From 3454c73bc9a8aaf48132f07a33f4f060b5c3877e Mon Sep 17 00:00:00 2001 From: Manos Katsomallos Date: Thu, 24 Jun 2021 03:00:21 +0200 Subject: [PATCH] New bibliography --- bibliography.bib | 2938 +++++++++++++++++++++++++++++----------------- 1 file changed, 1874 insertions(+), 1064 deletions(-) diff --git a/bibliography.bib b/bibliography.bib index 25c976d..09425e0 100644 --- a/bibliography.bib +++ b/bibliography.bib @@ -1,1098 +1,1908 @@ -@article{laney20013d, - title={3D data management: Controlling data volume, velocity and variety}, - author={Laney, Doug}, - journal={META Group Research Note}, - volume={6}, - number={70}, - year={2001} -} - -@article{raghupathi2014big, - title={Big data analytics in healthcare: promise and potential}, - author={Raghupathi, Wullianallur and Raghupathi, Viju}, - journal={Health information science and systems}, - volume={2}, - number={1}, - pages={3}, - year={2014}, - publisher={BioMed Central} -} - -@article{savage2013value, - title={The value of online privacy}, - author={Savage, Scott and Waldman, Donald M}, - year={2013} -} - -@article{lyon2014surveillance, - title={Surveillance, Snowden, and big data: Capacities, consequences, critique}, - author={Lyon, David}, - journal={Big Data \& Society}, - volume={1}, - number={2}, - pages={2053951714541861}, - year={2014}, - publisher={SAGE Publications Sage UK: London, England} -} - -@article{machanavajjhala2015designing, - title={Designing statistical privacy for your data}, - author={Machanavajjhala, Ashwin and Kifer, Daniel}, - journal={Communications of the ACM}, - volume={58}, - number={3}, - pages={58--67}, - year={2015}, - publisher={ACM} -} - -@article{tankard2016gdpr, - title={What the GDPR means for businesses}, - author={Tankard, Colin}, - journal={Network Security}, - volume={2016}, - number={6}, - pages={5--8}, - year={2016}, - publisher={Elsevier} -} - -@article{soria2016big, - title={Big data privacy: challenges to privacy principles and models}, - author={Soria-Comas, Jordi and Domingo-Ferrer, Josep}, - journal={Data Science and Engineering}, - volume={1}, - number={1}, - pages={21--28}, - year={2016}, - publisher={Springer} -} - -@misc{economist2016data, - title={The world's most valuable resource is no longer oil, but data}, - publisher={The Economist}, - year={2016}, - howpublished={\url{https://www.economist.com/leaders/2017/05/06/the-worlds-most-valuable-resource-is-no-longer-oil-but-data}}, - note={Last Accessed January 31, 2009} -} - -@misc{wired2014data, - title={Data Is the New Oil of the Digital Economy}, - author={Joris Toonders}, - year={2014}, - publisher={Wired}, - howpublished={\url{https://www.wired.com/insights/2014/07/data-new-oil-digital-economy/}}, - note={Last Accessed January 31, 2009} -} - -@misc{chambers2016personal, - title={Personal Data: The New ``Oil'' of The Digital Economy}, - author={\c{T}uca Zb\^{a}rcea \& Asocia\c{t}ii}, - year={2016}, - publisher={Chambers and Partners}, - howpublished={\url{https://www.chambersandpartners.com/article/713/personal-data-the-new-oil-of-the-digital-economy}}, - note={Last Accessed January 31, 2009} -} - -@misc{facebook, - title={{Facebook}}, - howpublished={\url{https://www.facebook.com/}}, - note={Last Accessed January 31, 2009}, -} - -@misc{twitter, - title={Twitter}, - howpublished={\url{https://www.twitter.com/}}, - note={Last Accessed January 31, 2009} -} - -@misc{foursquare, - title={Foursquare}, - howpublished={\url{https://www.foursquare.com/}}, - note={Last Accessed January 31, 2009} -} - -@misc{osm, - title={OpenStreetMap}, - howpublished={\url{https://www.openstreetmap.org/}}, - note={Last Accessed January 31, 2009} -} - -@misc{wiki, - title={Wikipedia}, - howpublished={\url{https://www.wikipedia.org/}}, - note={Last Accessed January 31, 2009} -} - -@misc{experian, - title={Experian}, - howpublished={\url{https://www.experian.com/}}, - note={Last Accessed January 31, 2009} -} - -@misc{transunion, - title={TransUnion}, - howpublished={\url{https://www.transunion.com/}}, - note={Last Accessed January 31, 2009} -} - -@misc{acxiom, - title={Acxiom}, - howpublished={\url{https://www.acxiom.com/}}, - note={Last Accessed January 31, 2009} -} - -@misc{gmaps, - title={Google Maps}, - howpublished={\url{https://maps.google.com/}}, - note={Last Accessed January 31, 2009} -} - -@misc{waze, - title={Waze}, - howpublished={\url{https://www.waze.com/}}, - note={Last Accessed January 31, 2009} -} - -@misc{channelfour2018data, - title={Data, Democracy and Dirty Tricks}, - publisher={Channel 4}, - year={2018}, - howpublished={\url{https://www.channel4.com/news/data-democracy-and-dirty-tricks-cambridge-analytica-uncovered-investigation-expose}}, - note={Last Accessed January 31, 2009} -} - -@article{christin2011survey, - title={A survey on privacy in mobile participatory sensing applications}, - author={Christin, Delphine and Reinhardt, Andreas and Kanhere, Salil S and Hollick, Matthias}, - journal={Journal of systems and software}, - volume={84}, - number={11}, - pages={1928--1946}, - year={2011}, - publisher={Elsevier} -} - -@article{primault2018long, - title={The Long Road to Computational Location Privacy: A Survey}, - author={Primault, Vincent and Boutet, Antoine and Mokhtar, Sonia Ben and Brunie, Lionel}, - journal={IEEE Communications Surveys \& Tutorials}, - year={2018}, - publisher={IEEE} -} - -@inproceedings{ozccep2015stream, - title={Stream-query compilation with ontologies}, - author={{\"O}z{\c{c}}ep, {\"O}zg{\"u}r L{\"u}tf{\"u} and M{\"o}ller, Ralf and Neuenstadt, Christian}, - booktitle={Australasian Joint Conference on Artificial