the-last-thing/bibliography.bib

1100 lines
34 KiB
BibTeX
Raw Normal View History

2019-03-05 17:54:12 +01:00
@article{laney20013d,
title={3D data management: Controlling data volume, velocity and variety},
author={Laney, Doug},
journal={META Group Research Note},
volume={6},
number={70},
year={2001}
}
@article{raghupathi2014big,
title={Big data analytics in healthcare: promise and potential},
author={Raghupathi, Wullianallur and Raghupathi, Viju},
journal={Health information science and systems},
volume={2},
number={1},
pages={3},
year={2014},
publisher={BioMed Central}
}
@article{savage2013value,
title={The value of online privacy},
author={Savage, Scott and Waldman, Donald M},
year={2013}
}
@article{lyon2014surveillance,
title={Surveillance, Snowden, and big data: Capacities, consequences, critique},
author={Lyon, David},
journal={Big Data \& Society},
volume={1},
number={2},
pages={2053951714541861},
year={2014},
publisher={SAGE Publications Sage UK: London, England}
}
@article{machanavajjhala2015designing,
title={Designing statistical privacy for your data},
author={Machanavajjhala, Ashwin and Kifer, Daniel},
journal={Communications of the ACM},
volume={58},
number={3},
pages={58--67},
year={2015},
publisher={ACM}
}
@article{tankard2016gdpr,
title={What the GDPR means for businesses},
author={Tankard, Colin},
journal={Network Security},
volume={2016},
number={6},
pages={5--8},
year={2016},
publisher={Elsevier}
}
@article{soria2016big,
title={Big data privacy: challenges to privacy principles and models},
author={Soria-Comas, Jordi and Domingo-Ferrer, Josep},
journal={Data Science and Engineering},
volume={1},
number={1},
pages={21--28},
year={2016},
publisher={Springer}
}
@misc{economist2016data,
title={The world's most valuable resource is no longer oil, but data},
publisher={The Economist},
year={2016},
howpublished={\url{https://www.economist.com/leaders/2017/05/06/the-worlds-most-valuable-resource-is-no-longer-oil-but-data}},
note={Last Accessed January 31, 2009}
}
@misc{wired2014data,
title={Data Is the New Oil of the Digital Economy},
author={Joris Toonders},
year={2014},
publisher={Wired},
howpublished={\url{https://www.wired.com/insights/2014/07/data-new-oil-digital-economy/}},
note={Last Accessed January 31, 2009}
}
@misc{chambers2016personal,
title={Personal Data: The New ``Oil'' of The Digital Economy},
author={\c{T}uca Zb\^{a}rcea \& Asocia\c{t}ii},
year={2016},
publisher={Chambers and Partners},
howpublished={\url{https://www.chambersandpartners.com/article/713/personal-data-the-new-oil-of-the-digital-economy}},
note={Last Accessed January 31, 2009}
}
@misc{facebook,
title={{Facebook}},
howpublished={\url{https://www.facebook.com/}},
note={Last Accessed January 31, 2009},
}
@misc{twitter,
title={Twitter},
howpublished={\url{https://www.twitter.com/}},
note={Last Accessed January 31, 2009}
}
@misc{foursquare,
title={Foursquare},
howpublished={\url{https://www.foursquare.com/}},
note={Last Accessed January 31, 2009}
}
@misc{osm,
title={OpenStreetMap},
howpublished={\url{https://www.openstreetmap.org/}},
note={Last Accessed January 31, 2009}
}
@misc{wiki,
title={Wikipedia},
howpublished={\url{https://www.wikipedia.org/}},
note={Last Accessed January 31, 2009}
}
@misc{experian,
title={Experian},
howpublished={\url{https://www.experian.com/}},
note={Last Accessed January 31, 2009}
}
@misc{transunion,
title={TransUnion},
howpublished={\url{https://www.transunion.com/}},
note={Last Accessed January 31, 2009}
}
@misc{acxiom,
title={Acxiom},
howpublished={\url{https://www.acxiom.com/}},
note={Last Accessed January 31, 2009}
}
@misc{gmaps,
title={Google Maps},
howpublished={\url{https://maps.google.com/}},
note={Last Accessed January 31, 2009}
}
@misc{waze,
title={Waze},
howpublished={\url{https://www.waze.com/}},
note={Last Accessed January 31, 2009}
}
@misc{channelfour2018data,
title={Data, Democracy and Dirty Tricks},
publisher={Channel 4},
year={2018},
howpublished={\url{https://www.channel4.com/news/data-democracy-and-dirty-tricks-cambridge-analytica-uncovered-investigation-expose}},
note={Last Accessed January 31, 2009}
}
@article{christin2011survey,
title={A survey on privacy in mobile participatory sensing applications},
