P3: Privacy-Preserving Scheme Against Poisoning Attacks in Mobile-Edge Computing

P Zhao, H Huang, X Zhao… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Mobile-edge computing (MEC) has emerged to enable users to offload their location data
into the MEC server, and at the same time, the MEC server executes the location-aware data …

Privacy leakage of location sharing in mobile social networks: Attacks and defense

H Li, H Zhu, S Du, X Liang… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Along with the popularity of mobile social networks (MSNs) is the increasing danger of
privacy breaches due to user location exposures. In this work, we take an initial step towards …

Preserving location privacy in mobile edge computing

Y Wang, Z Tian, S Su, Y Sun… - ICC 2019-2019 IEEE …, 2019 - ieeexplore.ieee.org
The burgeoning technology of Mobile Edge Computing (MEC) is attracting the traditional
Location-Based Service (LBS) and Location Service (LS) to deploy due to its nature …

Location privacy challenges in mobile edge computing: Classification and exploration

Z Tian, Y Wang, Y Sun, J Qiu - IEEE Network, 2020 - ieeexplore.ieee.org
LPPMs have been well surveyed based on the view of methodologies, attacks, and so on. It
has long been ignored that LBS applicability will be sacrificed due to the implementation of …

A hybrid privacy protection scheme in cyber-physical social networks

Y Qu, S Yu, L Gao, W Zhou… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
The rapid proliferation of smart mobile devices has significantly enhanced the popularization
of the cyber-physical social network, where users actively publish data with sensitive …

DLP: Achieve customizable location privacy with deceptive dummy techniques in LBS applications

J Tang, H Zhu, R Lu, X Lin, H Li… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
As a straightforward consequence of advances in the Internet of Things (IoT), location-based
service (LBS) applications have been pervasive in our daily lives. Nevertheless, since those …

Location privacy-aware task offloading in mobile edge computing

Z Wang, Y Sun, D Liu, J Hu, X Pang… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
In mobile edge computing (MEC), users can offload tasks to nearby MEC servers to reduce
computation cost. Considering that the size of offloaded tasks could disclose user location …

Location privacy preservation for mobile users in location-based services

G Sun, S Cai, H Yu, S Maharjan, V Chang, X Du… - IEEE …, 2019 - ieeexplore.ieee.org
Because location-based cyber services are increasingly found in mobile applications (eg,
social networking and maps), user location privacy preservation is essential and remains …

Next-location prediction using federated learning on a blockchain

SMD Halim, L Khan… - 2020 IEEE second …, 2020 - ieeexplore.ieee.org
Mobile devices are a rich source of sensitive location data. In this paper, we propose a
method for harnessing this data to provide better location predictions without sacrificing the …

Privacy preservation in location-based services: A novel metric and attack model

S Shaham, M Ding, B Liu, S Dang… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Recent years have seen rising needs for location-based services in our everyday life. Aside
from the many advantages provided by these services, they have caused serious concerns …