Cooperative privacy preservation for wearable devices in hybrid computing-based smart health

H Liu, X Yao, T Yang, H Ning - IEEE Internet of Things Journal, 2018 - ieeexplore.ieee.org
Along with an integration of wearable devices, wireless communications and big data in the
smart health, biomedical data is collected referring to multiple associated patients during …

Locality-Sensitive Hashing Does Not Guarantee Privacy! Attacks on Google's FLoC and the MinHash Hierarchy System

F Turati, C Cotrini, K Kubicek, D Basin - arXiv preprint arXiv:2302.13635, 2023 - arxiv.org
Recently proposed systems aim at achieving privacy using locality-sensitive hashing. We
show how these approaches fail by presenting attacks against two such systems: Google's …

Analyzing sensitive information leakage in trajectory embedding models

J Ding, S Xi, K Wu, P Liu, X Wang, C Zhou - Proceedings of the 30th …, 2022 - dl.acm.org
With the proliferation of the mobile networks and location-based services, huge volume of
user trajectories are collected to analyze the similarity among users and further unveil …

Distributed human trajectory sensing and partial similarity queries

H Wang, J Gao - … 19th ACM/IEEE International Conference on …, 2020 - ieeexplore.ieee.org
Advances in wireless communication technology have allowed for the collection of large-
scale human motion trajectories by recording the appearance of mobile devices within the …

TSNE: Trajectory similarity network embedding

J Ding, B Zhang, X Wang, C Zhou - Proceedings of the 30th International …, 2022 - dl.acm.org
Trajectory representation learning studies the problem of embedding trajectories into low-
dimensional vectors, while preserving mutual similarity for the convenience of downstream …

Distributed mining of popular paths in road networks

P Katsikouli, MS Astefanoaei… - 2018 14th International …, 2018 - ieeexplore.ieee.org
We consider the problem of finding large scale mobility patterns. A common challenge in
mobility tracking systems is that large quantity of data is spread out spatially and temporally …

Cooperative privacy preservation for Internet of vehicles with mobile edge computing

J Luo, H Liu, Q Cheng - Cyberspace Safety and Security: 11th International …, 2019 - Springer
The mobile edge computing is an attractive system paradigm to perform the local data
processing and interactions at the edge of networks. The mobile edge computing enabled …

Learning of Network Dynamics: Mobility, Diffusion and Evolution

H Wang - 2022 - search.proquest.com
Within network science and network theory, there has been a lot of success in the analysis of
complex networks in a static setting or at a certain snapshot. The analysis of network …

User-Centric Privacy Preservation in Mobile and Location-Aware Applications

M Guo - 2018 - digitalcommons.fiu.edu
The mobile and wireless community has brought a significant growth of location-aware
devices including smart phones, connected vehicles and IoT devices. The combination of …

Systems and methods for device visiting frequency estimation

Z Hempstead, N Brahms, E Wong - US Patent 10,997,120, 2021 - Google Patents
Disclosed are systems, methods, and computer-readable media for determining a
distribution of various visiting frequencies among devices/elements detected at a site. A …