-
1
-
-
85028769214
-
Collective data-sanitization for preventing sensitive information inference attacks in social networks
-
to be published
-
Z. Cai, Z. He, X. Guan, and Y. Li, "Collective data-sanitization for preventing sensitive information inference attacks in social networks, " IEEE Trans. Depend. Secure Comput., to be published.
-
IEEE Trans. Depend. Secure Comput.
-
-
Cai, Z.1
He, Z.2
Guan, X.3
Li, Y.4
-
2
-
-
84963721108
-
An incentive mechanism with privacy protection in mobile crowdsourcing systems
-
Jun.
-
Y. Wang et al., "An incentive mechanism with privacy protection in mobile crowdsourcing systems, " Comput. Netw., vol. 102, pp. 157-171, Jun. 2016.
-
(2016)
Comput. Netw.
, vol.102
, pp. 157-171
-
-
Wang, Y.1
-
3
-
-
84923117513
-
Fog computing: A cloud to the ground support for smart things and machine-to-machine networks
-
Southbank, VIC, Australia
-
I. Stojmenovic, "Fog computing: A cloud to the ground support for smart things and machine-to-machine networks, " in Proc. Aust. Telecommun. Netw. Appl. Conf. (ATNAC), Southbank, VIC, Australia, 2014, pp. 117-122.
-
(2014)
Proc. Aust. Telecommun. Netw. Appl. Conf. (ATNAC)
, pp. 117-122
-
-
Stojmenovic, I.1
-
4
-
-
85026428825
-
Differentially private k-anonymity: Achieving query privacy in location-based services
-
Beijing, China, Oct.
-
J. Wang et al., "Differentially private k-anonymity: Achieving query privacy in location-based services, " in Proc. Int. Conf. Identification Inf. Knowl. Internet Things (IIKI), Beijing, China, Oct. 2016, pp. 1-6.
-
(2016)
Proc. Int. Conf. Identification Inf. Knowl. Internet Things (IIKI)
, pp. 1-6
-
-
Wang, J.1
-
5
-
-
84984820549
-
An energy efficient privacy-preserving content sharing scheme in mobile social networks
-
Z. He et al., "An energy efficient privacy-preserving content sharing scheme in mobile social networks, " Pers. Ubiquitous Comput., vol. 20, no. 5, pp. 833-846, 2016.
-
(2016)
Pers. Ubiquitous Comput.
, vol.20
, Issue.5
, pp. 833-846
-
-
He, Z.1
-
6
-
-
84876017555
-
Harvesting ambient geospatial information from social media feeds
-
A. Stefanidis, A. Crooks, and J. Radzikowski, "Harvesting ambient geospatial information from social media feeds, " GeoJ., vol. 78, no. 2, pp. 319-338, 2013.
-
(2013)
GeoJ.
, vol.78
, Issue.2
, pp. 319-338
-
-
Stefanidis, A.1
Crooks, A.2
Radzikowski, J.3
-
7
-
-
84979822702
-
The tolls of privacy: An underestimated roadblock for electronic toll collection usage
-
P. F. Riley, "The tolls of privacy: An underestimated roadblock for electronic toll collection usage, " Comput. Law Security Rev., vol. 24, no. 6, pp. 521-528, 2008.
-
(2008)
Comput. Law Security Rev.
, vol.24
, Issue.6
, pp. 521-528
-
-
Riley, P.F.1
-
8
-
-
80055052185
-
Location-sharing technologies: Privacy risks and controls
-
J. Y. Tsai, P. G. Kelley, L. F. Cranor, and N. Sadeh, "Location-sharing technologies: Privacy risks and controls, " J. Law Policy Inf. Soc., vol. 6, no. 2, p. 119-151, 2010.
-
(2010)
J. Law Policy Inf. Soc.
, vol.6
, Issue.2
, pp. 119-151
-
-
Tsai, J.Y.1
Kelley, P.G.2
Cranor, L.F.3
Sadeh, N.4
-
9
-
-
85026410795
-
Location-privacy-aware review publication mechanism for local business service systems
-
Atlanta, GA, USA, May
-
X. Zheng, Z. Cai, J. Li, and H. Gao, "Location-privacy-aware review publication mechanism for local business service systems, " in Proc. 36th Annu. IEEE Int. Conf. Comput. Commun. (INFOCOM), Atlanta, GA, USA, May 2017, pp. 1-9.
