-
1
-
-
84857073828
-
Evaluating the privacy risk of location-based services
-
Volume 7035 of LNCS., Springer
-
Freudiger, J., Shokri, R., Hubaux, J.P.: Evaluating the privacy risk of location-based services. In: Proc. of FC'11. Volume 7035 of LNCS., Springer (2011) 31-46
-
(2011)
Proc. of FC'11
, pp. 31-46
-
-
Freudiger, J.1
Shokri, R.2
Hubaux, J.P.3
-
2
-
-
67650312114
-
On the anonymity of home/work location pairs
-
Volume 5538 of LNCS. Springer-Verlag
-
Golle, P., Partridge, K.: On the anonymity of home/work location pairs. In: Proc. of PerCom'09. Volume 5538 of LNCS. Springer-Verlag (2009) 390-397
-
(2009)
Proc. of PerCom'09
, pp. 390-397
-
-
Golle, P.1
Partridge, K.2
-
3
-
-
38049035427
-
Inference attacks on location tracks
-
Volume 4480 of LNCS., Springer
-
Krumm, J.: Inference attacks on location tracks. In: Proc. of PERVASIVE. Volume 4480 of LNCS., Springer (2007) 127-143
-
(2007)
Proc. of PERVASIVE
, pp. 127-143
-
-
Krumm, J.1
-
5
-
-
74049115383
-
Faking contextual data for fun, profit, and privacy
-
Chow, R., Golle, P.: Faking contextual data for fun, profit, and privacy. In: Proc. of WPES, ACM (2009) 105-108
-
(2009)
Proc. of WPES, ACM
, pp. 105-108
-
-
Chow, R.1
Golle, P.2
-
6
-
-
69949127837
-
On the optimal placement of mix zones
-
Volume 5672 of LNCS., Springer
-
Freudiger, J., Shokri, R., Hubaux, J.P.: On the optimal placement of mix zones. In: Proc. of PETS 2009. Volume 5672 of LNCS., Springer (2009) 216-234
-
(2009)
Proc. of PETS 2009
, pp. 216-234
-
-
Freudiger, J.1
Shokri, R.2
Hubaux, J.P.3
-
7
-
-
57349108972
-
Preserving privacy in gps traces via uncertainty-aware path cloaking
-
ACM
-
Hoh, B., Gruteser, M., Xiong, H., Alrabady, A.: Preserving privacy in gps traces via uncertainty-aware path cloaking. In: Proc. of CCS, ACM (2007) 161-171
-
(2007)
Proc. of CCS
, pp. 161-171
-
-
Hoh, B.1
Gruteser, M.2
Xiong, H.3
Alrabady, A.4
-
8
-
-
84869465300
-
Protecting location privacy: Optimal strategy against localization attacks
-
ACM
-
Shokri, R., Theodorakopoulos, G., Troncoso, C., Hubaux, J.P., Boudec, J.Y.L.: Protecting location privacy: optimal strategy against localization attacks. In: Proc. of CCS, ACM (2012) 617-627
-
(2012)
Proc. of CCS
, pp. 617-627
-
-
Shokri, R.1
Theodorakopoulos, G.2
Troncoso, C.3
Hubaux, J.P.4
Boudec, J.Y.L.5
-
9
-
-
84889037772
-
Geo-indistinguishability: Differential privacy for location-based systems
-
ACM
-
Andrés, M.E., Bordenabe, N.E., Chatzikokolakis, K., Palamidessi, C.: Geo-indistinguishability: differential privacy for location-based systems. In: Proc. of CCS, ACM (2013) 901-914
-
(2013)
Proc. of CCS
, pp. 901-914
-
-
Andrés, M.E.1
Bordenabe, N.E.2
Chatzikokolakis, K.3