author={Christin, Delphine and Reinhardt, Andreas and Kanhere, Salil S and Hollick, Matthias},
journal={Journal of systems and software},
volume={84},
number={11},
pages={1928--1946},
year={2011},
publisher={Elsevier}
}
@article{primault2018long,
title={The Long Road to Computational Location Privacy: A Survey},
author={Primault, Vincent and Boutet, Antoine and Mokhtar, Sonia Ben and Brunie, Lionel},
journal={IEEE Communications Surveys \& Tutorials},
year={2018},
publisher={IEEE}
}
@inproceedings{ozccep2015stream,
title={Stream-query compilation with ontologies},
author={{\"O}z{\c{c}}ep, {\"O}zg{\"u}r L{\"u}tf{\"u} and M{\"o}ller, Ralf and Neuenstadt, Christian},
booktitle={Australasian Joint Conference on Artificial Intelligence},
pages={457--463},
year={2015},
organization={Springer}
}
@inproceedings{eiter2017spatial,
title={Spatial ontology-mediated query answering over mobility streams},
author={Eiter, Thomas and Parreira, Josiane Xavier and Schneider, Patrik},
booktitle={European Semantic Web Conference},
pages={219--237},
year={2017},
organization={Springer}
}
@book{quinlan2014c4,
title={Programs for machine learning},
author={Quinlan, J Ross},
year={2014},
publisher={Elsevier}
}
@article{shannon2001mathematical,
title={A mathematical theory of communication},
author={Shannon, Claude Elwood},
journal={ACM SIGMOBILE mobile computing and communications review},
volume={5},
number={1},
pages={3--55},
year={2001},
publisher={ACM}
}
@article{wang2010privacy,
title={Privacy-preserving data publishing: A survey on recent developments},
author={Wang, K and Chen, R and Fung, BC and Yu, PS},
journal={ACM Computing Surveys},
year={2010}
}
@inproceedings{benaloh2009patient,
title={Patient controlled encryption: ensuring privacy of electronic medical records},
author={Benaloh, Josh and Chase, Melissa and Horvitz, Eric and Lauter, Kristin},
booktitle={Proceedings of the 2009 ACM workshop on Cloud computing security},
pages={103--114},
year={2009},
organization={ACM}
}
@inproceedings{kamara2010cryptographic,
title={Cryptographic cloud storage},
author={Kamara, Seny and Lauter, Kristin},
booktitle={International Conference on Financial Cryptography and Data Security},
pages={136--149},
year={2010},
organization={Springer}
}
@article{cao2014privacy,
title={Privacy-preserving multi-keyword ranked search over encrypted cloud data},
author={Cao, Ning and Wang, Cong and Li, Ming and Ren, Kui and Lou, Wenjing},
journal={IEEE Transactions on parallel and distributed systems},
volume={25},
number={1},
pages={222--233},
year={2014},
publisher={IEEE}
}
@article{sweeney2002k,
title={k-anonymity: A model for protecting privacy},
author={Sweeney, Latanya},
journal={International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems},
volume={10},
number={05},
pages={557--570},
year={2002},
publisher={World Scientific}
}
@article{sweeney2002achieving,
title={Achieving k-anonymity privacy protection using generalization and suppression},
author={Sweeney, Latanya},
journal={International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems},
volume={10},
number={05},
pages={571--588},
year={2002},
publisher={World Scientific}
}
@inproceedings{machanavajjhala2006diversity,
title={l-diversity: Privacy beyond k-anonymity},
author={Machanavajjhala, Ashwin and Gehrke, Johannes and Kifer, Daniel and Venkitasubramaniam, Muthuramakrishnan},
booktitle={Data Engineering, 2006. ICDE'06. Proceedings of the 22nd International Conference on},
pages={24--24},
year={2006},
organization={IEEE}
}
@inproceedings{li2007t,
title={t-closeness: Privacy beyond k-anonymity and l-diversity},
author={Li, Ninghui and Li, Tiancheng and Venkatasubramanian, Suresh},
booktitle={Data Engineering, 2007. ICDE 2007. IEEE 23rd International Conference on},
pages={106--115},
year={2007},
organization={IEEE}
}
@inproceedings{dwork2006calibrating,
title={Calibrating noise to sensitivity in private data analysis},
author={Dwork, Cynthia and McSherry, Frank and Nissim, Kobbi and Smith, Adam},
booktitle={Theory of cryptography conference},
pages={265--284},
year={2006},
organization={Springer}
}
@inproceedings{mcsherry2007mechanism,