-
(2017)
Proc. 36th Annu. IEEE Int. Conf. Comput. Commun. (INFOCOM)
, pp. 1-9
-
-
Zheng, X.1
Cai, Z.2
Li, J.3
Gao, H.4
-
10
-
-
84880567888
-
Private proximity detection and monitoring with vicinity regions
-
New York, NY, USA
-
X. Lin, H. Hu, H. P. Li, J. Xu, and B. Choi, "Private proximity detection and monitoring with vicinity regions, " in Proc. 12th Int. ACM Workshop Data Eng. Wireless Mobile Acess, New York, NY, USA, 2013, pp. 5-12.
-
(2013)
Proc. 12th Int. ACM Workshop Data Eng. Wireless Mobile Acess
, pp. 5-12
-
-
Lin, X.1
Hu, H.2
Li, H.P.3
Xu, J.4
Choi, B.5
-
11
-
-
84992757948
-
Spatial generalisation algorithms for LBS privacy preservation
-
S. Mascetti, C. Bettini, D. Freni, and X. S. Wang, "Spatial generalisation algorithms for LBS privacy preservation, " J. Location Based Services, vol. 1, no. 3, pp. 179-207, 2007.
-
(2007)
J. Location Based Services
, vol.1
, Issue.3
, pp. 179-207
-
-
Mascetti, S.1
Bettini, C.2
Freni, D.3
Wang, X.S.4
-
12
-
-
35648982949
-
Preventing location-based identity inference in anonymous spatial queries
-
Dec.
-
P. Kalnis, G. Ghinita, K. Mouratidis, and D. Papadias, "Preventing location-based identity inference in anonymous spatial queries, " IEEE Trans. Knowl. Data Eng., vol. 19, no. 12, pp. 1719-1733, Dec. 2007.
-
(2007)
IEEE Trans. Knowl. Data Eng.
, vol.19
, Issue.12
, pp. 1719-1733
-
-
Kalnis, P.1
Ghinita, G.2
Mouratidis, K.3
Papadias, D.4
-
13
-
-
84995538989
-
Customized privacy preserving for inherent data and latent data
-
Z. He, Z. Cai, Y. Sun, Y. Li, and X. Cheng, "Customized privacy preserving for inherent data and latent data, " Pers. Ubiquitous Comput., vol. 21, no. 1, pp. 43-54, 2017.
-
(2017)
Pers. Ubiquitous Comput.
, vol.21
, Issue.1
, pp. 43-54
-
-
He, Z.1
Cai, Z.2
Sun, Y.3
Li, Y.4
Cheng, X.5
-
14
-
-
84976496511
-
FakeMask: A novel privacy preserving approach for smartphones
-
Jun.
-
L. Zhang, Z. Cai, and X. Wang, "FakeMask: A novel privacy preserving approach for smartphones, " IEEE Trans. Netw. Service Manag., vol. 13, no. 2, pp. 335-348, Jun. 2016.
-
(2016)
IEEE Trans. Netw. Service Manag.
, vol.13
, Issue.2
, pp. 335-348
-
-
Zhang, L.1
Cai, Z.2
Wang, X.3
-
15
-
-
84880559408
-
Private proximity detection for convex polygons
-
New York, NY, USA
-
B. Mu and S. Bakiras, "Private proximity detection for convex polygons, " in Proc. Int. ACM Workshop Data Eng. Wireless Mobile Acess, New York, NY, USA, 2013, pp. 36-43.
-
(2013)
Proc. Int. ACM Workshop Data Eng. Wireless Mobile Acess
, pp. 36-43
-
-
Mu, B.1
Bakiras, S.2
-
16
-
-
84978034187
-
An efficient privacy preserving data aggregation approach for mobile sensing
-
L. Zhang, X. Wang, J. Lu, P. Li, and Z. Cai, "An efficient privacy preserving data aggregation approach for mobile sensing, " Security Commun. Netw., vol. 9, no. 16, pp. 3844-3853, 2016.
-
(2016)
Security Commun. Netw.
, vol.9
, Issue.16
, pp. 3844-3853
-
-
Zhang, L.1
Wang, X.2
Lu, J.3
Li, P.4
Cai, Z.5
-
17
-
-
85018204196
-
Anonymous usage of location-based services through spatial and temporal cloaking
-
San Francisco, CA, USA
-
M. Gruteser and D. Grunwald, "Anonymous usage of location-based services through spatial and temporal cloaking, " in Proc. 1st Int. Conf. Mobile Syst. Appl. Services, San Francisco, CA, USA, 2003, pp. 31-42.
-
(2003)
Proc. 1st Int. Conf. Mobile Syst. Appl. Services
, pp. 31-42
-
-
Gruteser, M.1
Grunwald, D.2
-
18
-
-
67650312114
-
On the anonymity of home/work location pairs
-
Nara, Japan
-
P. Golle and K. Partridge, "On the anonymity of home/work location pairs, " in Proc. Int. Conf. Pervasive Comput., Nara, Japan, 2009, pp. 390-397.
