4.7 Article

Location Privacy-preserving Mechanisms in Location-based Services: A Comprehensive Survey

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

Drive2friends: Inferring Social Relationships From Individual Vehicle Mobility Data

Jie Li et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Article Computer Science, Hardware & Architecture

Privacy-Preserving Aggregate Queries for Optimal Location Selection

Emre Yilmaz et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2019)

Article Computer Science, Information Systems

SSPA-LBS: Scalable and Social-Friendly Privacy-Aware Location-Based Services

Changsha Ma et al.

IEEE TRANSACTIONS ON MULTIMEDIA (2019)

Article Computer Science, Hardware & Architecture

Synthesizing Privacy Preserving Traces: Enhancing Plausibility With Social Networks

Ping Zhao et al.

IEEE-ACM TRANSACTIONS ON NETWORKING (2019)

Article Computer Science, Information Systems

The Long Road to Computational Location Privacy: A Survey

Vincent Primault et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2019)

Article Computer Science, Information Systems

Location Privacy Preservation for Mobile Users in Location-Based Services

Gang Sun et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

Blind Filtering at Third Parties: An Efficient Privacy-Preserving Framework for Location-Based Services

Jing Chen et al.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2018)

Article Engineering, Electrical & Electronic

ShiftRoute: Achieving Location Privacy for Map Services on Smartphones

Peng Zhang et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2018)

Article Computer Science, Hardware & Architecture

RobLoP: Towards Robust Privacy Preserving Against Location Dependent Attacks in Continuous LBS Queries

Hongbo Jiang et al.

IEEE-ACM TRANSACTIONS ON NETWORKING (2018)

Review Computer Science, Hardware & Architecture

Security for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes

Mohamed Amine Ferrag et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2018)

Article Computer Science, Hardware & Architecture

On location-privacy in opportunistic mobile networks, a survey

Sameh Zakhary et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2018)

Article Computer Science, Information Systems

Location Privacy and Its Applications: A Systematic Study

Bo Liu et al.

IEEE ACCESS (2018)

Article Computer Science, Information Systems

A Dual Privacy Preserving Scheme in Continuous Location-Based Services

Shaobo Zhang et al.

IEEE INTERNET OF THINGS JOURNAL (2018)

Article Engineering, Electrical & Electronic

Spatial-Wideband Effect in Massive MIMO with Application in mmWave Systems

Bolei Wang et al.

IEEE COMMUNICATIONS MAGAZINE (2018)

Article Computer Science, Hardware & Architecture

PROACTIVE CACHE-BASED LOCATION PRIVACY PRESERVING FOR VEHICLE NETWORKS

Long Hu et al.

IEEE WIRELESS COMMUNICATIONS (2018)

Article Computer Science, Information Systems

DPMM: dynamic pseudonym-based multiple mix-zones generation for mobile traveler

Imran Memon et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2017)

Article Computer Science, Information Systems

Smart Meter Data Privacy: A Survey

Muhammad Rizwan Asghar et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2017)

Article Computer Science, Information Systems

Graph Data Anonymization, De-Anonymization Attacks, and De-Anonymizability Quantification: A Survey

Shouling Ji et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2017)

Article Computer Science, Information Systems

Location Privacy in Cognitive Radio Networks: A Survey

Mohamed Grissa et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2017)

Article Engineering, Electrical & Electronic

Location Privacy in Mobile Edge Clouds: A Chaff-Based Approach

Ting He et al.

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2017)

Article Computer Science, Information Systems

Quantifying Interdependent Privacy Risks with Location Data

Alexandra-Mihaela Olteanu et al.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2017)

Article Computer Science, Hardware & Architecture

From Social Group Utility Maximization to Personalized Location Privacy in Mobile Networks

Xiaowen Gong et al.

IEEE-ACM TRANSACTIONS ON NETWORKING (2017)

Article Computer Science, Information Systems

Privacy-Preserving Data Mining: Methods, Metrics, and Applications

Ricardo Mendes et al.

IEEE ACCESS (2017)

Proceedings Paper Computer Science, Information Systems

Back to the Drawing Board: Revisiting the Design of Optimal Location Privacy-preserving Mechanisms

Simon Oya et al.

CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2017)

Proceedings Paper Computer Science, Hardware & Architecture

Privacy-Preserving Location-Proximity for Mobile Apps

Simonas Stirbys et al.

2017 25TH EUROMICRO INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND NETWORK-BASED PROCESSING (PDP 2017) (2017)

Article Engineering, Electrical & Electronic

Silence is Golden: Enhancing Privacy of Location-Based Services by Content Broadcasting and Active Caching in Wireless Vehicular Networks

Bo Liu et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2016)

Article Computer Science, Information Systems

Dummy-Based User Location Anonymization Under Real-World Constraints

Takahiro Hara et al.

