Location privacy-preserving mechanisms in location-based services: A comprehensive survey

H Jiang, J Li, P Zhao, F Zeng, Z Xiao… - ACM Computing Surveys …, 2021 - dl.acm.org
Location-based services (LBSs) provide enhanced functionality and convenience of
ubiquitous computing, but they open up new vulnerabilities that can be utilized to violate the …

An unexpectedly large count of trees in the West African Sahara and Sahel

M Brandt, CJ Tucker, A Kariryaa, K Rasmussen, C Abel… - Nature, 2020 - nature.com
A large proportion of dryland trees and shrubs (hereafter referred to collectively as trees)
grow in isolation, without canopy closure. These non-forest trees have a crucial role in …

Differentiated Location Privacy Protection in Mobile Communication Services: A Survey from the Semantic Perception Perspective

G Qiu, G Tang, C Li, L Luo, D Guo, Y Shen - ACM Computing Surveys, 2023 - dl.acm.org
Mobile communication services raise user privacy concerns in sharing the traveling
trajectories while facilitating people's daily lives. According to these shared trajectories …

User preferences for privacy features in digital assistants

F Ebbers, J Zibuschka, C Zimmermann, O Hinz - Electronic Markets, 2021 - Springer
Digital assistants (DA) perform routine tasks for users by interacting with the Internet of
Things (IoT) devices and digital services. To do so, such assistants rely heavily on personal …

Dynamic topic modeling of Twitter data during the COVID-19 pandemic

A Bogdanowicz, CH Guan - Plos one, 2022 - journals.plos.org
In an effort to gauge the global pandemic's impact on social thoughts and behavior, it is
important to answer the following questions:(1) What kinds of topics are individuals and …

[PDF][PDF] Carnus: Exploring the Privacy Threats of Browser Extension Fingerprinting.

S Karami, P Ilia, K Solomos, J Polakis - In Proceedings of the 27th …, 2020 - par.nsf.gov
With users becoming increasingly privacy-aware and browser vendors incorporating anti-
tracking mechanisms, browser fingerprinting has garnered significant attention. Accordingly …

Bullying discourse on Twitter: An examination of bully-related tweets using supervised machine learning

KD Sainju, N Mishra, A Kuffour, L Young - Computers in human behavior, 2021 - Elsevier
Prior research shows that combining social science with big data can advance our
understanding of key social issues like bullying. The current study examines the sharing and …

PrivyTo: A privacy‐preserving location‐sharing platform

G McKenzie, D Romm, H Zhang… - Transactions in …, 2022 - Wiley Online Library
Concern over the privacy of our personal location is at an all‐time high, yet the desire to
share our lives with friends, family, and the public persists. Current methods and …

On (the lack of) location privacy in crowdsourcing applications

S Boukoros, M Humbert, S Katzenbeisser… - 28th USENIX Security …, 2019 - usenix.org
Crowdsourcing enables application developers to benefit from large and diverse datasets at
a low cost. Specifically, mobile crowdsourcing (MCS) leverages users' devices as sensors to …

A security and privacy scoring system for contact tracing apps

L Krehling, A Essex - Journal of Cybersecurity and Privacy, 2021 - mdpi.com
Contact tracing applications have flooded the marketplace, as governments worldwide have
been working to release apps for their citizens. These apps use a variety of protocols to …