-
1
-
-
84983292160
-
Rescuedp: Real-time spatio-temporal crowd-sourced data publishing with differential privacy
-
Q. Wang, Y. Zhang, X. Lu, Z. Wang, Z. Qin, and K. Ren, "Rescuedp: Real-time spatio-temporal crowd-sourced data publishing with differential privacy," in Proc. 35th Annu. IEEE Int. Conf. Comput. Commun., 2016, pp. 1-9.
-
(2016)
Proc. 35th Annu. IEEE Int. Conf. Comput. Commun.
, pp. 1-9
-
-
Wang, Q.1
Zhang, Y.2
Lu, X.3
Wang, Z.4
Qin, Z.5
Ren, K.6
-
2
-
-
84943646932
-
All your location are belong to us: Breaking mobile social networks for automated user location tracking
-
M. Li, et al., "All your location are belong to us: Breaking mobile social networks for automated user location tracking," in Proc. 15th ACM Int. Symp. Mobile ad hoc Netw. Comput., 2014, pp. 43-52.
-
(2014)
Proc. 15th ACM Int. Symp. Mobile Ad Hoc Netw. Comput.
, pp. 43-52
-
-
Li, M.1
-
3
-
-
84900653663
-
A probabilistic misbehavior detection scheme toward efficient trust establishment in delay-tolerant networks
-
Jan.
-
H. Zhu, S. Du, Z. Gao, M. Dong, and Z. Cao, "A probabilistic misbehavior detection scheme toward efficient trust establishment in delay-tolerant networks," IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 1, pp. 22-32, Jan. 2014.
-
(2014)
IEEE Trans. Parallel Distrib. Syst.
, vol.25
, Issue.1
, pp. 22-32
-
-
Zhu, H.1
Du, S.2
Gao, Z.3
Dong, M.4
Cao, Z.5
-
4
-
-
84962448916
-
A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data
-
Feb.
-
Z. Xia, X. Wang, X. Sun, and Q. Wang, "A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data," IEEE Trans. Parallel Distrib. Syst., vol. 27, no. 2, pp. 340-352, Feb. 2015.
-
(2015)
IEEE Trans. Parallel Distrib. Syst.
, vol.27
, Issue.2
, pp. 340-352
-
-
Xia, Z.1
Wang, X.2
Sun, X.3
Wang, Q.4
-
5
-
-
84976428104
-
Securing sift: Privacy-preserving outsourcing computation of feature extractions over encrypted image data
-
Jul.
-
S. Hu, Q. Wang, J. Wang, Z. Qin, and K. Ren, "Securing sift: Privacy-preserving outsourcing computation of feature extractions over encrypted image data," IEEE Trans. Image Process., vol. 25, no. 7, pp. 3411-3425, Jul. 2016.
-
(2016)
IEEE Trans. Image Process.
, vol.25
, Issue.7
, pp. 3411-3425
-
-
Hu, S.1
Wang, Q.2
Wang, J.3
Qin, Z.4
Ren, K.5
-
6
-
-
84963541120
-
Minimizing inter-server communications by exploiting self-similarity in online social networks
-
Apr.
-
H. Chen, H. Jin, and S. Wu, "Minimizing inter-server communications by exploiting self-similarity in online social networks," IEEE Trans. Parallel Distrib. Syst., vol. 27, no. 4, pp. 1116-1130, Apr. 2016.
-
(2016)
IEEE Trans. Parallel Distrib. Syst.
, vol.27
, Issue.4
, pp. 1116-1130
-
-
Chen, H.1
Jin, H.2
Wu, S.3
-
7
-
-
85017356478
-
Harnessing encrypted data in cloud for secure and efficient mobile image sharing
-
pp. 1-1, Jul.
-
H. Cui, X. Yuan, and C. Wang, "Harnessing encrypted data in cloud for secure and efficient mobile image sharing," IEEE Trans. Mobile Comput., vol. PP, no. 99, pp. 1-1, doi: 10.1109/TMC.2016.2595573, Jul. 2016.
-
(2016)
IEEE Trans. Mobile Comput.
, vol.PP
, Issue.99
-
-
Cui, H.1
Yuan, X.2
Wang, C.3
-
8
-
-
85038858282
-
Searchable encryption over feature-rich data
-
pp. 1-1, Jul.
-
Q. Wang, M. He, M. Du, S. S. M. Chow, R. W. F. Lai, and Q. Zou, "Searchable encryption over feature-rich data," IEEE Trans. Dependable Secure Comput., vol. PP, no. 99, pp. 1-1, doi: 10.1109/TDSC.2016.2593444, Jul. 2016.
-
(2016)
IEEE Trans. Dependable Secure Comput.
