[PDF][PDF] 差分隐私保护及其应用

熊平, 朱天清, 王晓峰 - 计算机学报, 2014 - cjc.ict.ac.cn
摘要数据发布与数据挖掘中的隐私保护问题是目前信息安全领域的一个研究热点.
作为一种严格的和可证明的隐私定义, 差分隐私近年来受到了极大关注并被广泛研究 …

Trajectory recovery from ash: User privacy is not preserved in aggregated mobility data

F Xu, Z Tu, Y Li, P Zhang, X Fu, D Jin - Proceedings of the 26th …, 2017 - dl.acm.org
Human mobility data has been ubiquitously collected through cellular networks and mobile
applications, and publicly released for academic research and commercial purposes for the …

[图书][B] Differential privacy and applications

T Zhu, G Li, W Zhou, SY Philip - 2017 - Springer
Corporations, organizations, and governments have collected, digitized, and stored
information in digital forms since the invention of computers, and the speed of such data …

Herd: A scalable, traffic analysis resistant anonymity network for VoIP systems

S Le Blond, D Choffnes, W Caldwell… - Proceedings of the …, 2015 - dl.acm.org
Effectively anonymizing Voice-over-IP (VoIP) calls requires a scalable anonymity network
that is resilient to traffic analysis and has sufficiently low delay for high-quality voice calls …

The devil is in the metadata—new privacy challenges in decentralised online social networks

B Greschbach, G Kreitz… - 2012 IEEE international …, 2012 - ieeexplore.ieee.org
Decentralised Online Social Networks (DOSN) are evolving as a promising approach to
mitigate design-inherent privacy flaws of logically centralised services such as Facebook …

A new privacy breach: User trajectory recovery from aggregated mobility data

Z Tu, F Xu, Y Li, P Zhang, D Jin - IEEE/ACM Transactions on …, 2018 - ieeexplore.ieee.org
Human mobility data have been ubiquitously collected through cellular networks and mobile
applications, and publicly released for academic research and commercial purposes for the …

Android mobile VoIP apps: a survey and examination of their security and privacy

A Azfar, KKR Choo, L Liu - Electronic Commerce Research, 2016 - Springer
Abstract Voice over Internet Protocol (VoIP) has become increasingly popular among
individuals and business organisations, with millions of users communicating using VoIP …

Extensive analysis and large-scale empirical evaluation of tor bridge discovery

Z Ling, J Luo, W Yu, M Yang… - 2012 Proceedings IEEE …, 2012 - ieeexplore.ieee.org
Tor is a well-known low-latency anonymous communication system that is able to bypass
Internet censorship. However, publicly announced Tor routers are being blocked by various …

I know where you are: thwarting privacy protection in location-based social discovery services

M Xue, Y Liu, KW Ross, H Qian - 2015 IEEE Conference on …, 2015 - ieeexplore.ieee.org
Location-based Social Discovery (LBSD) services enable users to discover their geographic
neighborhoods to make new friends. Original LBSD services were designed to provide the …

A study of ten popular Android mobile VoIP applications: Are the communications encrypted?

A Azfar, KKR Choo, L Liu - 2014 47th Hawaii International …, 2014 - ieeexplore.ieee.org
Mobile Voice over Internet Protocol (mVoIP) applications have gained increasing popularity
in the last few years, with millions of users communicating using such applications (eg …