Intelligence}, - pages={457--463}, - year={2015}, - organization={Springer} -} - -@inproceedings{eiter2017spatial, - title={Spatial ontology-mediated query answering over mobility streams}, - author={Eiter, Thomas and Parreira, Josiane Xavier and Schneider, Patrik}, - booktitle={European Semantic Web Conference}, - pages={219--237}, - year={2017}, - organization={Springer} -} - -@book{quinlan2014c4, - title={Programs for machine learning}, - author={Quinlan, J Ross}, - year={2014}, - publisher={Elsevier} -} - -@article{shannon2001mathematical, - title={A mathematical theory of communication}, - author={Shannon, Claude Elwood}, - journal={ACM SIGMOBILE mobile computing and communications review}, - volume={5}, - number={1}, - pages={3--55}, - year={2001}, - publisher={ACM} -} - -@article{wang2010privacy, - title={Privacy-preserving data publishing: A survey on recent developments}, - author={Wang, K and Chen, R and Fung, BC and Yu, PS}, - journal={ACM Computing Surveys}, - year={2010} -} - -@inproceedings{benaloh2009patient, - title={Patient controlled encryption: ensuring privacy of electronic medical records}, - author={Benaloh, Josh and Chase, Melissa and Horvitz, Eric and Lauter, Kristin}, - booktitle={Proceedings of the 2009 ACM workshop on Cloud computing security}, - pages={103--114}, - year={2009}, - organization={ACM} -} - -@inproceedings{kamara2010cryptographic, - title={Cryptographic cloud storage}, - author={Kamara, Seny and Lauter, Kristin}, - booktitle={International Conference on Financial Cryptography and Data Security}, - pages={136--149}, - year={2010}, - organization={Springer} -} - -@article{cao2014privacy, - title={Privacy-preserving multi-keyword ranked search over encrypted cloud data}, - author={Cao, Ning and Wang, Cong and Li, Ming and Ren, Kui and Lou, Wenjing}, - journal={IEEE Transactions on parallel and distributed systems}, - volume={25}, - number={1}, - pages={222--233}, - year={2014}, - publisher={IEEE} -} - -@article{sweeney2002k, - title={k-anonymity: A model for protecting privacy}, - author={Sweeney, Latanya}, - journal={International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems}, - volume={10}, - number={05}, - pages={557--570}, - year={2002}, - publisher={World Scientific} -} - -@article{sweeney2002achieving, - title={Achieving k-anonymity privacy protection using generalization and suppression}, - author={Sweeney, Latanya}, - journal={International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems}, - volume={10}, - number={05}, - pages={571--588}, - year={2002}, - publisher={World Scientific} -} - -@inproceedings{machanavajjhala2006diversity, - title={l-diversity: Privacy beyond k-anonymity}, - author={Machanavajjhala, Ashwin and Gehrke, Johannes and Kifer, Daniel and Venkitasubramaniam, Muthuramakrishnan}, - booktitle={Data Engineering, 2006. ICDE'06. Proceedings of the 22nd International Conference on}, - pages={24--24}, - year={2006}, - organization={IEEE} -} - -@inproceedings{li2007t, - title={t-closeness: Privacy beyond k-anonymity and l-diversity}, - author={Li, Ninghui and Li, Tiancheng and Venkatasubramanian, Suresh}, - booktitle={Data Engineering, 2007. ICDE 2007. IEEE 23rd International Conference on}, - pages={106--115}, - year={2007}, - organization={IEEE} -} - -@inproceedings{dwork2006calibrating, - title={Calibrating noise to sensitivity in private data analysis}, - author={Dwork, Cynthia and McSherry, Frank and Nissim, Kobbi and Smith, Adam}, - booktitle={Theory of cryptography conference}, - pages={265--284}, - year={2006}, - organization={Springer} -} - -@inproceedings{mcsherry2007mechanism, - title={Mechanism design via differential privacy}, - author={McSherry, Frank and Talwar, Kunal}, - booktitle={Foundations of Computer Science, 2007. FOCS'07. 48th Annual IEEE Symposium on}, - pages={94--103}, - year={2007}, - organization={IEEE} -} - -@article{ji2014differential, - title={Differential privacy and machine learning: a survey and review}, - author={Ji, Zhanglong and Lipton, Zachary C and Elkan, Charles}, - journal={arXiv preprint arXiv:1412.7584}, - year={2014} -} - -@inproceedings{dwork2008differential, - title={Differential privacy: A survey of results}, - author={Dwork, Cynthia}, - booktitle={International Conference on Theory and Applications of Models of Computation}, - pages={1--19}, - year={2008}, - organization={Springer} -} - -@inproceedings{mcsherry2009privacy, - title={Privacy integrated queries: an extensible platform for privacy-preserving data analysis}, - author={McSherry, Frank D}, - booktitle={Proceedings of the 2009 ACM SIGMOD International Conference on Management of data}, - pages={19--30}, - year={2009}, - organization={ACM} -} - -@inproceedings{kifer2011no, - title={No free lunch in data privacy}, - author={Kifer, Daniel and Machanavajjhala, Ashwin}, - booktitle={Proceedings of the 2011 ACM SIGMOD International Conference on Management of data}, - pages={193--204}, - year={2011}, - organization={ACM} -} - -@article{zhang2017privbayes, - title={Privbayes: Private data release via bayesian networks}, - author={Zhang, Jun and Cormode, Graham and Procopiuc, Cecilia M and Srivastava, Divesh and Xiao, Xiaokui}, - journal={ACM Transactions on Database Systems (TODS)}, - volume={42}, - number={4}, - pages={25}, - year={2017}, - publisher={ACM} -} - -@article{lafferty2001conditional, - title={Conditional random fields: Probabilistic models for segmenting and labeling sequence data}, - author={Lafferty, John and McCallum, Andrew and Pereira, Fernando CN}, - year={2001} -} - -@article{croxton1939applied, - title={Applied general statistics}, - author={Croxton, Frederick E and