title={Mechanism design via differential privacy},
author={McSherry, Frank and Talwar, Kunal},
booktitle={Foundations of Computer Science, 2007. FOCS'07. 48th Annual IEEE Symposium on},
pages={94--103},
year={2007},
organization={IEEE}
}
@article{ji2014differential,
title={Differential privacy and machine learning: a survey and review},
author={Ji, Zhanglong and Lipton, Zachary C and Elkan, Charles},
journal={arXiv preprint arXiv:1412.7584},
year={2014}
}
@inproceedings{dwork2008differential,
title={Differential privacy: A survey of results},
author={Dwork, Cynthia},
booktitle={International Conference on Theory and Applications of Models of Computation},
pages={1--19},
year={2008},
organization={Springer}
}
@inproceedings{mcsherry2009privacy,
title={Privacy integrated queries: an extensible platform for privacy-preserving data analysis},
author={McSherry, Frank D},
booktitle={Proceedings of the 2009 ACM SIGMOD International Conference on Management of data},
pages={19--30},
year={2009},
organization={ACM}
}
@inproceedings{kifer2011no,
title={No free lunch in data privacy},
author={Kifer, Daniel and Machanavajjhala, Ashwin},
booktitle={Proceedings of the 2011 ACM SIGMOD International Conference on Management of data},
pages={193--204},
year={2011},
organization={ACM}
}
@article{zhang2017privbayes,
title={Privbayes: Private data release via bayesian networks},
author={Zhang, Jun and Cormode, Graham and Procopiuc, Cecilia M and Srivastava, Divesh and Xiao, Xiaokui},
journal={ACM Transactions on Database Systems (TODS)},
volume={42},
number={4},
pages={25},
year={2017},
publisher={ACM}
}
@article{lafferty2001conditional,
title={Conditional random fields: Probabilistic models for segmenting and labeling sequence data},
author={Lafferty, John and McCallum, Andrew and Pereira, Fernando CN},
year={2001}
}
@article{croxton1939applied,
title={Applied general statistics},
author={Croxton, Frederick E and Cowden, Dudley J},
year={1939},
publisher={Prentice-Hall, Inc}
}
@article{baum1966statistical,
title={Statistical inference for probabilistic functions of finite state Markov chains},
author={Baum, Leonard E and Petrie, Ted},
journal={The annals of mathematical statistics},
volume={37},
number={6},
pages={1554--1563},
year={1966},
publisher={JSTOR}
}
@book{allan2013probability,
title={Probability: a graduate course},
author={Allan Gut},
volume={75},
year={2013},
publisher={Springer Science \& Business Media}
}
@book{gagniuc2017markov,
title={Markov Chains: From Theory to Implementation and Experimentation},
author={Gagniuc, Paul A},
year={2017},
publisher={John Wiley \& Sons}
}
@article{wernke2014classification,
title={A classification of location privacy attacks and approaches},
author={Wernke, Marius and Skvortsov, Pavel and D{\"u}rr, Frank and Rothermel, Kurt},
journal={Personal and ubiquitous computing},
volume={18},
number={1},
pages={163--175},
year={2014},
publisher={Springer}
}
@inproceedings{kido2005anonymous,
title={An anonymous communication technique using dummies for location-based services},
author={Kido, Hidetoshi and Yanagisawa, Yutaka and Satoh, Tetsuji},
booktitle={Pervasive Services, 2005. ICPS'05. Proceedings. International Conference on},
pages={88--97},
year={2005},
organization={IEEE}
}
@article{beresford2003location,
title={Location privacy in pervasive computing},
author={Beresford, Alastair R and Stajano, Frank},
journal={IEEE Pervasive computing},
volume={2},
number={1},
pages={46--55},
year={2003},
publisher={IEEE}
}
@article{gedik2008protecting,
title={Protecting location privacy with personalized k-anonymity: Architecture and algorithms},
author={Gedik, Bugra and Liu, Ling},
journal={IEEE Transactions on Mobile Computing},
volume={7},
number={1},
pages={1--18},
year={2008},
publisher={IEEE}
}
@article{ardagna2007location,
title={Location privacy protection through obfuscation-based techniques},
author={Ardagna, Claudio and Cremonini, Marco and Damiani, Ernesto and De Capitani di Vimercati, S and Samarati, Pierangela},
journal={Data and Applications Security XXI},
pages={47--60},
year={2007},
publisher={Springer}
}
@inproceedings{ghinita2008private,
title={Private queries in location based services: anonymizers are not necessary},
