J Sim, B Kim, K Jeon, M Joo, J Lim, J Lee… - ACM Computing …, 2023 - dl.acm.org
There has been a trend of moving from simply de-identification to providing extended data control to their owner (eg, data portability and right to be forgotten), partly due to the …
The development of mobile cloud computing technology has made location-based service (LBS) increasingly more popular. Given the continuous requests to cloud LBS servers, the …
Trajectory data has become ubiquitous nowadays, which can benefit various real-world applications such as traffic management and location-based services. However, trajectories …
L Ou, Z Qin, S Liao, Y Hong, X Jia - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
A mutual correlation between trajectories of two users is very helpful to real-life applications such as product recommendation and social media. While providing tremendous benefits …
Y Xin, ZQ Xie, J Yang - Information Sciences, 2017 - Elsevier
The traditional trajectory privacy preserving methods are static releasing methods, only focusing on the trajectories in a specific time span. Therefore, the traditional methods need …
SA Al-Ahmadi - IEEE Access, 2022 - ieeexplore.ieee.org
Wireless Sensor Networks (WSNs) are an essential part of the Internet of Things (IoT). In WSNs, sensors are randomly deployed in harsh environments for monitoring purposes. In …
L Ou, Z Qin, S Liao, H Yin, X Jia - IEEE Access, 2018 - ieeexplore.ieee.org
Temporally correlated trajectories are ubiquitous, and it has been a challenging problem to protect the temporal correlation from being used against users' privacy. In this paper, we …
P Bellavista, M Torello, A Corradi… - Frontiers in Sustainable …, 2021 - frontiersin.org
The recent COVID-19 pandemic in Italy has highlighted several critical issues in the management process of infected people. At the health level, the management of the COVID …
X Ma, J Ma, H Li, Q Jiang, S Gao - Peer-to-Peer Networking and …, 2018 - Springer
With the widespread use of Location-base Services (LBSs), the problem of location privacy has drawn significant attention from the research community. To protect the user's exact …