A survey of differential privacy-based techniques and their applicability to location-based services

JW Kim, K Edemacu, JS Kim, YD Chung, B Jang - Computers & Security, 2021 - Elsevier
The widespread use of mobile devices such as smartphones, tablets, and smartwatches has
led users to constantly generate various location data during their daily activities …

Context-aware local information privacy

B Jiang, M Seif, R Tandon, M Li - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
In this paper, we study Local Information Privacy (LIP). As a context-aware privacy notion,
LIP relaxes the de facto standard privacy notion of local differential privacy (LDP) by …

Hideme: Privacy-preserving photo sharing on social networks

F Li, Z Sun, A Li, B Niu, H Li… - IEEE INFOCOM 2019-IEEE …, 2019 - ieeexplore.ieee.org
Photo sharing on Online Social Networks (OSNs) has become one of the most popular
social activities in our daily life. However, some associated friends or bystanders in the …

Please forget where I was last summer: The privacy risks of public location (meta) data

K Drakonakis, P Ilia, S Ioannidis, J Polakis - arXiv preprint arXiv …, 2019 - arxiv.org
The exposure of location data constitutes a significant privacy risk to users as it can lead to
de-anonymization, the inference of sensitive information, and even physical threats. In this …

Motion based inference of social circles via self-attention and contextualized embedding

T Zhong, F Liu, F Zhou, G Trajcevski, K Zhang - IEEE Access, 2019 - ieeexplore.ieee.org
Extracting knowledge from human mobility data is an important task for many downstream
applications such as point-of-interest recommendation, motion trace identification, and …

From mobility analysis to mobility hubs discovery: A concept based on using cdr data of the mobile networks

A Hadachi, A Lind, J Lomps… - 2018 10th International …, 2018 - ieeexplore.ieee.org
Understanding human mobility in dynamic environments, such as our cities, is a crucial step
toward the development of our economy, our environment, our transportation, as well as our …

Geometric secluded paths and planar satisfiability

K Buchin, V Polishchuk, L Sedov, R Voronov - arXiv preprint arXiv …, 2019 - arxiv.org
We consider paths with low\emph {exposure} to a 2D polygonal domain, ie, paths which are
seen as little as possible; we differentiate between\emph {integral} exposure (when we care …

Improving Privacy-utility Tradeoffs in Privacy-preserving Data Release with Context Information

B Jiang - 2023 - search.proquest.com
As data collection, storage, and usage become more pervasive, there's a growing need to
incorporate privacy into the data consumption pipeline. Furthermore, as data acquisition …

Security and Privacy in Information Systems: Algorithms and Fundamental Limits

MS Mohamed - 2022 - search.proquest.com
Personalized data collection is becoming pervasive, and data is the key enabler that drives
applications spanning all sectors of our society, including e-commerce, social networking …