DP-LTOD: Differential privacy latent trajectory community discovering services over location-based social networks

C Xu, L Zhu, Y Liu, J Guan, S Yu - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Community detection for Location-based Social Networks (LBSNs) has been received great
attention mainly in the field of large-scale Wireless Communication Networks. In this paper …

A fast physical layer security-based location privacy parameter recommendation algorithm in 5G IoT

H Zhao, M Xu, Z Zhong, D Wang - China Communications, 2021 - ieeexplore.ieee.org
The 5G IoT (Internet of Things, IoT) is easier to implement in location privacy-preserving
research. The terminals in distributed network architecture blur their accurate locations into a …

Sensitive semantics-aware personality cloaking on road-network environment

M Li, Z Qin, C Wang - International Journal of Security and Its …, 2014 - earticle.net
Recently, several cloaking methods based on K-anonymity and L-diversity has been
proposed to protect the user's location privacy for Location-based Services (LBS) …

Reversecloak: Protecting multi-level location privacy over road networks

C Li, B Palanisamy - Proceedings of the 24th ACM international on …, 2015 - dl.acm.org
With advances in sensing and positioning technology, fueled by the ubiquitous deployment
of wireless networks, location-aware computing has become a fundamental model for …

A novel location privacy preserving scheme for spatial crowdsourcing

B Zhu, S Zhu, X Liu, Y Zhong… - 2016 6th International …, 2016 - ieeexplore.ieee.org
In order to avoid disclosing the location privacy of the workers to the requester and the
server in spatial crowdsourcing, we propose a novel location privacy preserving scheme. In …

Location data and COVID-19 contact tracing: how data privacy regulations and cell service providers work in tandem

C Monroe, F Tazi, S Das - arXiv preprint arXiv:2103.14155, 2021 - arxiv.org
Governments, Healthcare, and Private Organizations in the global scale have been using
digital tracking to keep COVID-19 outbreaks under control. Although this method could limit …

基于用户分布感知的移动P2P 快速位置匿名算法

许明艳, 赵华, 季新生, 申涓 - 软件学报, 2017 - jos.org.cn
针对移动点对点(P2P) 结构下位置隐私保护匿名区形成存在着通信开销大,
匿名效率低以及成功率低等问题, 提出了一种移动P2P 结构下用户分布感知方案 …

[PDF][PDF] 基于信息论方法的多等级位置隐私度量与保护

张文静, 刘樵, 朱辉 - Journal on Communication/Tongxin …, 2019 - infocomm-journal.com
针对位置数据拥有者对数据使用者具有不同的信任程度时, 会对使用者进行不同等级的划分并向
其发布不同扰动程度的位置数据这一场景中的隐私泄露问题, 提出了基于信息论中的互信息的 …

A novel personalized TTP-free location privacy preserving method

N Yang, Y Cao, Q Liu, J Zheng - International Journal of Security and Its …, 2014 - earticle.net
This paper proposes a novel TTP (Trusted Third Party)-free location privacy preserving
method. A cloaking region is used to hide the precise position of the location based service …

Practical mk‐Anonymization for Collaborative Data Publishing without Trusted Third Party

J Hua, A Tang, Q Pan, KKR Choo… - Security and …, 2017 - Wiley Online Library
In collaborative data publishing (CDP), an m‐adversary attack refers to a scenario where up
to m malicious data providers collude to infer data records contributed by other providers …