Protecting against velocity-based, proximity-based, and external event attacks in location-centric social networks

G Ghinita, ML Damiani, C Silvestri… - ACM Transactions on …, 2016 - dl.acm.org
Mobile devices with positioning capabilities allow users to participate in novel and exciting
location-based applications. For instance, users may track the whereabouts of their …

Preventing velocity-based linkage attacks in location-aware applications

G Ghinita, ML Damiani, C Silvestri… - Proceedings of the 17th …, 2009 - dl.acm.org
Mobile devices with positioning capabilities allow users to participate in novel and exciting
location-based applications. For instance, users may track the whereabouts of their …

Who's your best friend? Targeted privacy attacks in location-sharing social networks

V Kostakos, J Venkatanathan, B Reynolds… - Proceedings of the 13th …, 2011 - dl.acm.org
This paper presents a study that aims to answer two important questions related to targeted
location-sharing privacy attacks:(1) given a group of users and their social graph, is it …

Location privacy with randomness consistency

H Wu, YC Hu - Proceedings on Privacy Enhancing Technologies, 2016 - petsymposium.org
Location-Based Social Network (LBSN) applications that support geo-location-based
posting and queries to provide location-relevant information to mobile users are increasingly …

Venue attacks in location-based social networks

L Jin, H Takabi - Proceedings of the 1st ACM SIGSPATIAL International …, 2014 - dl.acm.org
Location-Based Social Networks (LBSNs), such as Foursquare, Yelp and Facebook Place,
have attracted many people, including business owners who use LBSNs to promote their …

Privacy leakage of location sharing in mobile social networks: Attacks and defense

H Li, H Zhu, S Du, X Liang… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Along with the popularity of mobile social networks (MSNs) is the increasing danger of
privacy breaches due to user location exposures. In this work, we take an initial step towards …

SALS: semantics-aware location sharing based on cloaking zone in mobile social networks

Y Che, K Chiew, X Hong, Q He - Proceedings of the First ACM …, 2012 - dl.acm.org
There is a potential privacy breach when users access various location-based social
applications on a mobile social network (MSN), eg, sharing locations with friends. To …

Privacy-preserving sharing of sensitive semantic locations under road-network constraints

E Yigitoglu, ML Damiani, O Abul… - 2012 IEEE 13th …, 2012 - ieeexplore.ieee.org
This paper presents a privacy-preserving framework for the protection of sensitive positions
in real time trajectories. We assume a scenario in which the sensitivity of user's positions is …

[PDF][PDF] PTPP: Preference-Aware Trajectory Privacy-Preserving over Location-Based Social Networks.

L Zhu, H Xie, Y Liu, J Guan, Y Liu, Y Xiong - J. Inf. Sci. Eng., 2018 - academia.edu
Trajectory privacy-preserving for Location-based Social Networks (LBSNs) has been
received much attention to protect the sensitive location information of subscribers from …

The same-origin attack against location privacy

G Theodorakopoulos - Proceedings of the 14th ACM Workshop on …, 2015 - dl.acm.org
A plethora of applications benefit from location context, but a person's whereabouts can be
linked to her personal sensitive information. Hence, protection mechanisms have been …