EPLA: efficient personal location anonymity

D Zhao, Y Jin, K Zhang, X Wang, PCK Hung, W Ji - GeoInformatica, 2018 - Springer
A lot of researchers utilize side-information, such as the map which is likely to be exploited
by some attackers, to protect users' location privacy in location-based service (LBS) …

Personalized location anonymity-a kernel density estimation approach

D Zhao, J Ma, X Wang, X Tian - … , WAIM 2016, Nanchang, China, June 3-5 …, 2016 - Springer
In recent years, the problem of location privacy protection in location-based service (LBS)
has drawn a great deal of researchers' attention. However, the existing technologies of …

[PDF][PDF] Privacy-area aware all-dummy-based location privacy algorithms for location-based services

H Zhao, X Yi, J Wan - DEStech Transactions on Computer …, 2016 - scholar.archive.org
Location-Based Services (LBSs) have become one of the most popular activities in our daily
life. With the rapid advance of LBSs, there are more threats to users' privacy. For this reason …

A novel location privacy framework without trusted third party based on location anonymity prediction

SI Ahamed, MM Haque, CS Hasan - ACM SIGAPP Applied Computing …, 2012 - dl.acm.org
Location-based services are becoming increasingly popular with the proliferation of location
aware devices. It is not possible to access location-based services and preserve privacy at …

A personalized k-anonymity with fake position generation for location privacy protection

Z Luo, X Huang - Frontiers in Internet Technologies: Third CCF Internet …, 2015 - Springer
Privacy protection has become one of the important issues for location-based services (LBS)
nowadays. In order to meet the requirements of humanization, security and quick response …

Efficient Location Privacy-Preserving k-Anonymity Method Based on the Credible Chain

H Wang, H Huang, Y Qin, Y Wang, M Wu - ISPRS International Journal of …, 2017 - mdpi.com
Currently, although prevalent location privacy methods based on k-anonymizing spatial
regions (K-ASRs) can achieve privacy protection by sacrificing the quality of service (QoS) …

An efficient location privacy protection scheme based on the Chinese remainder theorem

J Wang, Y Han, X Yang - Tsinghua Science and Technology, 2016 - ieeexplore.ieee.org
Traditional k-anonymity schemes cannot protect a user's privacy perfectly in big data and
mobile network environments. In fact, existing k-anonymity schemes only protect location in …

Location privacy preservation based on continuous queries for location-based services

L Zhang, Y Qian, M Ding, C Ma, J Li… - IEEE INFOCOM 2019 …, 2019 - ieeexplore.ieee.org
In recent years, location-based services (LBSs) have become increasingly popular, as they
can greatly facilitate people's daily life. However, LBSs also raise serious concerns that the …

A trajectory privacy-preserving scheme based on a dual-K mechanism for continuous location-based services

S Zhang, X Mao, KKR Choo, T Peng, G Wang - Information Sciences, 2020 - Elsevier
Location-based services (LBSs) have increasingly provided by a broad range of devices
and applications, but one associated risk is location disclosure. To solve this problem, a …

Location Privacy‐Preserving Method Based on Historical Proximity Location

X Guo, W Wang, H Huang, Q Li… - … and mobile computing, 2020 - Wiley Online Library
With the rapid development of Internet services, mobile communications, and IoT
applications, Location‐Based Service (LBS) has become an indispensable part in our daily …