Cowden, Dudley J}, - year={1939}, - publisher={Prentice-Hall, Inc} -} - -@article{baum1966statistical, - title={Statistical inference for probabilistic functions of finite state Markov chains}, - author={Baum, Leonard E and Petrie, Ted}, - journal={The annals of mathematical statistics}, - volume={37}, - number={6}, - pages={1554--1563}, - year={1966}, - publisher={JSTOR} -} - -@book{allan2013probability, - title={Probability: a graduate course}, - author={Allan Gut}, - volume={75}, - year={2013}, - publisher={Springer Science \& Business Media} -} - -@book{gagniuc2017markov, - title={Markov Chains: From Theory to Implementation and Experimentation}, - author={Gagniuc, Paul A}, - year={2017}, - publisher={John Wiley \& Sons} -} - -@article{wernke2014classification, - title={A classification of location privacy attacks and approaches}, - author={Wernke, Marius and Skvortsov, Pavel and D{\"u}rr, Frank and Rothermel, Kurt}, - journal={Personal and ubiquitous computing}, - volume={18}, - number={1}, - pages={163--175}, - year={2014}, - publisher={Springer} -} - -@inproceedings{kido2005anonymous, - title={An anonymous communication technique using dummies for location-based services}, - author={Kido, Hidetoshi and Yanagisawa, Yutaka and Satoh, Tetsuji}, - booktitle={Pervasive Services, 2005. ICPS'05. Proceedings. International Conference on}, - pages={88--97}, - year={2005}, - organization={IEEE} -} - -@article{beresford2003location, - title={Location privacy in pervasive computing}, - author={Beresford, Alastair R and Stajano, Frank}, - journal={IEEE Pervasive computing}, - volume={2}, - number={1}, - pages={46--55}, - year={2003}, - publisher={IEEE} -} - -@article{gedik2008protecting, - title={Protecting location privacy with personalized k-anonymity: Architecture and algorithms}, - author={Gedik, Bugra and Liu, Ling}, - journal={IEEE Transactions on Mobile Computing}, - volume={7}, - number={1}, - pages={1--18}, - year={2008}, - publisher={IEEE} -} - -@article{ardagna2007location, - title={Location privacy protection through obfuscation-based techniques}, - author={Ardagna, Claudio and Cremonini, Marco and Damiani, Ernesto and De Capitani di Vimercati, S and Samarati, Pierangela}, - journal={Data and Applications Security XXI}, - pages={47--60}, - year={2007}, - publisher={Springer} -} - -@inproceedings{ghinita2008private, - title={Private queries in location based services: anonymizers are not necessary}, - author={Ghinita, Gabriel and Kalnis, Panos and Khoshgozaran, Ali and Shahabi, Cyrus and Tan, Kian-Lee}, - booktitle={Proceedings of the 2008 ACM SIGMOD international conference on Management of data}, - pages={121--132}, - year={2008}, - organization={ACM} -} - -@inproceedings{durr2011position, - title={Position sharing for location privacy in non-trusted systems}, - author={D{\"u}rr, Frank and Skvortsov, Pavel and Rothermel, Kurt}, - booktitle={Pervasive Computing and Communications (PerCom), 2011 IEEE International Conference on}, - pages={189--196}, - year={2011}, - organization={IEEE} -} - -@inproceedings{andres2013geo, - title={Geo-indistinguishability: Differential privacy for location-based systems}, - author={Andr{\'e}s, Miguel E and Bordenabe, Nicol{\'a}s E and Chatzikokolakis, Konstantinos and Palamidessi, Catuscia}, - booktitle={Proceedings of the 2013 ACM SIGSAC conference on Computer \& communications security}, - pages={901--914}, - year={2013}, - organization={ACM} -} - -@inproceedings{bayardo2005data, - title={Data privacy through optimal k-anonymization}, - author={Bayardo, Roberto J and Agrawal, Rakesh}, - booktitle={Data Engineering, 2005. ICDE 2005. Proceedings. 21st International Conference on}, - pages={217--228}, - year={2005}, - organization={IEEE} -} - -@inproceedings{samarati1998protecting, - title={Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression}, - author={Samarati, Pierangela and Sweeney, Latanya}, - booktitle={IEEE Symposium on Research in Security and Privacy in}, - year={1998}, - organization={IEEE} -} - -@inproceedings{wang2006anonymizing, - title={Anonymizing sequential releases}, - author={Wang, Ke and Fung, Benjamin}, - booktitle={Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining}, - pages={414--423}, - year={2006}, - organization={ACM} -} - -@inproceedings{fung2008anonymity, - title={Anonymity for continuous data publishing}, - author={Fung, Benjamin and Wang, Ke and Fu, Ada Wai-Chee and Pei, Jian}, - booktitle={Proceedings of the 11th international conference on Extending database technology: Advances in database technology}, - pages={264--275}, - year={2008}, - organization={ACM} -} - -@inproceedings{ganta2008composition, - title={Composition attacks and auxiliary information in data privacy}, - author={Ganta, Srivatsava Ranjit and Kasiviswanathan, Shiva Prasad and Smith, Adam}, - booktitle={Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining}, - pages={265--273}, - year={2008}, - organization={ACM} -} - -@inproceedings{xiao2007m, - title={M-invariance: towards privacy preserving re-publication of dynamic data sets}, - author={Xiao, Xiaokui and Tao, Yufei}, - booktitle={Proceedings of the 2007 ACM SIGMOD international conference on Management of data}, - pages={689--700}, - year={2007}, - organization={ACM} -} - -@article{chan2011private, - title={Private and continual release of statistics}, - author={Chan, T-H Hubert and Shi, Elaine and Song, Dawn}, - journal={ACM Transactions on Information and System Security (TISSEC)}, - volume={14}, - number={3}, - pages={26}, - year={2011}, - publisher={ACM} -} - -@article{he2011preventing, - title={Preventing equivalence