author={Ghinita, Gabriel and Kalnis, Panos and Khoshgozaran, Ali and Shahabi, Cyrus and Tan, Kian-Lee},
booktitle={Proceedings of the 2008 ACM SIGMOD international conference on Management of data},
pages={121--132},
year={2008},
organization={ACM}
}
@inproceedings{durr2011position,
title={Position sharing for location privacy in non-trusted systems},
author={D{\"u}rr, Frank and Skvortsov, Pavel and Rothermel, Kurt},
booktitle={Pervasive Computing and Communications (PerCom), 2011 IEEE International Conference on},
pages={189--196},
year={2011},
organization={IEEE}
}
@inproceedings{andres2013geo,
title={Geo-indistinguishability: Differential privacy for location-based systems},
author={Andr{\'e}s, Miguel E and Bordenabe, Nicol{\'a}s E and Chatzikokolakis, Konstantinos and Palamidessi, Catuscia},
booktitle={Proceedings of the 2013 ACM SIGSAC conference on Computer \& communications security},
pages={901--914},
year={2013},
organization={ACM}
}
@inproceedings{bayardo2005data,
title={Data privacy through optimal k-anonymization},
author={Bayardo, Roberto J and Agrawal, Rakesh},
booktitle={Data Engineering, 2005. ICDE 2005. Proceedings. 21st International Conference on},
pages={217--228},
year={2005},
organization={IEEE}
}
@inproceedings{samarati1998protecting,
title={Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression},
author={Samarati, Pierangela and Sweeney, Latanya},
booktitle={IEEE Symposium on Research in Security and Privacy in},
year={1998},
organization={IEEE}
}
@inproceedings{wang2006anonymizing,
title={Anonymizing sequential releases},
author={Wang, Ke and Fung, Benjamin},
booktitle={Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining},
pages={414--423},
year={2006},
organization={ACM}
}
@inproceedings{fung2008anonymity,
title={Anonymity for continuous data publishing},
author={Fung, Benjamin and Wang, Ke and Fu, Ada Wai-Chee and Pei, Jian},
booktitle={Proceedings of the 11th international conference on Extending database technology: Advances in database technology},
pages={264--275},
year={2008},
organization={ACM}
}
@inproceedings{ganta2008composition,
title={Composition attacks and auxiliary information in data privacy},
author={Ganta, Srivatsava Ranjit and Kasiviswanathan, Shiva Prasad and Smith, Adam},
booktitle={Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining},
pages={265--273},
year={2008},
organization={ACM}
}
@inproceedings{xiao2007m,
title={M-invariance: towards privacy preserving re-publication of dynamic data sets},
author={Xiao, Xiaokui and Tao, Yufei},
booktitle={Proceedings of the 2007 ACM SIGMOD international conference on Management of data},
pages={689--700},
year={2007},
organization={ACM}
}
@article{chan2011private,
title={Private and continual release of statistics},
author={Chan, T-H Hubert and Shi, Elaine and Song, Dawn},
journal={ACM Transactions on Information and System Security (TISSEC)},
volume={14},
number={3},
pages={26},
year={2011},
publisher={ACM}
}
@article{he2011preventing,
title={Preventing equivalence attacks in updated, anonymized data},
author={He, Yeye and Barman, Siddharth and Naughton, Jeffrey},
year={2011}
}
@article{shmueli2012limiting,
title={Limiting disclosure of sensitive data in sequential releases of databases},
author={Shmueli, Erez and Tassa, Tamir and Wasserstein, Raz and Shapira, Bracha and Rokach, Lior},
journal={Information Sciences},
volume={191},
pages={98--127},
year={2012},
publisher={Elsevier}
}
@inproceedings{bolot2013private,
title={Private decayed predicate sums on streams},
author={Bolot, Jean and Fawaz, Nadia and Muthukrishnan, S and Nikolov, Aleksandar and Taft, Nina},
booktitle={Proceedings of the 16th International Conference on Database Theory},
pages={284--295},
year={2013},
organization={ACM}
}
@inproceedings{erdogdu2015privacy,
title={Privacy-utility trade-off under continual observation},
author={Erdogdu, Murat A and Fawaz, Nadia},
booktitle={ISIT},
pages={1801--1805},
year={2015}
}
@article{shmueli2015privacy,
title={Privacy by diversity in sequential releases of databases},
author={Shmueli, Erez and Tassa, Tamir},
journal={Information Sciences},
volume={298},
pages={344--372},