-
(2009)
Proc. Int. Conf. Pervasive Comput.
, pp. 390-397
-
-
Golle, P.1
Partridge, K.2
-
19
-
-
37849018331
-
Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy
-
Boston, MA, USA
-
A. Khoshgozaran and C. Shahabi, "Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy, " in Proc. Int. Symp. Spatial Temporal Databases, Boston, MA, USA, 2007, pp. 239-257.
-
(2007)
Proc. Int. Symp. Spatial Temporal Databases
, pp. 239-257
-
-
Khoshgozaran, A.1
Shahabi, C.2
-
20
-
-
70349083235
-
Position transformation: A location privacy protection method for moving objects
-
Irvine, CA, USA
-
D. Lin, E. Bertino, R. Cheng, and S. Prabhakar, "Position transformation: A location privacy protection method for moving objects, " in Proc. SIGSPATIAL ACM GIS Int. Workshop Security Privacy GIS LBS, Irvine, CA, USA, 2008, pp. 62-71.
-
(2008)
Proc. SIGSPATIAL ACM GIS Int. Workshop Security Privacy GIS LBS
, pp. 62-71
-
-
Lin, D.1
Bertino, E.2
Cheng, R.3
Prabhakar, S.4
-
21
-
-
57149129292
-
Private queries in location based services: Anonymizers are not necessary
-
Vancouver, BC, Canada
-
G. Ghinita, P. Kalnis, A. Khoshgozaran, C. Shahabi, and K.-L. Tan, "Private queries in location based services: Anonymizers are not necessary, " in Proc. 8th ACM SIGMOD Int. Conf. Manag. Data, Vancouver, BC, Canada, 2008, pp. 121-132.
-
(2008)
Proc. 8th ACM SIGMOD Int. Conf. Manag. Data
, pp. 121-132
-
-
Ghinita, G.1
Kalnis, P.2
Khoshgozaran, A.3
Shahabi, C.4
Tan, K.-L.5
-
22
-
-
79955911586
-
Nearest neighbor search with strong location privacy
-
S. Papadopoulos, S. Bakiras, and D. Papadias, "Nearest neighbor search with strong location privacy, " Proc. VLDB Endowment, vol. 3, nos. 1-2, pp. 619-629, 2010.
-
(2010)
Proc. VLDB Endowment
, vol.3
, Issue.1-2
, pp. 619-629
-
-
Papadopoulos, S.1
Bakiras, S.2
Papadias, D.3
-
23
-
-
33745877935
-
Anonymous user tracking for location-based community services
-
Dublin, Ireland
-
P. Ruppel, G. Treu, A. Küpper, and C. Linnhoff-Popien, "Anonymous user tracking for location-based community services, " in Proc. 2nd Int. Symp. Location Context-Awareness, Dublin, Ireland, 2006, pp. 116-133.
-
(2006)
Proc. 2nd Int. Symp. Location Context-Awareness
, pp. 116-133
-
-
Ruppel, P.1
Treu, G.2
Küpper, A.3
Linnhoff-Popien, C.4
-
24
-
-
70349513937
-
Privacyaware proximity based services
-
Taipei, Taiwan
-
S. Mascetti, C. Bettini, D. Freni, X. S. Wang, and S. Jajodia, "Privacyaware proximity based services, " in Proc. 10th Int. Conf. Mobile Data Manag. Syst. Service Middleware (MDM), Taipei, Taiwan, 2009, pp. 31-40.
-
(2009)
Proc. 10th Int. Conf. Mobile Data Manag. Syst. Service Middleware (MDM)
, pp. 31-40
-
-
Mascetti, S.1
Bettini, C.2
Freni, D.3
Wang, X.S.4
Jajodia, S.5
-
25
-
-
70350371072
-
A location privacy aware friend locator
-
Aalborg, Denmark
-
L. Šikšnys, J. R. Thomsen, S. Šaltenis, M. L. Yiu, and O. Andersen, "A location privacy aware friend locator, " in Proc. Int. Symp. Spat. Temporal Databases, Aalborg, Denmark, 2009, pp. 405-410.
-
(2009)
Proc. Int. Symp. Spat. Temporal Databases
, pp. 405-410
-
-
Šikšnys, L.1
Thomsen, J.R.2
Šaltenis, S.3
Yiu, M.L.4
Andersen, O.5
-
26
-
-
38149079700
-
Louis, lester and pierre: Three protocols for location privacy
-
Ottawa, ON, Canada
-
G. Zhong, I. Goldberg, and U. Hengartner, "Louis, lester and pierre: Three protocols for location privacy, " in Proc. Int. Workshop Privacy Enhancing Technol., Ottawa, ON, Canada, 2007, pp. 62-76.
