, Sep. 2007, pp. 183-194.
-
(2007)
Proc. ACM MobiCom
, pp. 183-194
-
-
Karagiannis, T.1
Boudec, J.-Y.L.2
Vojnovic, M.3
-
20
-
-
35448965488
-
Closeness: Privacy beyond-anonymity and-diversity
-
Istanbul, Turkey, Apr
-
N. Li and T. Li, "-closeness: Privacy beyond-anonymity and-diversity, " in Proc. IEEE ICDE, Istanbul, Turkey, Apr. 2007, pp. 106-115.
-
(2007)
Proc. IEEE ICDE
, pp. 106-115
-
-
Li, N.1
Li, T.2
-
21
-
-
33749607006
-
Diversity: Privacy beyond-anonymity
-
Atlanta, GA, Apr
-
A. Machanavajjhala, J. Gehrke, D. Kifer, and M. Venkitasubramaniam, "-diversity: Privacy beyond-anonymity, " in Proc. IEEE ICDE, Atlanta, GA, Apr. 2006, p. 24.
-
(2006)
Proc. IEEE ICDE
, pp. 24
-
-
Machanavajjhala, A.1
Gehrke, J.2
Kifer, D.3
Venkitasubramaniam, M.4
-
22
-
-
52649169678
-
Privacy: Theory meets practice on the map
-
Mexico, Apr
-
A. Machanavajjhala, D. Kifer, J. M. Abowd, J. Gehrke, and L. Vilhuber, "Privacy: Theory meets practice on the map, " in IEEE ICDE, Cancun, Mexico, Apr. 2008, pp. 277-286.
-
(2008)
IEEE ICDE, Cancun
, pp. 277-286
-
-
Machanavajjhala, A.1
Kifer, D.2
Abowd, J.M.3
Gehrke, J.4
Vilhuber, L.5
-
23
-
-
34548748619
-
Worst-case background knowledge for privacy-preserving data publishing
-
Istanbul, Turkey, Apr
-
D. J. Martin, D. Kifer, A. Machanavajjhala, J. Gehrke, and J. Y. Halpern, "Worst-case background knowledge for privacy-preserving data publishing, " in Proc. IEEE ICDE, Istanbul, Turkey, Apr. 2007, pp. 126-135.
-
(2007)
Proc. IEEE ICDE
, pp. 126-135
-
-
Martin, D.J.1
Kifer, D.2
Machanavajjhala, A.3
Gehrke, J.4
Halpern, J.Y.5
-
24
-
-
70450278755
-
Hiding stars with fireworks: Location privacy through camouflage
-
Beijing, China, Sep
-
J. Meyerowitz and R. R. Choudhury, "Hiding stars with fireworks: Location privacy through camouflage, " in Proc. ACM MobiCom, Beijing, China, Sep. 2009, pp. 345-356.
-
(2009)
Proc. ACM MobiCom
, pp. 345-356
-
-
Meyerowitz, J.1
Choudhury, R.R.2
-
25
-
-
84866503594
-
Nericell: Rich monitoring of road and traffic conditions using mobile smartphones
-
Raleigh, NC, Nov
-
P. Mohan, V. N. Padmanabhan, and R. Ramjee, "Nericell: Rich monitoring of road and traffic conditions using mobile smartphones, " in Proc. ACM SenSys, Raleigh, NC, Nov. 2008, pp. 357-358.
-
(2008)
Proc. ACM SenSys
, pp. 357-358
-
-
Mohan, P.1
Padmanabhan, V.N.2
Ramjee, R.3
-
26
-
-
50249142450
-
Robust de-anonymization of large sparse datasets
-
Oakland, CA, May
-
A. Narayanan and V. Shmatikov, "Robust de-anonymization of large sparse datasets, " in Proc. 29th IEEE Symp. Security Privacy, Oakland, CA, May 2008, pp. 111-125.
-
(2008)
Proc. 29th IEEE Symp. Security Privacy
, pp. 111-125
-
-
Narayanan, A.1
Shmatikov, V.2
-
27
-
-
70449632682
-
De-anonymizing social networks
-
Oakland, CA, May
-
A. Narayanan and V. Shmatikov, "De-anonymizing social networks, " in Proc. IEEE Symp. Security Privacy, Oakland, CA, May 2009, pp. 173-187.
-
(2009)
Proc. IEEE Symp. Security Privacy
, pp. 173-187
-
-
Narayanan, A.1
Shmatikov, V.2
-
28
-
-
84879183233
-
-
NASA Ames Research Center, Moffett Field, CA
-
NASA Ames Research Center, Moffett Field, CA, "NASA Ames scientist develops cell phone chemical sensor, " 2009 [Online]. Available: http://www.nasa. gov/centers/ames/news/features/2009/cell-phone-sensors. html
-
(2009)
NASA Ames Scientist Develops Cell Phone Chemical Sensor
-
-
-
29
-
-
73949100139
-
Towards trajectory anonymization: A generalization-based approach
-
M. E. Nergiz, M. Atzori, Y. Saygin, and B. Guc, "Towards trajectory anonymization: A generalization-based approach, " Trans. Data Privacy, vol. 2, no. 1, pp. 47-75, 2009.