, vol.PP
, Issue.99
-
-
Wang, Q.1
He, M.2
Du, M.3
Chow, S.S.M.4
Lai, R.W.F.5
Zou, Q.6
-
9
-
-
84875822474
-
Unique in the crowd: The privacy bounds of human mobility
-
Y.-A. de Montjoye, C. A. Hidalgo, M. Verleysen, and V. D. Blondel, "Unique in the crowd: The privacy bounds of human mobility," Scientific Reports, vol. 3, 2013, Art. no. 1376.
-
(2013)
Scientific Reports
, vol.3
-
-
De Montjoye, Y.-A.1
Hidalgo, C.A.2
Verleysen, M.3
Blondel, V.D.4
-
10
-
-
80053584816
-
Anonymization of location data does not work: A large-scale measurement study
-
H. Zang and J. Bolot, "Anonymization of location data does not work: A large-scale measurement study," in Proc. 17th Annu. Int. Conf. Mobile Comput. Netw., 2011, pp. 145-156.
-
(2011)
Proc. 17th Annu. Int. Conf. Mobile Comput. Netw.
, pp. 145-156
-
-
Zang, H.1
Bolot, J.2
-
11
-
-
78650879093
-
Show me how you move and I will tell you who you are
-
S. Gambs, M.-O. Killijian, and M. N. del Prado Cortez, "Show me how you move and I will tell you who you are," in Proc. 3rd ACM SIGSPATIAL Int. Workshop Secur. Privacy GIS LBS, 2010, pp. 34-41.
-
(2010)
Proc. 3rd ACM SIGSPATIAL Int. Workshop Secur. Privacy GIS LBS
, pp. 34-41
-
-
Gambs, S.1
Killijian, M.-O.2
Del-Prado-Cortez, M.N.3
-
13
-
-
33745556605
-
Calibrating noise to sensitivity in private data analysis
-
C. Dwork, F. McSherry, K. Nissim, and A. Smith, "Calibrating noise to sensitivity in private data analysis," in Proc. 3rd Conf. Theory Cryptography, 2006, pp. 265-284.
-
(2006)
Proc. 3rd Conf. Theory Cryptography
, pp. 265-284
-
-
Dwork, C.1
McSherry, F.2
Nissim, K.3
Smith, A.4
-
14
-
-
79959998772
-
IReduct: Differential privacy with reduced relative errors
-
X. Xiao, G. Bender, M. Hay, and J. Gehrke, "iReduct: Differential privacy with reduced relative errors," in Proc. ACM SIGMOD Int. Conf. Manage. Data, 2011, pp. 229-240.
-
(2011)
Proc. ACM SIGMOD Int. Conf. Manage. Data
, pp. 229-240
-
-
Xiao, X.1
Bender, G.2
Hay, M.3
Gehrke, J.4
-
15
-
-
84888050192
-
Differentially private histogram publication
-
J. Xu, Z. Zhang, X. Xiao, Y. Yang, G. Yu, and M. Winslett, "Differentially private histogram publication," Int. J. Very Large Data Bases, vol. 22, no. 6, pp. 797-822, 2013.
-
(2013)
Int. J. Very Large Data Bases
, vol.22
, Issue.6
, pp. 797-822
-
-
Xu, J.1
Zhang, Z.2
Xiao, X.3
Yang, Y.4
Yu, G.5
Winslett, M.6
-
16
-
-
78650518102
-
Boosting the accuracy of differentially private histograms through consistency
-
M. Hay, V. Rastogi, G. Miklau, and D. Suciu, "Boosting the accuracy of differentially private histograms through consistency," Proc. Very Large Data Bases Endowment, vol. 3, no. 1/2, pp. 1021-1032, 2010.
-
(2010)
Proc. Very Large Data Bases Endowment
, vol.3
, Issue.1-2
, pp. 1021-1032
-
-
Hay, M.1
Rastogi, V.2
Miklau, G.3
Suciu, D.4
-
17
-
-
84905096128
-
Differentially private event sequences over infinite streams
-
G. Kellaris, S. Papadopoulos, X. Xiao, and D. Papadias, "Differentially private event sequences over infinite streams," Proc. Very Large Data Bases Endowment, vol. 7, no. 12, pp. 1155-1166, 2014.
-
(2014)
Proc. Very Large Data Bases Endowment
, vol.7
, Issue.12
, pp. 1155-1166
-
-
Kellaris, G.1
Papadopoulos, S.2
Xiao, X.3
Papadias, D.4
-
18
-
-
84926322942
-
An adaptive approach to real-time aggregate monitoring with differential privacy
-
Sep.