-
(2007)
Proc. Int. Workshop Privacy Enhancing Technol.
, pp. 62-76
-
-
Zhong, G.1
Goldberg, I.2
Hengartner, U.3
-
27
-
-
79960453927
-
Privacy in geo-social networks: Proximity notification with untrusted service providers and curious buddies
-
S. Mascetti, D. Freni, C. Bettini, X. S. Wang, and S. Jajodia, "Privacy in geo-social networks: Proximity notification with untrusted service providers and curious buddies, " Int. J. Very Large Data Bases, vol. 20, no. 4, pp. 541-566, 2011.
-
(2011)
Int. J. Very Large Data Bases
, vol.20
, Issue.4
, pp. 541-566
-
-
Mascetti, S.1
Freni, D.2
Bettini, C.3
Wang, X.S.4
Jajodia, S.5
-
28
-
-
85150485002
-
Location privacy via private proximity testing
-
San Diego, CA, USA
-
A. Narayanan, N. Thiagarajan, M. Lakhani, M. Hamburg, and D. Boneh, "Location privacy via private proximity testing, " in Proc. NDSS, San Diego, CA, USA, 2011, pp. 1-17.
-
(2011)
Proc. NDSS
, pp. 1-17
-
-
Narayanan, A.1
Thiagarajan, N.2
Lakhani, M.3
Hamburg, M.4
Boneh, D.5
-
29
-
-
43949118608
-
A survey of homomorphic encryption for nonspecialists
-
C. Fontaine and F. Galand, "A survey of homomorphic encryption for nonspecialists, " EURASIP J. Inf. Security, vol. 2007, no. 1, pp. 1-10, 2007.
-
(2007)
EURASIP J. Inf. Security
, vol.2007
, Issue.1
, pp. 1-10
-
-
Fontaine, C.1
Galand, F.2
-
30
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
Prague, Czech Republic
-
P. Paillier, "Public-key cryptosystems based on composite degree residuosity classes, " in Proc. Int. Conf Theory Appl. Cryptograph. Techn., Prague, Czech Republic, 1999, pp. 223-238.
-
(1999)
Proc. Int. Conf Theory Appl. Cryptograph. Techn.
, pp. 223-238
-
-
Paillier, P.1
-
31
-
-
84881255209
-
Privacy-preserving ridge regression on hundreds of millions of records
-
San Francisco, CA, USA
-
V. Nikolaenko et al., "Privacy-preserving ridge regression on hundreds of millions of records, " in Proc. IEEE Symp. Security Privacy (SP), San Francisco, CA, USA, 2013, pp. 334-348.
-
(2013)
Proc. IEEE Symp. Security Privacy (SP)
, pp. 334-348
-
-
Nikolaenko, V.1
-
32
-
-
24944523186
-
On private scalar product computation for privacy-preserving data mining
-
Seoul, South Korea
-
B. Goethals, S. Laur, H. Lipmaa, and T. Mielikäinen, "On private scalar product computation for privacy-preserving data mining, " in Proc. Int. Conf. Inf. Security Cryptol., Seoul, South Korea, 2004, pp. 104-120.
-
(2004)
Proc. Int. Conf. Inf. Security Cryptol.
, pp. 104-120
-
-
Goethals, B.1
Laur, S.2
Lipmaa, H.3
Mielikäinen, T.4
-
33
-
-
84904412790
-
Achieving privacy preservation in WiFi fingerprint-based localization
-
Toronto, ON, Canada
-
H. Li, L. Sun, H. Zhu, X. Lu, and X. Cheng, "Achieving privacy preservation in WiFi fingerprint-based localization, " in Proc. IEEE INFOCOM, Toronto, ON, Canada, 2014, pp. 2337-2345.
-
(2014)
Proc. IEEE INFOCOM
, pp. 2337-2345
-
-
Li, H.1
Sun, L.2
Zhu, H.3
Lu, X.4
Cheng, X.5
-
34
-
-
84923318201
-
Efficient privacypreserving biometric identification
-
San Diego, CA, USA, Feb.
-
Y. Huang, L. Malka, D. Evans, and J. Katz, "Efficient privacypreserving biometric identification, " in Proc. Netw. Distrib. Syst. Security Symp. (NDSS), San Diego, CA, USA, Feb. 2011, pp. 1-14.
-
(2011)
Proc. Netw. Distrib. Syst. Security Symp. (NDSS)
, pp. 1-14
-
-
Huang, Y.1
Malka, L.2
Evans, D.3
Katz, J.4
|