attacks in updated, anonymized data}, - author={He, Yeye and Barman, Siddharth and Naughton, Jeffrey}, - year={2011} -} - -@article{shmueli2012limiting, - title={Limiting disclosure of sensitive data in sequential releases of databases}, - author={Shmueli, Erez and Tassa, Tamir and Wasserstein, Raz and Shapira, Bracha and Rokach, Lior}, - journal={Information Sciences}, - volume={191}, - pages={98--127}, - year={2012}, - publisher={Elsevier} -} - -@inproceedings{bolot2013private, - title={Private decayed predicate sums on streams}, - author={Bolot, Jean and Fawaz, Nadia and Muthukrishnan, S and Nikolov, Aleksandar and Taft, Nina}, - booktitle={Proceedings of the 16th International Conference on Database Theory}, - pages={284--295}, - year={2013}, - organization={ACM} -} - -@inproceedings{erdogdu2015privacy, - title={Privacy-utility trade-off under continual observation}, - author={Erdogdu, Murat A and Fawaz, Nadia}, - booktitle={ISIT}, - pages={1801--1805}, - year={2015} -} - -@article{shmueli2015privacy, - title={Privacy by diversity in sequential releases of databases}, - author={Shmueli, Erez and Tassa, Tamir}, - journal={Information Sciences}, - volume={298}, - pages={344--372}, - year={2015}, - publisher={Elsevier} -} - -@article{li2016hybrid, - title={A hybrid approach to prevent composition attacks for independent data releases}, - author={Li, Jiuyong and Baig, Muzammil M and Sattar, AHM Sarowar and Ding, Xiaofeng and Liu, Jixue and Vincent, Millist W}, - journal={Information Sciences}, - volume={367}, - pages={324--336}, - year={2016}, - publisher={Elsevier} -} - -@inproceedings{quoc2017privapprox, - title={PrivApprox: privacy-preserving stream analytics}, - author={Quoc, Do Le and Beck, Martin and Bhatotia, Pramod and Chen, Ruichuan and Fetzer, Christof and Strufe, Thorsten}, - booktitle={Proceedings of the 2017 USENIX Conference on Usenix Annual Technical Conference}, - pages={659--672}, - year={2017}, - organization={USENIX Association} -} - -@inproceedings{wang2017privacy, - title={Privacy Preserving Anonymity for Periodical SRS Data Publishing}, - author={Wang, Jie-Teng and Lin, Wen-Yang}, - booktitle={Data Engineering (ICDE), 2017 IEEE 33rd International Conference on}, - pages={1344--1355}, - year={2017}, - organization={IEEE} +@inproceedings{abul2008never, + title = {Never Walk Alone: Uncertainty for Anonymity in Moving Objects Databases.}, + author = {Abul, Osman and Bonchi, Francesco and Nanni, Mirco and others}, + booktitle = {ICDE}, + volume = {8}, + pages = {376--385}, + year = {2008} +} + +@article{acharya2019context, + title = {Context-Aware Local Differential Privacy}, + author = {Acharya, Jayadev and Bonawitz, Keith and Kairouz, Peter and Ramage, Daniel and Sun, Ziteng}, + journal = {arXiv preprint arXiv:1911.00038}, + year = {2019} +} + +@book{adler2010geometry, + title = {The geometry of random fields}, + author = {Adler, Robert J}, + year = {2010}, + publisher = {SIAM} +} + +@misc{ahmed2017mobile, + title = {Mobile edge computing: opportunities, solutions, and challenges}, + author = {Ahmed, Ejaz and Rehmani, Mubashir Husain}, + year = {2017}, + publisher = {Elsevier} } @article{al2018adaptive, - title={An adaptive geo-indistinguishability mechanism for continuous LBS queries}, - author={Al-Dhubhani, Raed and Cazalas, Jonathan M}, - journal={Wireless Networks}, - volume={24}, - number={8}, - pages={3221--3239}, - year={2018}, - publisher={Springer} + title = {An adaptive geo-indistinguishability mechanism for continuous LBS queries}, + author = {Al-Dhubhani, Raed and Cazalas, Jonathan M}, + journal = {Wireless Networks}, + volume = {24}, + number = {8}, + pages = {3221--3239}, + year = {2018}, + publisher = {Springer} } -@inproceedings{kellaris2013practical, - title={Practical differential privacy via grouping and smoothing}, - author={Kellaris, Georgios and Papadopoulos, Stavros}, - booktitle={Proceedings of the VLDB Endowment}, - volume={6}, - number={5}, - pages={301--312}, - year={2013}, - organization={VLDB Endowment} +@book{allan2013probability, + title = {Probability: a graduate course}, + author = {Allan Gut}, + volume = {75}, + year = {2013}, + publisher = {Springer Science \& Business Media} } -@article{kellaris2014differentially, - title={Differentially private event sequences over infinite streams}, - author={Kellaris, Georgios and Papadopoulos, Stavros and Xiao, Xiaokui and Papadias, Dimitris}, - journal={Proceedings of the VLDB Endowment}, - volume={7}, - number={12}, - pages={1155--1166}, - year={2014}, - publisher={VLDB Endowment} +@inproceedings{andres2013geo, + title = {Geo-indistinguishability: Differential privacy for location-based systems}, + author = {Andr{\'e}s, Miguel E and Bordenabe, Nicol{\'a}s E and Chatzikokolakis, Konstantinos and Palamidessi, Catuscia}, + booktitle = {Proceedings of the 2013 ACM SIGSAC conference on Computer \& communications security}, + pages = {901--914}, + year = {2013}, + organization = {ACM} } -@inproceedings{zhou2009continuous, - title={Continuous privacy preserving publishing of data streams}, - author={Zhou, Bin and Han, Yi and Pei, Jian and Jiang, Bin and Tao, Yufei and Jia, Yan}, - booktitle={Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology}, - pages={648--659}, - year={2009}, - organization={ACM} +@article{anselin1995local, + title = {Local indicators of spatial association—LISA}, + author = {Anselin, Luc}, + journal = {Geographical analysis}, + volume = {27}, + number = {2}, + pages = {93--115}, + year = {1995}, + publisher = {Wiley Online Library} } -@inproceedings{gotz2012maskit, - title={Maskit: Privately releasing user context streams