-
L. Fan and L. Xiong, "An adaptive approach to real-time aggregate monitoring with differential privacy," IEEE Trans. Knowl. Data Eng., vol. 26, no. 9, pp. 2094-2106, Sep. 2014.
-
(2014)
IEEE Trans. Knowl. Data Eng.
, vol.26
, Issue.9
, pp. 2094-2106
-
-
Fan, L.1
Xiong, L.2
-
19
-
-
84855245645
-
Private and continual release of statistics
-
T.-H. H. Chan, E. Shi, and D. Song, "Private and continual release of statistics," ACMTrans. Inf. Syst. Secur., vol. 14, no. 3, 2011, Art. no. 26.
-
(2011)
ACMTrans. Inf. Syst. Secur.
, vol.14
, Issue.3
-
-
Chan, T.-H.H.1
Shi, E.2
Song, D.3
-
20
-
-
84864265207
-
Differentially private continual monitoring of heavy hitters from distributed streams
-
T.-H. H. Chan, M. Li, E. Shi, and W. Xu, "Differentially private continual monitoring of heavy hitters from distributed streams," in Proc. 12th Int. Conf. Privacy Enhancing Technol., 2012, pp. 140-159.
-
(2012)
Proc. 12th Int. Conf. Privacy Enhancing Technol.
, pp. 140-159
-
-
Chan, T.-H.H.1
Li, M.2
Shi, E.3
Xu, W.4
-
21
-
-
77954717626
-
Differential privacy under continual observation
-
C. Dwork, M. Naor, T. Pitassi, and G. N. Rothblum, "Differential privacy under continual observation," in Proc. 40-Second ACM Symp. Theory Comput., 2010, pp. 715-724.
-
(2010)
Proc. 40-Second ACM Symp. Theory Comput.
, pp. 715-724
-
-
Dwork, C.1
Naor, M.2
Pitassi, T.3
Rothblum, G.N.4
-
22
-
-
84881136541
-
Differentially private multidimensional time series release for traffic monitoring
-
L. Fan, L. Xiong, and V. Sunderam, "Differentially private multidimensional time series release for traffic monitoring," in Proc. 27th Annu. IFIPWG 11.3 Conf. Data Appl. Secur. Privacy, 2013, pp. 33-48.
-
(2013)
Proc. 27th Annu. IFIPWG 11.3 Conf. Data Appl. Secur. Privacy
, pp. 33-48
-
-
Fan, L.1
Xiong, L.2
Sunderam, V.3
-
24
-
-
34250017239
-
A face is exposed for AOL searcher no. 4417749
-
M. Barbaro, T. Zeller, and S. Hansell, "A face is exposed for AOL searcher no. 4417749," New York Times, vol. 9, no. 2008, 2006, Art. no. 8.
-
(2006)
New York Times
, vol.9
, Issue.2008
-
-
Barbaro, M.1
Zeller, T.2
Hansell, S.3
-
26
-
-
84866628169
-
Trajectory privacy in locationbased services and data publication
-
C.-Y. Chow and M. F. Mokbel, "Trajectory privacy in locationbased services and data publication," ACM SIGKDD Explorations Newslett., vol. 13, no. 1, pp. 19-29, 2011.
-
(2011)
ACM SIGKDD Explorations Newslett.
, vol.13
, Issue.1
, pp. 19-29
-
-
Chow, C.-Y.1
Mokbel, M.F.2
-
27
-
-
57349112634
-
User 4xxxxx9: Anonymizing query logs
-
E. Adar, "User 4xxxxx9: Anonymizing query logs," in Proc. Query Log Anal. Workshop, 2007, pp. 1-8.
-
(2007)
Proc. Query Log Anal. Workshop
, pp. 1-8
-
-
Adar, E.1
-
28
-
-
74549172518
-
Effective anonymization of query logs
-
Y. Hong, X. He, J. Vaidya, N. Adam, and V. Atluri, "Effective anonymization of query logs," in Proc. 18th ACM Conf. Inf. Knowl. Manage., 2009, pp. 1465-1468.
-
(2009)
Proc. 18th ACM Conf. Inf. Knowl. Manage.
, pp. 1465-1468
-
-
Hong, Y.1
He, X.2
Vaidya, J.3
Adam, N.4
Atluri, V.5
-
29
-
-
84863012396
-
Publishing search logs-A comparative study of privacy guarantees
-
Mar.
-
M. Götz, A. Machanavajjhala, G. Wang, X. Xiao, and J. Gehrke, "Publishing search logs-a comparative study of privacy guarantees," IEEE Trans. Knowl. Data Eng., vol. 24, no. 3, pp. 520-532, Mar. 2012.
-
(2012)
IEEE Trans. Knowl. Data Eng.