year={2015},
publisher={Elsevier}
}
@article{li2016hybrid,
title={A hybrid approach to prevent composition attacks for independent data releases},
author={Li, Jiuyong and Baig, Muzammil M and Sattar, AHM Sarowar and Ding, Xiaofeng and Liu, Jixue and Vincent, Millist W},
journal={Information Sciences},
volume={367},
pages={324--336},
year={2016},
publisher={Elsevier}
}
@inproceedings{quoc2017privapprox,
title={PrivApprox: privacy-preserving stream analytics},
author={Quoc, Do Le and Beck, Martin and Bhatotia, Pramod and Chen, Ruichuan and Fetzer, Christof and Strufe, Thorsten},
booktitle={Proceedings of the 2017 USENIX Conference on Usenix Annual Technical Conference},
pages={659--672},
year={2017},
organization={USENIX Association}
}
@inproceedings{wang2017privacy,
title={Privacy Preserving Anonymity for Periodical SRS Data Publishing},
author={Wang, Jie-Teng and Lin, Wen-Yang},
booktitle={Data Engineering (ICDE), 2017 IEEE 33rd International Conference on},
pages={1344--1355},
year={2017},
organization={IEEE}
}
@article{al2018adaptive,
title={An adaptive geo-indistinguishability mechanism for continuous LBS queries},
author={Al-Dhubhani, Raed and Cazalas, Jonathan M},
journal={Wireless Networks},
volume={24},
number={8},
pages={3221--3239},
year={2018},
publisher={Springer}
}
@inproceedings{kellaris2013practical,
title={Practical differential privacy via grouping and smoothing},
author={Kellaris, Georgios and Papadopoulos, Stavros},
booktitle={Proceedings of the VLDB Endowment},
volume={6},
number={5},
pages={301--312},
year={2013},
organization={VLDB Endowment}
}
@article{kellaris2014differentially,
title={Differentially private event sequences over infinite streams},
author={Kellaris, Georgios and Papadopoulos, Stavros and Xiao, Xiaokui and Papadias, Dimitris},
journal={Proceedings of the VLDB Endowment},
volume={7},
number={12},
pages={1155--1166},
year={2014},
publisher={VLDB Endowment}
}
@inproceedings{zhou2009continuous,
title={Continuous privacy preserving publishing of data streams},
author={Zhou, Bin and Han, Yi and Pei, Jian and Jiang, Bin and Tao, Yufei and Jia, Yan},
booktitle={Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology},
pages={648--659},
year={2009},
organization={ACM}
}
@inproceedings{gotz2012maskit,
title={Maskit: Privately releasing user context streams for personalized mobile applications},
author={G{\"o}tz, Michaela and Nath, Suman and Gehrke, Johannes},
booktitle={Proceedings of the 2012 ACM SIGMOD International Conference on Management of Data},
pages={289--300},
year={2012},
organization={ACM}
}
@inproceedings{fan2013differentially,
title={Differentially private multi-dimensional time series release for traffic monitoring},
author={Fan, Liyue and Xiong, Li and Sunderam, Vaidy},
booktitle={IFIP Annual Conference on Data and Applications Security and Privacy},
pages={33--48},
year={2013},
organization={Springer}
}
@inproceedings{primault2015time,
title={Time distortion anonymization for the publication of mobility data with high utility},
author={Primault, Vincent and Mokhtar, Sonia Ben and Lauradoux, C{\'e}dric and Brunie, Lionel},
booktitle={Trustcom/BigDataSE/ISPA, 2015 IEEE},
volume={1},
pages={539--546},
year={2015},
organization={IEEE}
}
@inproceedings{dwork2010differential,
title={Differential privacy under continual observation},
author={Dwork, Cynthia and Naor, Moni and Pitassi, Toniann and Rothblum, Guy N},
booktitle={Proceedings of the forty-second ACM symposium on Theory of computing},
pages={715--724},
year={2010},
organization={ACM}
}
@inproceedings{cao2015differentially,
title={Differentially private real-time data release over infinite trajectory streams},
author={Cao, Yang and Yoshikawa, Masatoshi},
booktitle={Mobile Data Management (MDM), 2015 16th IEEE International Conference on},
volume={2},
pages={68--73},
year={2015},
organization={IEEE}
}
@inproceedings{wang2016rescuedp,
title={RescueDP: Real-time spatio-temporal crowd-sourced data publishing with differential privacy},
author={Wang, Qian and Zhang, Yan and Lu, Xiao and Wang, Zhibo and Qin, Zhan and Ren, Kui},
booktitle={Computer Communications, IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on},