for personalized mobile applications}, - author={G{\"o}tz, Michaela and Nath, Suman and Gehrke, Johannes}, - booktitle={Proceedings of the 2012 ACM SIGMOD International Conference on Management of Data}, - pages={289--300}, - year={2012}, - organization={ACM} +@book{applebaum2009levy, + title = {L{\'e}vy processes and stochastic calculus}, + author = {Applebaum, David}, + year = {2009}, + publisher = {Cambridge university press} } -@inproceedings{fan2013differentially, - title={Differentially private multi-dimensional time series release for traffic monitoring}, - author={Fan, Liyue and Xiong, Li and Sunderam, Vaidy}, - booktitle={IFIP Annual Conference on Data and Applications Security and Privacy}, - pages={33--48}, - year={2013}, - organization={Springer} +@article{ardagna2007location, + title = {Location privacy protection through obfuscation-based techniques}, + author = {Ardagna, Claudio and Cremonini, Marco and Damiani, Ernesto and De Capitani di Vimercati, S and Samarati, Pierangela}, + journal = {Data and Applications Security XXI}, + pages = {47--60}, + year = {2007}, + publisher = {Springer} } -@inproceedings{primault2015time, - title={Time distortion anonymization for the publication of mobility data with high utility}, - author={Primault, Vincent and Mokhtar, Sonia Ben and Lauradoux, C{\'e}dric and Brunie, Lionel}, - booktitle={Trustcom/BigDataSE/ISPA, 2015 IEEE}, - volume={1}, - pages={539--546}, - year={2015}, - organization={IEEE} +@inproceedings{babcock2002sampling, + title = {Sampling from a moving window over streaming data}, + author = {Babcock, Brian and Datar, Mayur and Motwani, Rajeev}, + booktitle = {Proceedings of the thirteenth annual ACM-SIAM symposium on Discrete algorithms}, + pages = {633--634}, + year = {2002}, + organization = {Society for Industrial and Applied Mathematics} } -@inproceedings{dwork2010differential, - title={Differential privacy under continual observation}, - author={Dwork, Cynthia and Naor, Moni and Pitassi, Toniann and Rothblum, Guy N}, - booktitle={Proceedings of the forty-second ACM symposium on Theory of computing}, - pages={715--724}, - year={2010}, - organization={ACM} +@article{baum1966statistical, + title = {Statistical inference for probabilistic functions of finite state Markov chains}, + author = {Baum, Leonard E and Petrie, Ted}, + journal = {The annals of mathematical statistics}, + volume = {37}, + number = {6}, + pages = {1554--1563}, + year = {1966}, + publisher = {JSTOR} } -@inproceedings{cao2015differentially, - title={Differentially private real-time data release over infinite trajectory streams}, - author={Cao, Yang and Yoshikawa, Masatoshi}, - booktitle={Mobile Data Management (MDM), 2015 16th IEEE International Conference on}, - volume={2}, - pages={68--73}, - year={2015}, - organization={IEEE} +@inproceedings{bayardo2005data, + title = {Data privacy through optimal k-anonymization}, + author = {Bayardo, Roberto J and Agrawal, Rakesh}, + booktitle = {Data Engineering, 2005. ICDE 2005. Proceedings. 21st International Conference on}, + pages = {217--228}, + year = {2005}, + organization = {IEEE} } -@inproceedings{wang2016rescuedp, - title={RescueDP: Real-time spatio-temporal crowd-sourced data publishing with differential privacy}, - author={Wang, Qian and Zhang, Yan and Lu, Xiao and Wang, Zhibo and Qin, Zhan and Ren, Kui}, - booktitle={Computer Communications, IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on}, - pages={1--9}, - year={2016}, - organization={IEEE} +@inproceedings{benaloh2009patient, + title = {Patient controlled encryption: ensuring privacy of electronic medical records}, + author = {Benaloh, Josh and Chase, Melissa and Horvitz, Eric and Lauter, Kristin}, + booktitle = {Proceedings of the 2009 ACM workshop on Cloud computing security}, + pages = {103--114}, + year = {2009}, + organization = {ACM} } -@article{silva2013data, - title={Data stream clustering: A survey}, - author={Silva, Jonathan A and Faria, Elaine R and Barros, Rodrigo C and Hruschka, Eduardo R and De Carvalho, Andre CPLF and Gama, Jo{\~a}o}, - journal={ACM Computing Surveys (CSUR)}, - volume={46}, - number={1}, - pages={13}, - year={2013}, - publisher={ACM} +@article{beresford2003location, + title = {Location privacy in pervasive computing}, + author = {Beresford, Alastair R and Stajano, Frank}, + journal = {IEEE Pervasive computing}, + volume = {2}, + number = {1}, + pages = {46--55}, + year = {2003}, + publisher = {IEEE} } -@incollection{gama2007data, - title={Data stream processing}, - author={Gama, Jo{\~a}o and Rodrigues, Pedro Pereira}, - booktitle={Learning from Data Streams}, - pages={25--39}, - year={2007}, - publisher={Springer} +@article{birant2007st, + title = {ST-DBSCAN: An algorithm for clustering spatial--temporal data}, + author = {Birant, Derya and Kut, Alp}, + journal = {Data \& knowledge engineering}, + volume = {60}, + number = {1}, + pages = {208--221}, + year = {2007}, + publisher = {Elsevier} } -@article{gruteser2004protecting, - title={Protecting privacy, in continuous location-tracking applications}, - author={Gruteser, Marco and Liu, Xuan}, - journal={IEEE Security \& Privacy}, - volume={2}, - number={2}, - pages={28--34}, - year={2004}, - publisher={IEEE} -} - -@inproceedings{hua2015differentially, - title={Differentially private publication of general time-serial trajectory data}, - author={Hua, Jingyu and Gao, Yue and Zhong, Sheng}, - booktitle={Computer Communications (INFOCOM), 2015 IEEE Conference on}, - pages={549--557}, - year={2015}, - organization={IEEE} -} - -@article{li2017achieving, - title={Achieving differential privacy of trajectory