Location privacy-preserving mechanisms in location-based services: A comprehensive survey

H Jiang, J Li, P Zhao, F Zeng, Z Xiao… - ACM Computing Surveys …, 2021 - dl.acm.org
Location-based services (LBSs) provide enhanced functionality and convenience of
ubiquitous computing, but they open up new vulnerabilities that can be utilized to violate the …

The long road to computational location privacy: A survey

V Primault, A Boutet, SB Mokhtar… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
The widespread adoption of continuously connected smartphones and tablets developed
the usage of mobile applications, among which many use location to provide geolocated …

Privacy in trajectory micro-data publishing: a survey

M Fiore, P Katsikouli, E Zavou, M Cunche… - Transactions on Data …, 2020 - orbit.dtu.dk
We survey the literature on the privacy of trajectory micro-data, ie, spatiotemporal
information about the mobility of individuals, whose collection is becoming increasingly …

Dplink: User identity linkage via deep neural network from heterogeneous mobility data

J Feng, M Zhang, H Wang, Z Yang, C Zhang… - The world wide web …, 2019 - dl.acm.org
Online services are playing critical roles in almost all aspects of users' life. Users usually
have multiple online identities (IDs) in different online services. In order to fuse the …

Drive2friends: Inferring social relationships from individual vehicle mobility data

J Li, F Zeng, Z Xiao, H Jiang, Z Zheng… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
The number of vehicles has increased year by year, especially individual vehicles. In
addition to meeting basic transportation needs, vehicles are expected to serve varied …

A survey and experimental study on privacy-preserving trajectory data publishing

F Jin, W Hua, M Francia, P Chao… - … on Knowledge and …, 2022 - ieeexplore.ieee.org
Trajectory data has become ubiquitous nowadays, which can benefit various real-world
applications such as traffic management and location-based services. However, trajectories …

{LTrack}: Stealthy tracking of mobile phones in {LTE}

M Kotuliak, S Erni, P Leu, M Röschlin… - 31st USENIX Security …, 2022 - usenix.org
We introduce LTrack, a new tracking attack on LTE that allows an attacker to stealthily
extract user devices' locations and permanent identifiers (IMSI). To remain stealthy, the …

Knowledge enhanced gan for iot traffic generation

S Hui, H Wang, Z Wang, X Yang, Z Liu, D Jin… - Proceedings of the ACM …, 2022 - dl.acm.org
Network traffic data facilitates understanding the Internet of Things (IoT) behaviors and
improving IoT service quality in the real world. However, large-scale IoT traffic data is rarely …

" Get in Researchers; We're Measuring Reproducibility": A Reproducibility Study of Machine Learning Papers in Tier 1 Security Conferences

D Olszewski, A Lu, C Stillman, K Warren… - Proceedings of the …, 2023 - dl.acm.org
Reproducibility is crucial to the advancement of science; it strengthens confidence in
seemingly contradictory results and expands the boundaries of known discoveries …

Privacy-preserving cross-domain location recommendation

C Gao, C Huang, Y Yu, H Wang, Y Li… - Proceedings of the ACM on …, 2019 - dl.acm.org
Cross-domain recommendation is a typical solution for data sparsity and cold start issue in
the field of location recommendation. Specifically, data of an auxiliary domain is leveraged …