pages={1--9},
year={2016},
organization={IEEE}
}
@article{silva2013data,
title={Data stream clustering: A survey},
author={Silva, Jonathan A and Faria, Elaine R and Barros, Rodrigo C and Hruschka, Eduardo R and De Carvalho, Andre CPLF and Gama, Jo{\~a}o},
journal={ACM Computing Surveys (CSUR)},
volume={46},
number={1},
pages={13},
year={2013},
publisher={ACM}
}
@incollection{gama2007data,
title={Data stream processing},
author={Gama, Jo{\~a}o and Rodrigues, Pedro Pereira},
booktitle={Learning from Data Streams},
pages={25--39},
year={2007},
publisher={Springer}
}
@article{gruteser2004protecting,
title={Protecting privacy, in continuous location-tracking applications},
author={Gruteser, Marco and Liu, Xuan},
journal={IEEE Security \& Privacy},
volume={2},
number={2},
pages={28--34},
year={2004},
publisher={IEEE}
}
@inproceedings{hua2015differentially,
title={Differentially private publication of general time-serial trajectory data},
author={Hua, Jingyu and Gao, Yue and Zhong, Sheng},
booktitle={Computer Communications (INFOCOM), 2015 IEEE Conference on},
pages={549--557},
year={2015},
organization={IEEE}
}
@article{li2017achieving,
title={Achieving differential privacy of trajectory data publishing in participatory sensing},
author={Li, Meng and Zhu, Liehuang and Zhang, Zijian and Xu, Rixin},
journal={Information Sciences},
volume={400},
pages={1--13},
year={2017},
publisher={Elsevier}
}
@article{zhu2017answering,
title={Answering differentially private queries for continual data sets release},
author={Zhu, Tianqing and Li, Gang and Xiong, Ping and Zhou, Wanlei},
journal={Future Generation Computer Systems},
year={2017},
publisher={Elsevier}
}
@article{chen2011differentially,
title={Differentially private trajectory data publication},
author={Chen, Rui and Fung, Benjamin and Desai, Bipin C},
journal={arXiv preprint arXiv:1112.2020},
year={2011}
}
@inproceedings{chen2012differentially,
title={Differentially private sequential data publication via variable-length n-grams},
author={Chen, Rui and Acs, Gergely and Castelluccia, Claude},
booktitle={Proceedings of the 2012 ACM conference on Computer and communications security},
pages={638--649},
year={2012},
organization={ACM}
}
@inproceedings{jiang2013publishing,
title={Publishing trajectories with differential privacy guarantees},
author={Jiang, Kaifeng and Shao, Dongxu and Bressan, St{\'e}phane and Kister, Thomas and Tan, Kian-Lee},
booktitle={Proceedings of the 25th International Conference on Scientific and Statistical Database Management},
pages={12},
year={2013},
organization={ACM}
}
@misc{gualtieri2016perishable,
author={Mike Gualtieri, Rowan Curran, Holger Kisker and Emily Miller},
title={Perishable Insights -- Stop Wasting Money On Unactionable Analytics},
organization={Forrester},
year={2016}
}
@article{chen2014correlated,
title={Correlated network data publication via differential privacy},
author={Chen, Rui and Fung, Benjamin C and Yu, Philip S and Desai, Bipin C},
journal={The VLDB Journal—The International Journal on Very Large Data Bases},
volume={23},
number={4},
pages={653--676},
year={2014},
publisher={Springer-Verlag New York, Inc.}
}
@article{zhu2015correlated,
title={Correlated differential privacy: hiding information in non-IID data set},
author={Zhu, Tianqing and Xiong, Ping and Li, Gang and Zhou, Wanlei},
journal={IEEE Transactions on Information Forensics and Security},
volume={10},
number={2},
pages={229--242},
year={2015},
publisher={IEEE}
}
@inproceedings{liu2016dependence,
title={Dependence Makes You Vulnerable: Differential Privacy Under Dependent Tuples},
author={Liu, Changchang and Chakraborty, Supriyo and Mittal, Prateek},
booktitle={NDSS},
volume={16},
pages={21--24},
year={2016}
}
@inproceedings{cao2017quantifying,
title={Quantifying differential privacy under temporal correlations},
author={Cao, Yang and Yoshikawa, Masatoshi and Xiao, Yonghui and Xiong, Li},
booktitle={Data Engineering (ICDE), 2017 IEEE 33rd International Conference on},
pages={821--832},
year={2017},
organization={IEEE}
}
@inproceedings{song2017pufferfish,
title={Pufferfish privacy mechanisms for correlated data},
author={Song, Shuang and Wang, Yizhen and Chaudhuri, Kamalika},