data publishing in participatory sensing}, - author={Li, Meng and Zhu, Liehuang and Zhang, Zijian and Xu, Rixin}, - journal={Information Sciences}, - volume={400}, - pages={1--13}, - year={2017}, - publisher={Elsevier} -} - -@article{zhu2017answering, - title={Answering differentially private queries for continual data sets release}, - author={Zhu, Tianqing and Li, Gang and Xiong, Ping and Zhou, Wanlei}, - journal={Future Generation Computer Systems}, - year={2017}, - publisher={Elsevier} -} - -@article{chen2011differentially, - title={Differentially private trajectory data publication}, - author={Chen, Rui and Fung, Benjamin and Desai, Bipin C}, - journal={arXiv preprint arXiv:1112.2020}, - year={2011} -} - -@inproceedings{chen2012differentially, - title={Differentially private sequential data publication via variable-length n-grams}, - author={Chen, Rui and Acs, Gergely and Castelluccia, Claude}, - booktitle={Proceedings of the 2012 ACM conference on Computer and communications security}, - pages={638--649}, - year={2012}, - organization={ACM} -} - -@inproceedings{jiang2013publishing, - title={Publishing trajectories with differential privacy guarantees}, - author={Jiang, Kaifeng and Shao, Dongxu and Bressan, St{\'e}phane and Kister, Thomas and Tan, Kian-Lee}, - booktitle={Proceedings of the 25th International Conference on Scientific and Statistical Database Management}, - pages={12}, - year={2013}, - organization={ACM} -} - -@misc{gualtieri2016perishable, - author={Mike Gualtieri, Rowan Curran, Holger Kisker and Emily Miller}, - title={Perishable Insights -- Stop Wasting Money On Unactionable Analytics}, - organization={Forrester}, - year={2016} -} - -@article{chen2014correlated, - title={Correlated network data publication via differential privacy}, - author={Chen, Rui and Fung, Benjamin C and Yu, Philip S and Desai, Bipin C}, - journal={The VLDB Journal—The International Journal on Very Large Data Bases}, - volume={23}, - number={4}, - pages={653--676}, - year={2014}, - publisher={Springer-Verlag New York, Inc.} -} - -@article{zhu2015correlated, - title={Correlated differential privacy: hiding information in non-IID data set}, - author={Zhu, Tianqing and Xiong, Ping and Li, Gang and Zhou, Wanlei}, - journal={IEEE Transactions on Information Forensics and Security}, - volume={10}, - number={2}, - pages={229--242}, - year={2015}, - publisher={IEEE} -} - -@inproceedings{liu2016dependence, - title={Dependence Makes You Vulnerable: Differential Privacy Under Dependent Tuples}, - author={Liu, Changchang and Chakraborty, Supriyo and Mittal, Prateek}, - booktitle={NDSS}, - volume={16}, - pages={21--24}, - year={2016} -} - - -@inproceedings{cao2017quantifying, - title={Quantifying differential privacy under temporal correlations}, - author={Cao, Yang and Yoshikawa, Masatoshi and Xiao, Yonghui and Xiong, Li}, - booktitle={Data Engineering (ICDE), 2017 IEEE 33rd International Conference on}, - pages={821--832}, - year={2017}, - organization={IEEE} -} - -@inproceedings{song2017pufferfish, - title={Pufferfish privacy mechanisms for correlated data}, - author={Song, Shuang and Wang, Yizhen and Chaudhuri, Kamalika}, - booktitle={Proceedings of the 2017 ACM International Conference on Management of Data}, - pages={1291--1306}, - year={2017}, - organization={ACM} -} - -@inproceedings{xiao2015protecting, - title={Protecting locations with differential privacy under temporal correlations}, - author={Xiao, Yonghui and Xiong, Li}, - booktitle={Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security}, - pages={1298--1309}, - year={2015}, - organization={ACM} -} - -@inproceedings{yang2015bayesian, - title={Bayesian differential privacy on correlated data}, - author={Yang, Bin and Sato, Issei and Nakagawa, Hiroshi}, - booktitle={Proceedings of the 2015 ACM SIGMOD international conference on Management of Data}, - pages={747--762}, - year={2015}, - organization={ACM} -} - -@inproceedings{li2007hiding, - title={Hiding in the crowd: Privacy preservation on evolving streams through correlation tracking}, - author={Li, Feifei and Sun, Jimeng and Papadimitriou, Spiros and Mihaila, George A and Stanoi, Ioana}, - booktitle={Data Engineering, 2007. ICDE 2007. IEEE 23rd International Conference on}, - pages={686--695}, - year={2007}, - organization={IEEE} -} - -@article{xiao2017loclok, - title={LocLok: location cloaking with differential privacy via hidden markov model}, - author={Xiao, Yonghui and Xiong, Li and Zhang, Si and Cao, Yang}, - journal={Proceedings of the VLDB Endowment}, - volume={10}, - number={12}, - pages={1901--1904}, - year={2017}, - publisher={VLDB Endowment} -} - -@article{ma2017plp, - title={PLP: Protecting location privacy against correlation analyze Attack in crowdsensing}, - author={Ma, Qiang and Zhang, Shanfeng and Zhu, Tong and Liu, Kebin and Zhang, Lan and He, Wenbo and Liu, Yunhao}, - journal={IEEE transactions on mobile computing}, - volume={16}, - number={9}, - pages={2588--2598}, - year={2017}, - publisher={IEEE} -} - -@inproceedings{ghinita2009preventing, - title={Preventing velocity-based linkage attacks in location-aware applications}, - author={Ghinita, Gabriel and Damiani, Maria Luisa and Silvestri, Claudio and Bertino, Elisa}, - booktitle={Proceedings of the 17th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems}, - pages={246--255}, - year={2009}, - organization={ACM} -} - -@article{wang2017cts, - title={CTS-DP: publishing correlated time-series data via differential privacy}, - author={Wang, Hao and Xu, Zhengquan}, - journal={Knowledge-Based Systems}, - volume={122}, - pages={167--179}, - year={2017}, - publisher={Elsevier} -} - -@article{fan2014adaptive, - title={An