Palamidessi, C.4
-
10
-
-
80051968910
-
Quantifying location privacy
-
IEEE
-
Shokri, R., Theodorakopoulos, G., Boudec, J.Y.L., Hubaux, J.P.: Quantifying location privacy. In: Proc. of S&P, IEEE (2011) 247-262
-
(2011)
Proc. of S&P
, pp. 247-262
-
-
Shokri, R.1
Theodorakopoulos, G.2
Boudec, J.Y.L.3
Hubaux, J.P.4
-
11
-
-
33745556605
-
Calibrating noise to sensitivity in private data analysis
-
Volume 3876 of LNCS., Springer
-
Dwork, C., Mcsherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. In: Proc. of TCC. Volume 3876 of LNCS., Springer (2006) 265-284
-
(2006)
Proc. of TCC
, pp. 265-284
-
-
Dwork, C.1
McSherry, F.2
Nissim, K.3
Smith, A.4
-
12
-
-
84884918157
-
Broadening the scope of Differential Privacy using metrics
-
Volume 7981 of LNCS., Springer
-
Chatzikokolakis, K., Andrés, M.E., Bordenabe, N.E., Palamidessi, C.: Broadening the scope of Differential Privacy using metrics. In: Proc. of PETS. Volume 7981 of LNCS., Springer (2013) 82-102
-
(2013)
Proc. of PETS
, pp. 82-102
-
-
Chatzikokolakis, K.1
Andrés, M.E.2
Bordenabe, N.E.3
Palamidessi, C.4
-
13
-
-
84904017518
-
A predictive differentially-private mechanism for mobility traces
-
Volume 8555 of LNCS., Springer
-
Chatzikokolakis, K., Palamidessi, C., Stronati, M.: A predictive differentially-private mechanism for mobility traces. In: Proc. of PETS. Volume 8555 of LNCS., Springer (2014) 21-41
-
(2014)
Proc. of PETS
, pp. 21-41
-
-
Chatzikokolakis, K.1
Palamidessi, C.2
Stronati, M.3
-
14
-
-
84910632138
-
Optimal geo-indistinguishable mechanisms for location privacy
-
arXiv: 1402.5029
-
Bordenabe, N.E., Chatzikokolakis, K., Palamidessi, C.: Optimal geo-indistinguishable mechanisms for location privacy. Tech. rep., INRIA (2013) arXiv:1402.5029.
-
(2013)
Tech. Rep., INRIA
-
-
Bordenabe, N.E.1
Chatzikokolakis, K.2
Palamidessi, C.3
-
15
-
-
78249264133
-
Distance makes the types grow stronger: A calculus for differential privacy
-
Reed, J., Pierce, B.C.: Distance makes the types grow stronger: a calculus for differential privacy. In: Proc. of ICFP, ACM (2010) 157-168
-
(2010)
Proc. of ICFP, ACM
, pp. 157-168
-
-
Reed, J.1
Pierce, B.C.2
-
16
-
-
84910670531
-
Geometric spanner networks
-
Narasimhan, G., Smid, M.: Geometric spanner networks. CUP (2007)
-
(2007)
CUP
-
-
Narasimhan, G.1
Smid, M.2
-
18
-
-
38149112031
-
Computing geometric minimum-dilation graphs is np-hard
-
Springer
-
Klein, R., Kutz, M.: Computing Geometric Minimum-Dilation Graphs is NP-Hard. In: Proc. of the GD. Volume 4372., Springer (2006) 196-207
-
(2006)
Proc. of the GD
, vol.4372
, pp. 196-207
-
-
Klein, R.1
Kutz, M.2
-
19
-
-
84910667742
-
-
Location Guard. https://github.com/chatziko/location-guard.
