Differential privacy techniques for cyber physical systems: A survey

MU Hassan, MH Rehmani… - … Communications Surveys & …, 2019 - ieeexplore.ieee.org
Modern cyber physical systems (CPSs) has widely being used in our daily lives because of
development of information and communication technologies (ICT). With the provision of …

Privacy-preserving mechanisms for location privacy in mobile crowdsensing: A survey

JW Kim, K Edemacu, B Jang - Journal of Network and Computer …, 2022 - Elsevier
With the advancement in communication techniques and sensor technologies, mobile
crowdsensing (MCS)—one of the most successful applications of crowdsourcing—has …

Winning the NIST Contest: A scalable and general approach to differentially private synthetic data

R McKenna, G Miklau, D Sheldon - arXiv preprint arXiv:2108.04978, 2021 - arxiv.org
We propose a general approach for differentially private synthetic data generation, that
consists of three steps:(1) select a collection of low-dimensional marginals,(2) measure …

Protecting locations with differential privacy under temporal correlations

Y Xiao, L Xiong - Proceedings of the 22nd ACM SIGSAC conference on …, 2015 - dl.acm.org
Concerns on location privacy frequently arise with the rapid development of GPS enabled
devices and location-based applications. While spatial transformation techniques such as …

A framework for protecting worker location privacy in spatial crowdsourcing

H To, G Ghinita, C Shahabi - Proceedings of the VLDB Endowment, 2014 - dl.acm.org
Spatial Crowdsourcing (SC) is a transformative platform that engages individuals, groups
and communities in the act of collecting, analyzing, and disseminating environmental, social …

The long road to computational location privacy: A survey

V Primault, A Boutet, SB Mokhtar… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
The widespread adoption of continuously connected smartphones and tablets developed
the usage of mobile applications, among which many use location to provide geolocated …

DPT: differentially private trajectory synthesis using hierarchical reference systems

X He, G Cormode, A Machanavajjhala… - Proceedings of the …, 2015 - wrap.warwick.ac.uk
GPS-enabled devices are now ubiquitous, from airplanes and cars to smartphones and
wearable technology. This has resulted in a wealth of data about the movements of …

Graphical-model based estimation and inference for differential privacy

R McKenna, D Sheldon… - … Conference on Machine …, 2019 - proceedings.mlr.press
Many privacy mechanisms reveal high-level information about a data distribution through
noisy measurements. It is common to use this information to estimate the answers to new …

Privtree: A differentially private algorithm for hierarchical decompositions

J Zhang, X Xiao, X Xie - … of the 2016 international conference on …, 2016 - dl.acm.org
Given a set D of tuples defined on a domain Omega, we study differentially private
algorithms for constructing a histogram over Omega to approximate the tuple distribution in …

A survey of differential privacy-based techniques and their applicability to location-based services

JW Kim, K Edemacu, JS Kim, YD Chung, B Jang - Computers & Security, 2021 - Elsevier
The widespread use of mobile devices such as smartphones, tablets, and smartwatches has
led users to constantly generate various location data during their daily activities …