Delay‐aware privacy‐preserving location‐based services under spatiotemporal constraints

AR Shahid, N Pissinou, SS Iyengar… - International Journal of …, 2021 - Wiley Online Library
The ubiquitous use of location‐based services (LBS) through smart devices produces
massive amounts of location data. An attacker, with an access to such data, can reveal …

Blockchain-Enabled Private and Secure Task Allocation Framework

AV Orang, A Dorri, S Gaspers… - 2024 16th International …, 2024 - ieeexplore.ieee.org
In the realm of wireless communications and task allocations, where agents need to travel to
perform tasks, a new challenge has emerged. This challenge involves efficiently distributing …

FBI: Friendship learning-based user identification in multiple social networks

Y Qu, S Yu, W Zhou, J Niu - 2018 IEEE Global Communications …, 2018 - ieeexplore.ieee.org
Fast proliferation of mobile devices significantly promotes the development of mobile social
networks. Users tend to interact with friends via multiple social networks. Multiple social …

CPP: A content‐aware privacy protection method for location‐based service

J Liu, X Jiang, S Zhang, B Liu, W Dou - Expert Systems, 2022 - Wiley Online Library
Generally, a location‐based service (LBS) often contains the location attribute, content
attribute, time‐stamp, and range. From the perspective of privacy protection, the location …

Check-ins and photos: Spatiotemporal correlation-based location inference attack and defense in location-based social networks

AR Shahid, N Pissinou, SS Iyengar… - 2018 17th IEEE …, 2018 - ieeexplore.ieee.org
In Location-Based Social Networks (LBSNs) users' interaction is largely carried through
check-ins and photo sharing. The study of location privacy issues with check-ins has yielded …

PPOLQ: Privacy-Preserving Optimal Location Query With Multiple-Condition Filter in Outsourced Environments

L Han, W Luo, Y Yang, A Yang, R Lu… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
The optimal location selection is one type of the location-based services (LBS) that aims to
find the best location for a new facility from some candidate facilities given a set of existing …

Privacy-preserving D2D cooperative location verification

S Liu, Z Yan, R Kantola - 2021 IEEE Global Communications …, 2021 - ieeexplore.ieee.org
Device-to-Device (D2D) cooperative location verification allows a device to verify its location
with the help of neighbouring devices. It is especially handy in location-based services …

An Efficient and Secure Authentication Approach in VANET using Location and Signature-Based Services.

R Muthumeenakshi, C SINGH… - Adhoc & Sensor …, 2022 - search.ebscohost.com
Abstract Nowadays, the intelligent Transportation System (ITS) has improved the safety of
drivers and shared traffic information efficiently. However, privacy and security are the major …

Blockchain–based location proof generation and verification

MR Nosouhi, S Yu, M Grobler, Q Zhu… - IEEE INFOCOM 2019 …, 2019 - ieeexplore.ieee.org
In location–sensitive applications, service providers need to verify the location of users in
order to provide them with access to a service or benefit. This provides dishonest users with …

Personalized Privacy Protection of IoTs Using GAN-Enhanced Differential Privacy

Y Qu, L Gao, S Yu, Y Xiang - … in IoT: Machine Learning Approaches: A …, 2022 - Springer
The cyber-physical social system (CPSS), as an extension of Internet of Things (IoT), maps
human social interaction from cyberspace to the physical world by data sharing and posting …