-
Location Guard
-
-
-
20
-
-
59249083364
-
Understanding mobility based on gps data
-
Zheng, Y., Li, Q., Chen, Y., Xie, X., Ma, W.Y.:Understanding Mobility Based on GPS Data. In: Proc. of UbiComp 2008. (2008)
-
(2008)
Proc. of UbiComp 2008
-
-
Zheng, Y.1
Li, Q.2
Chen, Y.3
Xie, X.4
Ma, W.Y.5
-
21
-
-
84865656232
-
Mining interesting locations and travel sequences from GPS trajectories
-
Zheng, Y., Zhang, L., Xie, X., Ma, W.Y.: Mining interesting locations and travel sequences from GPS trajectories. In: Proc. of WWW 2009. (2009)
-
(2009)
Proc. of WWW 2009
-
-
Zheng, Y.1
Zhang, L.2
Xie, X.3
Ma, W.Y.4
-
22
-
-
78449245352
-
Geolife: A collaborative social networking service among user, location and trajectory
-
Zheng, Y., Xie, X., Ma, W.Y.: Geolife: A collaborative social networking service among user, location and trajectory. IEEE Data Eng. Bull. 33(2) (2010) 32-39
-
(2010)
IEEE Data Eng. Bull
, vol.33
, Issue.2
, pp. 32-39
-
-
Zheng, Y.1
Xie, X.2
Ma, W.Y.3
-
23
-
-
80052688627
-
Driving with knowledge from the physical world
-
Yuan, J., Zheng, Y., Xie, X., Sun, G.: Driving with knowledge from the physical world. In: The 17th ACM SIGKDD international conference on Knowledge Discovery and Data mining, KDD '11. (2011)
-
(2011)
The 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD '11
-
-
Yuan, J.1
Zheng, Y.2
Xie, X.3
Sun, G.4
-
24
-
-
78650629618
-
T-drive: Driving directions based on taxi trajectories
-
Yuan, J., Zheng, Y., Zhang, C., Xie, W., Xie, X., Sun, G., Huang, Y.: T-drive: driving directions based on taxi trajectories. In: GIS. (2010) 99-108
-
(2010)
GIS
, pp. 99-108
-
-
Yuan, J.1
Zheng, Y.2
Zhang, C.3
Xie, W.4
Xie, X.5
Sun, G.6
Huang, Y.7
-
25
-
-
85018204196
-
Anonymous usage of location-based services through spatial and temporal cloaking
-
Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: Proc. of MobiSys, USENIX (2003)
-
(2003)
Proc. of MobiSys, USENIX
-
-
Gruteser, M.1
Grunwald, D.2
-
26
-
-
27944454864
-
Location privacy in mobile systems: A personalized anonymization model
-
IEEE
-
Gedik, B., Liu, L.: Location privacy in mobile systems: A personalized anonymization model. In: Proc. of ICDCS, IEEE (2005) 620-629
-
(2005)
Proc. of ICDCS
, pp. 620-629
-
-
Gedik, B.1
Liu, L.2
-
27
-
-
34547720006
-
The new casper: Query processing for location services without compromising privacy
-
ACM
-
Mokbel, M.F., Chow, C.Y., Aref, W.G.: The new casper: Query processing for location services without compromising privacy. In: Proc. of VLDB, ACM (2006) 763-774
-
(2006)
Proc. of VLDB
, pp. 763-774
-
-
Mokbel, M.F.1
Chow, C.Y.2
Aref, W.G.3
-
28
-
-
57349191501
-
Supporting anonymous location queries in mobile environments with privacygrid
-
ACM
-
Bamba, B., Liu, L., Pesti, P., Wang, T.: Supporting anonymous location queries in mobile environments with privacygrid. In: Proc. of WWW, ACM (2008) 237-246
-
(2008)
Proc. of WWW
, pp. 237-246
-
-
Bamba, B.1
Liu, L.2
Pesti, P.3
Wang, T.4
-
29
-
-
24944432404
-
A formal model of obfuscation and negotiation for location privacy
-
3468 of LNCS., Springer
-
Duckham, M., Kulik, L.: A formal model of obfuscation and negotiation for location privacy. In: Proc. of PERVASIVE. Volume 3468 of LNCS., Springer (2005) 152-170
-
(2005)
Proc. of PERVASIVE
, pp. 152-170