adaptive approach to real-time aggregate monitoring with differential privacy}, - author={Fan, Liyue and Xiong, Li}, - journal={IEEE Transactions on Knowledge and Data Engineering}, - volume={26}, - number={9}, - pages={2094--2106}, - year={2014}, - publisher={IEEE} -} - -@article{kifer2014pufferfish, - title={Pufferfish: A framework for mathematical privacy definitions}, - author={Kifer, Daniel and Machanavajjhala, Ashwin}, - journal={ACM Transactions on Database Systems (TODS)}, - volume={39}, - number={1}, - pages={3}, - year={2014}, - publisher={ACM} -} - -@inproceedings{katsomallos2014easyharvest, - title={EasyHarvest: Supporting the deployment and management of sensing applications on smartphones}, - author={Katsomallos, Manos and Lalis, Spyros}, - booktitle={Pervasive Computing and Communications Workshops (PERCOM Workshops), 2014 IEEE International Conference on}, - pages={80--85}, - year={2014}, - organization={IEEE} -} - -@inproceedings{katsomallos2017open, - title={An open framework for flexible plug-in privacy mechanisms in crowdsensing applications}, - author={Katsomallos, Manos and Lalis, Spyros and Papaioannou, Thanasis and Theodorakopoulos, George}, - booktitle={Pervasive Computing and Communications Workshops (PerCom Workshops), 2017 IEEE International Conference on}, - pages={237--242}, - year={2017}, - organization={IEEE} -} - -@inproceedings{chen2017pegasus, - title={PeGaSus: Data-Adaptive Differentially Private Stream Processing}, - author={Chen, Yan and Machanavajjhala, Ashwin and Hay, Michael and Miklau, Gerome}, - booktitle={Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security}, - pages={1375--1388}, - year={2017}, - organization={ACM} -} - -@inproceedings{kifer2009attacks, - title={Attacks on privacy and deFinetti's theorem}, - author={Kifer, Daniel}, - booktitle={Proceedings of the 2009 ACM SIGMOD International Conference on Management of data}, - pages={127--138}, - year={2009}, - organization={ACM} -} - -@inproceedings{wong2007minimality, - title={Minimality attack in privacy preserving data publishing}, - author={Wong, Raymond Chi-Wing and Fu, Ada Wai-Chee and Wang, Ke and Pei, Jian}, - booktitle={Proceedings of the 33rd international conference on Very large data bases}, - pages={543--554}, - year={2007}, - organization={VLDB Endowment} -} - -@inproceedings{simi2017extensive, - title={An extensive study on data anonymization algorithms based on k-anonymity}, - author={Simi, Ms MS and Nayaki, Mrs K Sankara and Elayidom, M Sudheep}, - booktitle={IOP Conference Series: Materials Science and Engineering}, - volume={225}, - number={1}, - pages={012279}, - year={2017}, - organization={IOP Publishing} -} - -@article{zhou2008brief, - title={A brief survey on anonymization techniques for privacy preserving publishing of social network data}, - author={Zhou, Bin and Pei, Jian and Luk, WoShun}, - journal={ACM Sigkdd Explorations Newsletter}, - volume={10}, - number={2}, - pages={12--22}, - year={2008}, - publisher={ACM} -} - -@inproceedings{wang2009survey, - title={A survey on privacy preserving data mining}, - author={Wang, Jian and Luo, Yongcheng and Zhao, Yan and Le, Jiajin}, - booktitle={Database Technology and Applications, 2009 First International Workshop on}, - pages={111--114}, - year={2009}, - organization={IEEE} -} - -@article{jain2016big, - title={Big data privacy: a technological perspective and review}, - author={Jain, Priyank and Gyanchandani, Manasi and Khare, Nilay}, - journal={Journal of Big Data}, - volume={3}, - number={1}, - pages={25}, - year={2016}, - publisher={Springer} -} - -@inproceedings{narayanan2008robust, - title={Robust de-anonymization of large sparse data sets}, - author={Narayanan, Arvind and Shmatikov, Vitaly}, - booktitle={Security and Privacy, 2008. SP 2008. IEEE Symposium on}, - pages={111--125}, - year={2008}, - organization={IEEE} -} - -@inproceedings{erlingsson2014rappor, - title={Rappor: Randomized aggregatable privacy-preserving ordinal response}, - author={Erlingsson, {\'U}lfar and Pihur, Vasyl and Korolova, Aleksandra}, - booktitle={Proceedings of the 2014 ACM SIGSAC conference on computer and communications security}, - pages={1054--1067}, - year={2014}, - organization={ACM} -} - -@inproceedings{perera2014mosden, - title={Mosden: An internet of things middleware for resource constrained mobile devices}, - author={Perera, Charith and Jayaraman, Prem Prakash and Zaslavsky, Arkady and Christen, Peter and Georgakopoulos, Dimitrios}, - booktitle={2014 47th Hawaii International Conference on System Sciences}, - pages={1053--1062}, - year={2014}, - organization={IEEE} -} - -@inproceedings{ye2012meca, - title={Meca: mobile edge capture and analysis middleware for social sensing applications}, - author={Ye, Fan and Ganti, Raghu and Dimaghani, Raheleh and Grueneberg, Keith and Calo, Seraphin}, - booktitle={Proceedings of the 21st International Conference on World Wide Web}, - pages={699--702}, - year={2012}, - organization={ACM} -} - -@inproceedings{zhao2017dependent, - title={Dependent Differential Privacy for Correlated Data}, - author={Zhao, Jun and Zhang, Junshan and Poor, H Vincent}, - booktitle={Globecom Workshops (GC Wkshps), 2017 IEEE}, - pages={1--7}, - year={2017}, - organization={IEEE} -} - -@inproceedings{efthymiou2015big, - title={Big data entity resolution: From highly to somehow similar entity descriptions in the Web}, - author={Efthymiou, Vasilis and Stefanidis, Kostas and Christophides, Vassilis}, - booktitle={2015 IEEE International Conference on Big Data (Big