-
(2009)
Trans. Data Privacy
, vol.2
, Issue.1
, pp. 47-75
-
-
Nergiz, M.E.1
Atzori, M.2
Saygin, Y.3
Guc, B.4
-
32
-
-
77954711910
-
Differentially private aggregation of distributed time-series with transformation and encryption
-
Indianapolis, IN, Jun
-
V. Rastogi and S. Nath, "Differentially private aggregation of distributed time-series with transformation and encryption, " in Proc. SIGMOD, Indianapolis, IN, Jun. 2010, pp. 735-746.
-
(2010)
Proc. SIGMOD
, pp. 735-746
-
-
Rastogi, V.1
Nath, S.2
-
33
-
-
79952950892
-
Analyzing privacy in enterprise packet trace anonymization
-
San Diego, CA, Feb
-
B. Ribeiro, W. Chen, G. Miklau, and D. Towsley, "Analyzing privacy in enterprise packet trace anonymization, " in Proc. NDSS, San Diego, CA, Feb. 2008, pp. 87-100.
-
(2008)
Proc. NDSS
, pp. 87-100
-
-
Ribeiro, B.1
Chen, W.2
Miklau, G.3
Towsley, D.4
-
34
-
-
84879152366
-
-
HKUST, Hong Kong
-
HKUST, Hong Kong, "ShangHai grid, " [Online]. Available: http://www.cse. ust. hk/scrg
-
ShangHai Grid
-
-
-
35
-
-
79961201025
-
Quantifying location privacy: The case of sporadic location exposure
-
Vigo, Spain, Jul
-
R. Shokri, G. Theodorakopoulos, G. Danezis, J.-P. Hubaux, and J.-Y. Le Boudec, "Quantifying location privacy: The case of sporadic location exposure, " in Proc. PETS, Vigo, Spain, Jul. 2011, pp. 57-76.
-
(2011)
Proc. PETS
, pp. 57-76
-
-
Shokri, R.1
Theodorakopoulos, G.2
Danezis, G.3
Hubaux, J.-P.4
Le Boudec, J.-Y.5
-
36
-
-
80051968910
-
Quantifying location privacy
-
Oakland, CA, May
-
R. Shokri, G. Theodorakopoulos, J.-Y. Le Boudec, and J.-P. Hubaux, "Quantifying location privacy, " in Proc. IEEE Symp. Security Privacy, Oakland, CA, May 2011, pp. 247-262.
-
(2011)
Proc. IEEE Symp. Security Privacy
, pp. 247-262
-
-
Shokri, R.1
Theodorakopoulos, G.2
Le Boudec, J.-Y.3
Hubaux, J.-P.4
-
37
-
-
0036811662
-
K-anonymity: A model for protecting privacy
-
L. Sweeney, "K-anonymity: A model for protecting privacy, " Int. J. Uncertainty, Fuzziness Knowl.-Based Syst., vol. 10, no. 5, pp. 557-570, 2002.
-
(2002)
Int. J. Uncertainty, Fuzziness Knowl.-Based Syst.
, vol.10
, Issue.5
, pp. 557-570
-
-
Sweeney, L.1
-
39
-
-
51349142350
-
Privacy preservation in the publication of trajectories
-
Beijing, China, Apr
-
M. Terrovitis and N. Mamoulis, "Privacy preservation in the publication of trajectories, " in Proc. MDM, Beijing, China, Apr. 2008, pp. 65-72.
-
(2008)
Proc. MDM
, pp. 65-72
-
-
Terrovitis, M.1
Mamoulis, N.2
-
40
-
-
77955214796
-
A practical attack to de-anonymize social network users
-
Oakland, CA, May
-
G. Wondracek, T. Holz, E. Kirda, and C. Kruegel, "A practical attack to de-anonymize social network users, " in Proc. IEEE Symp. Security Privacy, Oakland, CA, May 2010, pp. 223-238.
-
(2010)
Proc. IEEE Symp. Security Privacy
, pp. 223-238
-
-
Wondracek, G.1
Holz, T.2
Kirda, E.3
Kruegel, C.4
-
41
-
-
35448967088
-
M-invariance: Towards privacy preserving re-publication of dynamic datasets
-
Beijing, China, Jun
-
X. Xiao and Y. Tao, "M-invariance: Towards privacy preserving re-publication of dynamic datasets, " in Proc. ACM SIGMOD, Beijing, China, Jun. 2007, pp. 689-700.
-
(2007)
Proc. ACM SIGMOD
, pp. 689-700
-
-
Xiao, X.1
Tao, Y.2
|