-
-
Duckham, M.1
Kulik, L.2
-
30
-
-
68149139701
-
Location diversity: Enhanced privacy protection in location based services
-
5561 of LNCS., Springer
-
Xue, M., Kalnis, P., Pung, H.: Location diversity: Enhanced privacy protection in location based services. In: Proc. of LoCA. Volume 5561 of LNCS., Springer (2009) 70-87
-
(2009)
Proc. of LoCA
, pp. 70-87
-
-
Xue, M.1
Kalnis, P.2
Pung, H.3
-
31
-
-
33947121654
-
Protection of location privacy using dummies for location-based services
-
Kido, H., Yanagisawa, Y., Satoh, T.: Protection of location privacy using dummies for location-based services. In: Proc. of ICDE Workshops. (2005) 1248
-
(2005)
Proc. of ICDE Workshops
, pp. 1248
-
-
Kido, H.1
Yanagisawa, Y.2
Satoh, T.3
-
32
-
-
70450207983
-
Privately querying location-based services with SybilQuery
-
ACM
-
Shankar, P., Ganapathy, V., Iftode, L.: Privately querying location-based services with SybilQuery. In: Proc. of UbiComp, ACM (2009) 31-40
-
(2009)
Proc. of UbiComp
, pp. 31-40
-
-
Shankar, P.1
Ganapathy, V.2
Iftode, L.3
-
33
-
-
84910660166
-
Optimal sporadic location privacy preserving systems in presence of bandwidth constraints
-
Herrmann, M., Troncoso, C., Diaz, C., Preneel, B.: Optimal sporadic location privacy preserving systems in presence of bandwidth constraints. In: Proc. of WPES. (2013)
-
(2013)
Proc. of WPES
-
-
Herrmann, M.1
Troncoso, C.2
Diaz, C.3
Preneel, B.4
-
34
-
-
84904011573
-
Hiding in the mobile crowd: Location privacy through collaboration
-
IEEE
-
Shokri, R., Theodorakopoulos, G., Papadimitratos, P., Kazemi, E., Hubaux, J.P.: Hiding in the mobile crowd: Location privacy through collaboration. In: Proc. of the TDSC, IEEE (2014)
-
(2014)
Proc. of the TDSC
-
-
Shokri, R.1
Theodorakopoulos, G.2
Papadimitratos, P.3
Kazemi, E.4
Hubaux, J.P.5
-
35
-
-
52649169678
-
Privacy: Theory meets practice on the map
-
IEEE
-
Machanavajjhala, A., Kifer, D., Abowd, J.M., Gehrke, J., Vilhuber, L.: Privacy: Theory meets practice on the map. In: Proc. of ICDE, IEEE (2008) 277-286
-
(2008)
Proc. of ICDE
, pp. 277-286
-
-
Machanavajjhala, A.1
Kifer, D.2
Abowd, J.M.3
Gehrke, J.4
Vilhuber, L.5
-
36
-
-
84555217817
-
Differential privacy for location pattern mining
-
ACM
-
Ho, S.S., Ruan, S.: Differential privacy for location pattern mining. In: Proc. of SPRINGL, ACM (2011) 17-24
-
(2011)
Proc. of SPRINGL
, pp. 17-24
-
-
Ho, S.S.1
Ruan, S.2
-
37
-
-
84889022653
-
Local differential perturbations: Location privacy under approximate knowledge attackers
-
Dewri, R.: Local differential perturbations: Location privacy under approximate knowledge attackers. IEEE Trans. on Mobile Computing 99(PrePrints) (2012) 1
-
(2012)
IEEE Trans. on Mobile Computing 99(PrePrints
, pp. 1
-
-
Dewri, R.1
-
38
-
-
84910678849
-
Optimal user-centric data obfuscation
-
Shokri, R.: Optimal user-centric data obfuscation. Technical report, ETH Zurich (2014) http://arxiv.org/abs/1402.3426.
-
(2014)
Technical Report, ETH Zurich
-
-
Shokri, R.1
-
39
-
-
84856446756
-
Fairness through awareness
-
ACM
-
Dwork, C., Hardt, M., Pitassi, T., Reingold, O., Zemel, R.S.: Fairness through awareness. In: Proc. of ITCS, ACM (2012) 214-226
-
(2012)
Proc. of ITCS
, pp. 214-226
-
-
Dwork, C.1
Hardt, M.2
Pitassi, T.3
Reingold, O.4
Zemel, R.S.5
|