We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 134 results
  1. Geo-Indistinguishability

    Ricardo Mendes, João P. Vilela in Encyclopedia of Cryptography, Security and Privacy
    Living reference work entry 2022
  2. Enhancing frequent location privacy-preserving strategy based on geo-Indistinguishability

    The increasing use of hand-held devices which have access to location information, has raised the risk of privacy disclosure. To implement privacy...

    Huiwen Luo, Haoming Zhang, ... Yi Lin in Multimedia Tools and Applications
    Article 20 March 2021
  3. Accurate and Efficient Trajectory-Based Contact Tracing with Secure Computation and Geo-Indistinguishability

    Contact tracing has been considered as an effective measure to limit the transmission of infectious disease such as COVID-19. Trajectory-based...
    Maocheng Li, Yuxiang Zeng, ... Qing Li in Database Systems for Advanced Applications
    Conference paper 2023
  4. A Privacy Preserving Method for Trajectory Data Publishing Based on Geo-Indistinguishability

    Trajectory data contains rich space-time information. Analysis and research on it can provide important information for location-based services....
    Fengyun Li, Jiaxin Dong, ... Peng Li in Advanced Data Mining and Applications
    Conference paper 2023
  5. Mitigating Privacy Vulnerability Caused by Map Asymmetry

    Geo-indistinguishability, an extension of differential privacy and thus, a mathematically rigorous privacy concept, has been researched extensively...
    Ryota Hiraishi, Masatoshi Yoshikawa, ... Hidehito Gomi in Data and Applications Security and Privacy XXXVI
    Conference paper 2022
  6. Geo-Graph-Indistinguishability: Protecting Location Privacy for LBS over Road Networks

    In recent years, Geo-Indistinguishability (GeoI) has been increasingly explored for protecting location privacy in location-based services (LBSs)....
    Shun Takagi, Yang Cao, ... Masatoshi Yoshikawa in Data and Applications Security and Privacy XXXIII
    Conference paper 2019
  7. Trajectory Hiding and Sharing for Supply Chains with Differential Privacy

    With the fast development of e-commerce, there is a higher demand for timely delivery. Logistic companies want to send receivers a more accurate...
    Tianyu Li, Li Xu, ... Reginald L. Lagendijk in Computer Security – ESORICS 2023
    Conference paper 2024
  8. Location Differential Privacy Protection in Task Allocation for Mobile Crowdsensing Over Road Networks

    Mobile Crowdsensing (MCS) platforms often require workers to provide their locations for task allocation, which may cause privacy leakage. To protect...
    Mohan Fang, Juan Yu, ... Ngounou Bernard in Collaborative Computing: Networking, Applications and Worksharing
    Conference paper 2021
  9. Hilbert curves-based location privacy technique for vehicular cloud networks

    Location privacy (LP) plays an important role in location-based services (LBS) offered by different service providers. Many applications request...

    Hani Al-Balasmeh, Maninder Singh, Raman Singh in Cluster Computing
    Article 11 July 2023
  10. Vehicle Trajectory Obfuscation and Detection

    A vehicle in road networks shares location data with other vehicles and location-based services (LBS) through Internet-of-vehicles (IoV). By...
    Baihe Ma, Yueyao Zhao, ... Ren ** Liu in Cybersecurity for Smart Cities
    Chapter 2023
  11. Learning-Based Maritime Location Privacy Protection

    In maritime networks (MNs), ships and other maritime mobile devices release their geographical and semantic information of the visited places (e.g.,...
    Liang **ao, Helin Yang, ... Minghui Min in Reinforcement Learning for Maritime Communications
    Chapter 2023
  12. On the effectiveness of differential privacy to continuous queries

    Location-based services have a wide range of applications; more recent among those include monitoring virus spread and disaster management....

    Puspanjali Ghoshal, Mohit Dhaka, Ashok Singh Sairam in Service Oriented Computing and Applications
    Article 01 May 2024
  13. Scope and Related Work

    This chapter details the criteria for inclusion of different data privacy definitions from this Brief and lists related works and existing surveys in...
    Balázs Pejó, Damien Desfontaines in Guide to Differential Privacy Modifications
    Chapter 2022
  14. Variation of Privacy Loss (V)

    Differential privacy offers the same protection for all records. In practice, some records might require a higher level of protection. This chapter...
    Balázs Pejó, Damien Desfontaines in Guide to Differential Privacy Modifications
    Chapter 2022
  15. Differential-Privacy Preserving Trajectory Data Publishing for Road Networks

    In the sharing of user trajectory data of road networks, privacy leakage emerges to be a major concern because attackers may make aggressive...
    Songyuan Li, Hui Tian, ... Yingpeng Sang in Recent Challenges in Intelligent Information and Database Systems
    Conference paper 2023
  16. Dimension-aware under spatiotemporal constraints: an efficient privacy-preserving framework with peak density clustering

    Location-based service (LBS) is one of the most popular applications in 5G environment. Users can enjoy plenty of intelligent services, but serious...

    **g Zhang, Qihan Huang, ... **u-Cai Ye in The Journal of Supercomputing
    Article 22 September 2022
  17. Advancing Personalized Federated Learning: Group Privacy, Fairness, and Beyond

    Federated learning (FL) is a framework for training machine learning models in a distributed and collaborative manner. During training, a set of...

    Filippo Galli, Kangsoo Jung, ... Tommaso Cucinotta in SN Computer Science
    Article Open access 28 October 2023
  18. A Certificateless Conditional Anonymous Authentication Scheme for Satellite Internet of Things

    The satellite Internet of Things (satellite IoT) has the characteristics of large space-time span and highly open communication links. While...
    Minqiu Tian, Fenghua Li, ... Chao Guo in Information and Communications Security
    Conference paper 2023
  19. Resisting TUL attack: balancing data privacy and utility on trajectory via collaborative adversarial learning

    Nowadays, large-scale individual trajectories can be collected by various location-based social network services, which enables us to better...

    Yandi Lun, Hao Miao, ... Senzhang Wang in GeoInformatica
    Article 21 October 2023
Did you find what you were looking for? Share feedback.