booktitle={Proceedings of the 2017 ACM International Conference on Management of Data},
pages={1291--1306},
year={2017},
organization={ACM}
}
@inproceedings{xiao2015protecting,
title={Protecting locations with differential privacy under temporal correlations},
author={Xiao, Yonghui and Xiong, Li},
booktitle={Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security},
pages={1298--1309},
year={2015},
organization={ACM}
}
@inproceedings{yang2015bayesian,
title={Bayesian differential privacy on correlated data},
author={Yang, Bin and Sato, Issei and Nakagawa, Hiroshi},
booktitle={Proceedings of the 2015 ACM SIGMOD international conference on Management of Data},
pages={747--762},
year={2015},
organization={ACM}
}
@inproceedings{li2007hiding,
title={Hiding in the crowd: Privacy preservation on evolving streams through correlation tracking},
author={Li, Feifei and Sun, Jimeng and Papadimitriou, Spiros and Mihaila, George A and Stanoi, Ioana},
booktitle={Data Engineering, 2007. ICDE 2007. IEEE 23rd International Conference on},
pages={686--695},
year={2007},
organization={IEEE}
}
@article{xiao2017loclok,
title={LocLok: location cloaking with differential privacy via hidden markov model},
author={Xiao, Yonghui and Xiong, Li and Zhang, Si and Cao, Yang},
journal={Proceedings of the VLDB Endowment},
volume={10},
number={12},
pages={1901--1904},
year={2017},
publisher={VLDB Endowment}
}
@article{ma2017plp,
title={PLP: Protecting location privacy against correlation analyze Attack in crowdsensing},
author={Ma, Qiang and Zhang, Shanfeng and Zhu, Tong and Liu, Kebin and Zhang, Lan and He, Wenbo and Liu, Yunhao},
journal={IEEE transactions on mobile computing},
volume={16},
number={9},
pages={2588--2598},
year={2017},
publisher={IEEE}
}
@inproceedings{ghinita2009preventing,
title={Preventing velocity-based linkage attacks in location-aware applications},
author={Ghinita, Gabriel and Damiani, Maria Luisa and Silvestri, Claudio and Bertino, Elisa},
booktitle={Proceedings of the 17th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems},
pages={246--255},
year={2009},
organization={ACM}
}
@article{wang2017cts,
title={CTS-DP: publishing correlated time-series data via differential privacy},
author={Wang, Hao and Xu, Zhengquan},
journal={Knowledge-Based Systems},
volume={122},
pages={167--179},
year={2017},
publisher={Elsevier}
}
@article{fan2014adaptive,
title={An adaptive approach to real-time aggregate monitoring with differential privacy},
author={Fan, Liyue and Xiong, Li},
journal={IEEE Transactions on Knowledge and Data Engineering},
volume={26},
number={9},
pages={2094--2106},
year={2014},
publisher={IEEE}
}
@article{kifer2014pufferfish,
title={Pufferfish: A framework for mathematical privacy definitions},
author={Kifer, Daniel and Machanavajjhala, Ashwin},
journal={ACM Transactions on Database Systems (TODS)},
volume={39},
number={1},
pages={3},
year={2014},
publisher={ACM}
}
@inproceedings{katsomallos2014easyharvest,
title={EasyHarvest: Supporting the deployment and management of sensing applications on smartphones},
author={Katsomallos, Manos and Lalis, Spyros},
booktitle={Pervasive Computing and Communications Workshops (PERCOM Workshops), 2014 IEEE International Conference on},
pages={80--85},
year={2014},
organization={IEEE}
}
@inproceedings{katsomallos2017open,
title={An open framework for flexible plug-in privacy mechanisms in crowdsensing applications},
author={Katsomallos, Manos and Lalis, Spyros and Papaioannou, Thanasis and Theodorakopoulos, George},
booktitle={Pervasive Computing and Communications Workshops (PerCom Workshops), 2017 IEEE International Conference on},
pages={237--242},
year={2017},
organization={IEEE}
}
@inproceedings{chen2017pegasus,
title={PeGaSus: Data-Adaptive Differentially Private Stream Processing},
author={Chen, Yan and Machanavajjhala, Ashwin and Hay, Michael and Miklau, Gerome},
booktitle={Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security},
pages={1375--1388},
year={2017},
organization={ACM}
}
@inproceedings{kifer2009attacks,
title={Attacks on privacy and deFinetti's theorem},
author={Kifer, Daniel},
