4.7 Article

Intermittent Private Information Retrieval With Application to Location Privacy

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

ON-OFF Privacy in the Presence of Correlation

Fangwei Ye et al.

Summary: The research explores the issue of ON-OFF privacy, potential information leakage when users need to switch between ON and OFF privacy; using a Markov chain model to capture the correlation between user requests, and designing query schemes aimed at preserving privacy.

IEEE TRANSACTIONS ON INFORMATION THEORY (2021)

Article Computer Science, Theory & Methods

ON-OFF Privacy Against Correlation Over Time

Fangwei Ye et al.

Summary: The article studies the issue of ON-OFF privacy and proposes a linear programming algorithm to construct the optimal privacy scheme, while providing an upper bound on the achievable rate.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2021)

Article Computer Science, Theory & Methods

Privacy-Aware Time-Series Data Sharing With Deep Reinforcement Learning

Ecenaz Erdemir et al.

Summary: This study focuses on the privacy leakage in time-series data sharing, measuring it using mutual information and considering utility loss metrics. To minimize mutual information, deep reinforcement learning methods are used, and the proposed solution is evaluated on synthetic data and real GPS trajectory data for location trace privacy.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2021)

Article Computer Science, Information Systems

Private Information Retrieval With Side Information

Swanand Kadhe et al.

IEEE TRANSACTIONS ON INFORMATION THEORY (2020)

Article Computer Science, Information Systems

Capacity-Achieving Private Information Retrieval Codes From MDS-Coded Databases With Minimum Message Size

Ruida Zhou et al.

IEEE TRANSACTIONS ON INFORMATION THEORY (2020)

Proceedings Paper Computer Science, Theory & Methods

On the Storage Cost of Private Information Retrieval

Chao Tian

2020 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT) (2020)

Proceedings Paper Computer Science, Theory & Methods

Single-server Multi-message Private Information Retrieval with Side Information: the General Cases

Su Li et al.

2020 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT) (2020)

Article Computer Science, Information Systems

On the Storage Cost of Private Information Retrieval

Chao Tian

IEEE TRANSACTIONS ON INFORMATION THEORY (2020)

Article Computer Science, Information Systems

The Capacity of Private Information Retrieval From Uncoded Storage Constrained Databases

Mohamed Adel Attia et al.

IEEE TRANSACTIONS ON INFORMATION THEORY (2020)

Article Computer Science, Theory & Methods

Online Location Trace Privacy: An Information Theoretic Approach

Wenjing Zhang et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2019)

Article Computer Science, Information Systems

The Capacity of Symmetric Private Information Retrieval

Hua Sun et al.

IEEE TRANSACTIONS ON INFORMATION THEORY (2019)

Article Computer Science, Information Systems

The Capacity of Private Information Retrieval from Byzantine and Colluding Databases

Karim Banawan et al.

IEEE TRANSACTIONS ON INFORMATION THEORY (2019)

Article Computer Science, Information Systems

The Capacity of Private Information Retrieval With Eavesdroppers

Qiwen Wang et al.

IEEE TRANSACTIONS ON INFORMATION THEORY (2019)

Article Computer Science, Information Systems

Capacity-Achieving Private Information Retrieval Codes With Optimal Message Size and Upload Cost

Chao Tian et al.

IEEE TRANSACTIONS ON INFORMATION THEORY (2019)

Article Computer Science, Information Systems

The Capacity of Private Information Retrieval With Partially Known Private Side Information

Yi-Peng Wei et al.

IEEE TRANSACTIONS ON INFORMATION THEORY (2019)

Article Computer Science, Theory & Methods

A Geo-Indistinguishable Location Perturbation Mechanism for Location-Based Services Supporting Frequent Queries

Jingyu Hua et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)

Article Computer Science, Information Systems

Private Information Retrieval From MDS Coded Data in Distributed Storage Systems

Razane Tajeddine et al.

IEEE TRANSACTIONS ON INFORMATION THEORY (2018)

Article Computer Science, Information Systems

The Capacity of Robust Private Information Retrieval With Colluding Databases

Hua Sun et al.

IEEE TRANSACTIONS ON INFORMATION THEORY (2018)

Article Computer Science, Information Systems

The Capacity of Private Information Retrieval From Coded Databases

Karim Banawan et al.

IEEE TRANSACTIONS ON INFORMATION THEORY (2018)

Article Computer Science, Information Systems

Privacy Games Along Location Traces: A Game-Theoretic Framework for Optimizing Location Privacy

Reza Shokri et al.

ACM TRANSACTIONS ON PRIVACY AND SECURITY (2017)

Article Computer Science, Information Systems

The Capacity of Private Information Retrieval

Hua Sun et al.

IEEE TRANSACTIONS ON INFORMATION THEORY (2017)

Proceedings Paper Computer Science, Information Systems

Back to the Drawing Board: Revisiting the Design of Optimal Location Privacy-preserving Mechanisms

Simon Oya et al.

CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2017)

Proceedings Paper Computer Science, Theory & Methods

Synthesizing Plausible Privacy-Preserving Location Traces

Vincent Bindschaedler et al.

2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP) (2016)

Article Computer Science, Information Systems

Protecting location privacy with personalized k-anonymity: Architecture and algorithms

Bugra Gedik et al.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2008)

Article Computer Science, Artificial Intelligence

k-anonymity:: A model for protecting privacy

L Sweeney

INTERNATIONAL JOURNAL OF UNCERTAINTY FUZZINESS AND KNOWLEDGE-BASED SYSTEMS (2002)