IEEE ACCESS (2016)

Proceedings Paper Computer Science, Theory & Methods

Synthesizing Plausible Privacy-Preserving Location Traces

Vincent Bindschaedler et al.

2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP) (2016)

Article Computer Science, Information Systems

User-Defined Privacy Grid System for Continuous Location-Based Services

Roman Schlegel et al.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2015)

Article Computer Science, Information Systems

Attack-Resilient Mix-zones over Road Networks: Architecture and Algorithms

Balaji Palanisamy et al.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2015)

Article Computer Science, Information Systems

OPT: Differentially Private Trajectory Synthesis Using Hierarchical Reference Systems

Xi He et al.

PROCEEDINGS OF THE VLDB ENDOWMENT (2015)

Article Computer Science, Theory & Methods

TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones

William Enck et al.

ACM TRANSACTIONS ON COMPUTER SYSTEMS (2014)

Article Computer Science, Information Systems

Anonymizing continuous queries with delay-tolerant mix-zones over road networks

Balaji Palanisamy et al.

DISTRIBUTED AND PARALLEL DATABASES (2014)

Article Computer Science, Hardware & Architecture

Hiding in the Mobile Crowd: Location Privacy through Collaboration

Reza Shokri et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2014)

Article Computer Science, Information Systems

Preserving Location Privacy in Geosocial Applications

Krishna P. N. Puttaswamy et al.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2014)

Article Computer Science, Information Systems

Differentially Private Event Sequences over Infinite Streams

Georgios Kellaris et al.

PROCEEDINGS OF THE VLDB ENDOWMENT (2014)

Article Computer Science, Information Systems

A Framework for Protecting Worker Location Privacy in Spatial Crowdsourcing

Hien To et al.

PROCEEDINGS OF THE VLDB ENDOWMENT (2014)

Proceedings Paper Computer Science, Theory & Methods

Optimal Geo-Indistinguishable Mechanisms for Location Privacy

Nicolas E. Bordenabe et al.

CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2014)

Article Computer Science, Information Systems

Blind evaluation of location based queries using space transformation to preserve location privacy

Ali Khoshgozaran et al.

GEOINFORMATICA (2013)

Article Computer Science, Information Systems

Local Differential Perturbations: Location Privacy under Approximate Knowledge Attackers

Rinku Dewri

IEEE TRANSACTIONS ON MOBILE COMPUTING (2013)

Article Computer Science, Artificial Intelligence

Protecting Location Privacy against Location-Dependent Attacks in Mobile Services

Xiao Pan et al.

IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2012)

Article Computer Science, Hardware & Architecture

PRIVACY PROTECTION FOR USERS OF LOCATION-BASED SERVICES

Kang G. Shin et al.

IEEE WIRELESS COMMUNICATIONS (2012)

Proceedings Paper Computer Science, Hardware & Architecture

Location Privacy with Road network Mix-zones

Balaji Palanisamy et al.

2012 EIGHTH INTERNATIONAL CONFERENCE ON MOBILE AD HOC AND SENSOR NETWORKS (MSN 2012) (2012)

Article Computer Science, Information Systems

Shortest Path Computation with No Information Leakage

Kyriakos Mouratidis et al.

PROCEEDINGS OF THE VLDB ENDOWMENT (2012)

Article Engineering, Electrical & Electronic

SlotSwap: Strong and Affordable Location Privacy in Intelligent Transportation Systems

David Eckhoff et al.

IEEE COMMUNICATIONS MAGAZINE (2011)

Article Computer Science, Information Systems

Cryptographic Approaches for Privacy Preservation in Location-Based Services: A Survey

Emmanouil Magkos

INTERNATIONAL JOURNAL OF INFORMATION TECHNOLOGIES AND SYSTEMS APPROACH (2011)

Article Computer Science, Information Systems

Achieving Guaranteed Anonymity in GPS Traces via Uncertainty-Aware Path Cloaking

Baik Hoh et al.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2010)

Article Computer Science, Information Systems

Nearest Neighbor Search with Strong Location Privacy

Stavros Papadopoulos et al.

PROCEEDINGS OF THE VLDB ENDOWMENT (2010)

Editorial Material Computer Science, Information Systems

Location-based services: Back to the future

Paolo Bellavista et al.

IEEE PERVASIVE COMPUTING (2008)

Article Computer Science, Information Systems

Protecting location privacy with personalized k-anonymity: Architecture and algorithms

Bugra Gedik et al.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2008)

Article Computer Science, Artificial Intelligence

Preventing location-based identity inference in anonymous spatial queries

Panos Kalnis et al.

IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2007)

Article Computer Science, Information Systems

Location privacy in pervasive computing

AR Beresford et al.

IEEE PERVASIVE COMPUTING (2003)