booktitle={Proceedings of the 2009 ACM SIGMOD International Conference on Management of data},
pages={127--138},
year={2009},
organization={ACM}
}
@inproceedings{wong2007minimality,
title={Minimality attack in privacy preserving data publishing},
author={Wong, Raymond Chi-Wing and Fu, Ada Wai-Chee and Wang, Ke and Pei, Jian},
booktitle={Proceedings of the 33rd international conference on Very large data bases},
pages={543--554},
year={2007},
organization={VLDB Endowment}
}
@inproceedings{simi2017extensive,
title={An extensive study on data anonymization algorithms based on k-anonymity},
author={Simi, Ms MS and Nayaki, Mrs K Sankara and Elayidom, M Sudheep},
booktitle={IOP Conference Series: Materials Science and Engineering},
volume={225},
number={1},
pages={012279},
year={2017},
organization={IOP Publishing}
}
@article{zhou2008brief,
title={A brief survey on anonymization techniques for privacy preserving publishing of social network data},
author={Zhou, Bin and Pei, Jian and Luk, WoShun},
journal={ACM Sigkdd Explorations Newsletter},
volume={10},
number={2},
pages={12--22},
year={2008},
publisher={ACM}
}
@inproceedings{wang2009survey,
title={A survey on privacy preserving data mining},
author={Wang, Jian and Luo, Yongcheng and Zhao, Yan and Le, Jiajin},
booktitle={Database Technology and Applications, 2009 First International Workshop on},
pages={111--114},
year={2009},
organization={IEEE}
}
@article{jain2016big,
title={Big data privacy: a technological perspective and review},
author={Jain, Priyank and Gyanchandani, Manasi and Khare, Nilay},
journal={Journal of Big Data},
volume={3},
number={1},
pages={25},
year={2016},
publisher={Springer}
}
@inproceedings{narayanan2008robust,
title={Robust de-anonymization of large sparse data sets},
author={Narayanan, Arvind and Shmatikov, Vitaly},
booktitle={Security and Privacy, 2008. SP 2008. IEEE Symposium on},
pages={111--125},
year={2008},
organization={IEEE}
}
@inproceedings{erlingsson2014rappor,
title={Rappor: Randomized aggregatable privacy-preserving ordinal response},
author={Erlingsson, {\'U}lfar and Pihur, Vasyl and Korolova, Aleksandra},
booktitle={Proceedings of the 2014 ACM SIGSAC conference on computer and communications security},
pages={1054--1067},
year={2014},
organization={ACM}
}
@inproceedings{perera2014mosden,
title={Mosden: An internet of things middleware for resource constrained mobile devices},
author={Perera, Charith and Jayaraman, Prem Prakash and Zaslavsky, Arkady and Christen, Peter and Georgakopoulos, Dimitrios},
booktitle={2014 47th Hawaii International Conference on System Sciences},
pages={1053--1062},
year={2014},
organization={IEEE}
}
@inproceedings{ye2012meca,
title={Meca: mobile edge capture and analysis middleware for social sensing applications},
author={Ye, Fan and Ganti, Raghu and Dimaghani, Raheleh and Grueneberg, Keith and Calo, Seraphin},
booktitle={Proceedings of the 21st International Conference on World Wide Web},
pages={699--702},
year={2012},
organization={ACM}
}
@inproceedings{zhao2017dependent,
title={Dependent Differential Privacy for Correlated Data},
author={Zhao, Jun and Zhang, Junshan and Poor, H Vincent},
booktitle={Globecom Workshops (GC Wkshps), 2017 IEEE},
pages={1--7},
year={2017},
organization={IEEE}
}
@inproceedings{efthymiou2015big,
title={Big data entity resolution: From highly to somehow similar entity descriptions in the Web},
author={Efthymiou, Vasilis and Stefanidis, Kostas and Christophides, Vassilis},
booktitle={2015 IEEE International Conference on Big Data (Big Data)},
pages={401--410},
year={2015},
organization={IEEE}
}
@inproceedings{blocki2013differentially,
title={Differentially private data analysis of social networks via restricted sensitivity},
author={Blocki, Jeremiah and Blum, Avrim and Datta, Anupam and Sheffet, Or},
booktitle={Proceedings of the 4th conference on Innovations in Theoretical Computer Science},
pages={87--96},
year={2013},
organization={ACM}
}
@article{johnson2018towards,
title={Towards practical differential privacy for SQL queries},
author={Johnson, Noah and Near, Joseph P and Song, Dawn},
journal={Proceedings of the VLDB Endowment},
volume={11},
number={5},
pages={526--539},
year={2018},
publisher={VLDB Endowment}
}