, vol.24
, Issue.3
, pp. 520-532
-
-
Götz, M.1
Machanavajjhala, A.2
Wang, G.3
Xiao, X.4
Gehrke, J.5
-
30
-
-
84888050192
-
Differentially private histogram publication
-
J. Xu, Z. Zhang, X. Xiao, Y. Yang, G. Yu, and M. Winslett, "Differentially private histogram publication," Very Large Data Bases J., vol. 22, no. 6, pp. 797-822, 2013.
-
(2013)
Very Large Data Bases J.
, vol.22
, Issue.6
, pp. 797-822
-
-
Xu, J.1
Zhang, Z.2
Xiao, X.3
Yang, Y.4
Yu, G.5
Winslett, M.6
-
31
-
-
84979279259
-
Differentially private publication of sparse data
-
G. Cormode, M. Procopiuc, D. Srivastava, and T. T. Tran, "Differentially private publication of sparse data," in Proc. International Conference on Database Theory, 2012, pp. 1-12.
-
(2012)
Proc. International Conference on Database Theory
, pp. 1-12
-
-
Cormode, G.1
Procopiuc, M.2
Srivastava, D.3
Tran, T.T.4
-
32
-
-
84865663496
-
Releasing search queries and clicks privately
-
A. Korolova, K. Kenthapadi, N. Mishra, and A. Ntoulas, "Releasing search queries and clicks privately," in Proc. 18th Int. Conf. World Wide Web, 2009, pp. 171-180.
-
(2009)
Proc. 18th Int. Conf. World Wide Web
, pp. 171-180
-
-
Korolova, A.1
Kenthapadi, K.2
Mishra, N.3
Ntoulas, A.4
-
33
-
-
77954711910
-
Differentially private aggregation of distributed time-series with transformation and encryption
-
V. Rastogi and S. Nath, "Differentially private aggregation of distributed time-series with transformation and encryption," in Proc. ACM SIGMOD Int. Conf. Manage. Data, 2010, pp. 735-746.
-
(2010)
Proc. ACM SIGMOD Int. Conf. Manage. Data
, pp. 735-746
-
-
Rastogi, V.1
Nath, S.2
-
34
-
-
70849116921
-
Privacy integrated queries: An extensible platform for privacy-preserving data analysis
-
F. D. McSherry, "Privacy integrated queries: An extensible platform for privacy-preserving data analysis," in Proc. ACM SIGMOD Int. Conf. Manage. Data, 2009, pp. 19-30.
-
(2009)
Proc. ACM SIGMOD Int. Conf. Manage. Data
, pp. 19-30
-
-
McSherry, F.D.1
-
37
-
-
85024429815
-
A new approach to linear filtering and prediction problem
-
R. Kalman, "A new approach to linear filtering and prediction problem," J. Basic Eng., vol. 82, pp. 35-45, 1960.
-
(1960)
J. Basic Eng.
, vol.82
, pp. 35-45
-
-
Kalman, R.1
-
38
-
-
0001419757
-
Distributed representations, simple recurrent networks, and grammatical structure
-
J. L. Elman, "Distributed representations, simple recurrent networks, and grammatical structure," Mach. Learn., vol. 7, no. 2/3, pp. 195-225, 1991.
-
(1991)
Mach. Learn.
, vol.7
, Issue.2-3
, pp. 195-225
-
-
Elman, J.L.1
-
39
-
-
0000442791
-
Generalization of back-propagation to recurrent neural networks
-
F. J. Pineda, "Generalization of back-propagation to recurrent neural networks," Physical Rev. Lett., vol. 59, no. 19, 1987, Art. no. 2229.
-
(1987)
Physical Rev. Lett.
, vol.59
, Issue.19
-
-
Pineda, F.J.1
-
40
-
-
85049737329
-
-
ECML/PKDD 15: [Online]
-
ECML/PKDD 15: Taxi Trajectory Prediction (I), [Online]. Available: https://www.kaggle.com/c/pkdd-15-predict-taxiservice-trajectory-i
-
Taxi Trajectory Prediction (I)
-
-
-
41
-
-
85049731639
-
-
[Online]
-
World Cup dataset, [Online]. Available: http://ita.ee.lbl.gov/html/contrib/WorldCup.html
-
World Cup Dataset
-
-
-
42
-
-
0036606530
-
A framework for generating network-based moving objects
-
T. Brinkhoff, "A framework for generating network-based moving objects," GeoInformatica, vol. 6, no. 2, pp. 153-180, 2002.
-
(2002)
GeoInformatica
, vol.6
, Issue.2
, pp. 153-180
-
-
Brinkhoff, T.1
|