Pervasive User Data Collection from Cyberspace: Privacy Concerns and Countermeasures

Y Jiang, MA Rezazadeh Baee, LR Simpson… - Cryptography, 2024 - mdpi.com
The increasing use of technologies, particularly computing and communication paradigms,
has significantly influenced our daily lives. Interconnecting devices and networks provides …

A personalized range‐sensitive privacy‐preserving scheme in LBSs

W Li, B Niu, J Cao, Y Luo, H Li - Concurrency and computation …, 2020 - Wiley Online Library
Mobile social network has become a necessary part in our daily life, and location‐based
services (LBSs) provide unprecedented convenience to mobile users. However, these …

Leading attacks in privacy protection domain

Y Qu, MR Nosouhi, L Cui, S Yu, Y Qu… - … Privacy Protection in Big …, 2021 - Springer
In this chapter, we discuss seven leading attacks in privacy domain built upon the major
privacy concerns in general cases. There are background knowledge attack, collusion …

基于位置服务隐私自关联的隐私保护方案

李维皓, 曹进, 李晖 - 通信学报, 2019 - infocomm-journal.com
随着移动智能终端的普遍运用, 基于位置服务(LBS) 成为了人们生活中必不可少的部分,
在提供便捷生活服务的同时, 也引发了用户隐私信息泄露的隐患. 在考虑背景信息存在的同时 …

Personalized privacy protection solutions

Y Qu, MR Nosouhi, L Cui, S Yu, Y Qu… - … Privacy Protection in Big …, 2021 - Springer
Personalized Privacy Protection Solutions | SpringerLink Skip to main content Advertisement
SpringerLink Account Menu Find a journal Publish with us Track your research Search Cart …

AnotherMe: A Location Privacy Protection System based on Online Virtual Trajectory Generation

Y Li, X Li, X Luo, Z Li, H Li… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Nowadays, location-based services (LBS) are becoming increasingly important and popular.
However, many LBSs are probable to collect the location information of users, which leads …

Preserving Location Privacy in the Modern Era of Pervasive Environments

T Nicewaner, A Yu, W Jiang… - 2023 5th IEEE International …, 2023 - ieeexplore.ieee.org
The rapid expansion of location-based services gives rise to significant security and privacy
apprehensions. While these services deliver convenience, they accentuate concerns …

The dummy‐based trajectory privacy protection method to resist correlation attacks in Internet of Vehicles

Q Chen, A Ye, Z Zhao, J Xiong - Concurrency and Computation …, 2023 - Wiley Online Library
Existing dummy‐based trajectory privacy protection schemes do not take into account the
correlation of multiple locations and whether the generated trajectory based on dummies …

k-trustee: Location injection attack-resilient anonymization for location privacy

L Jin, C Li, B Palanisamy, J Joshi - Computers & Security, 2018 - Elsevier
Cloaking-based location privacy preserving mechanisms have been widely proposed to
protect users' location privacy when using location-based services. A fundamental limitation …

Catching all Pokémon: Virtual reward optimization with tensor voting based trajectory privacy

X Zhang, J Wang, Y Li, R Jäntti… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
The widespread adoption of mobile devices with global positioning system enables location-
based games (LBGs) to use real world maps, while locations and objectives in LBGs can …