Data)}, - pages={401--410}, - year={2015}, - organization={IEEE} +@inproceedings{bittau2017prochlo, + title = {Prochlo: Strong privacy for analytics in the crowd}, + author = {Bittau, Andrea and Erlingsson, {\'U}lfar and Maniatis, Petros and Mironov, Ilya and Raghunathan, Ananth and Lie, David and Rudominer, Mitch and Kode, Ushasree and Tinnes, Julien and Seefeld, Bernhard}, + booktitle = {Proceedings of the 26th Symposium on Operating Systems Principles}, + pages = {441--459}, + year = {2017}, + organization = {ACM} } @inproceedings{blocki2013differentially, - title={Differentially private data analysis of social networks via restricted sensitivity}, - author={Blocki, Jeremiah and Blum, Avrim and Datta, Anupam and Sheffet, Or}, - booktitle={Proceedings of the 4th conference on Innovations in Theoretical Computer Science}, - pages={87--96}, - year={2013}, - organization={ACM} + title = {Differentially private data analysis of social networks via restricted sensitivity}, + author = {Blocki, Jeremiah and Blum, Avrim and Datta, Anupam and Sheffet, Or}, + booktitle = {Proceedings of the 4th conference on Innovations in Theoretical Computer Science}, + pages = {87--96}, + year = {2013}, + organization = {ACM} +} + +@article{bloom1970space, + title = {Space/time trade-offs in hash coding with allowable errors}, + author = {Bloom, Burton H}, + journal = {Communications of the ACM}, + volume = {13}, + number = {7}, + pages = {422--426}, + year = {1970}, + publisher = {ACM} +} + +@inproceedings{bolot2013private, + title = {Private decayed predicate sums on streams}, + author = {Bolot, Jean and Fawaz, Nadia and Muthukrishnan, S and Nikolov, Aleksandar and Taft, Nina}, + booktitle = {Proceedings of the 16th International Conference on Database Theory}, + pages = {284--295}, + year = {2013}, + organization = {ACM} +} + +@inproceedings{braverman2009optimal, + title = {Optimal sampling from sliding windows}, + author = {Braverman, Vladimir and Ostrovsky, Rafail and Zaniolo, Carlo}, + booktitle = {Proceedings of the twenty-eighth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems}, + pages = {147--156}, + year = {2009} +} + +@inproceedings{cao2013efficient, + title = {Efficient and accurate strategies for differentially-private sliding window queries}, + author = {Cao, Jianneng and Xiao, Qian and Ghinita, Gabriel and Li, Ninghui and Bertino, Elisa and Tan, Kian-Lee}, + booktitle = {Proceedings of the 16th International Conference on Extending Database Technology}, + pages = {191--202}, + year = {2013} +} + +@article{cao2014privacy, + title = {Privacy-preserving multi-keyword ranked search over encrypted cloud data}, + author = {Cao, Ning and Wang, Cong and Li, Ming and Ren, Kui and Lou, Wenjing}, + journal = {IEEE Transactions on parallel and distributed systems}, + volume = {25}, + number = {1}, + pages = {222--233}, + year = {2014}, + publisher = {IEEE} +} + +@inproceedings{cao2015differentially, + title = {Differentially private real-time data release over infinite trajectory streams}, + author = {Cao, Yang and Yoshikawa, Masatoshi}, + booktitle = {Mobile Data Management (MDM), 2015 16th IEEE International Conference on}, + volume = {2}, + pages = {68--73}, + year = {2015}, + organization = {IEEE} +} + +@inproceedings{cao2017quantifying, + title = {Quantifying differential privacy under temporal correlations}, + author = {Cao, Yang and Yoshikawa, Masatoshi and Xiao, Yonghui and Xiong, Li}, + booktitle = {Data Engineering (ICDE), 2017 IEEE 33rd International Conference on}, + pages = {821--832}, + year = {2017}, + organization = {IEEE} +} + +@article{cao2018quantifying, + title = {Quantifying differential privacy in continuous data release under temporal correlations}, + author = {Cao, Yang and Yoshikawa, Masatoshi and Xiao, Yonghui and Xiong, Li}, + journal = {IEEE Transactions on Knowledge and Data Engineering}, + volume = {31}, + number = {7}, + pages = {1281--1295}, + year = {2018}, + publisher = {IEEE} +} + +@inproceedings{chakraborty2014ipshield, + title = {ipShield: a framework for enforcing context-aware privacy}, + author = {Chakraborty, Supriyo and Shen, Chenguang and Raghavan, Kasturi Rangan and Shoukry, Yasser and Millar, Matt and Srivastava, Mani}, + booktitle = {11th $\{$USENIX$\}$ Symposium on Networked Systems Design and Implementation ($\{$NSDI$\}$ 14)}, + pages = {143--156}, + year = {2014} +} + +@misc{chambers2016personal, + title = {Personal Data: The New ``Oil'' of The Digital Economy}, + author = {\c{T}uca Zb\^{a}rcea \& Asocia\c{t}ii}, + year = {2016}, + publisher = {Chambers and Partners}, + howpublished = {\url{https://www.chambersandpartners.com/article/713/personal-data-the-new-oil-of-the-digital-economy}}, + note = {Accessed: December 1, 2019} +} + +@article{chan2011private, + title = {Private and continual release of statistics}, + author = {Chan, T-H Hubert and Shi, Elaine and Song, Dawn}, + journal = {ACM Transactions on Information and System Security (TISSEC)}, + volume = {14}, + number = {3}, + pages = {26}, + year = {2011}, + publisher = {ACM} +} + +@article{chan201397, + title = {97.49 on markov chains}, + author = {Chan, KC and Lenard, CT and Mills, TM}, + journal = {The Mathematical Gazette}, + volume = {97}, + number = {540}, + pages = {515--520}, + year = {2013}, + publisher = {Cambridge University Press} +} + +@misc{channelfour2018data, + title = {Data, Democracy and Dirty Tricks}, + publisher = {Channel 4}, + year = {2018}, + howpublished = {\url{https://www.channel4.com/news/data-democracy-and-dirty-tricks-cambridge-analytica-uncovered-investigation-expose}}, + note = {Accessed: December 1, 2019} +} + +@inproceedings{chatzikokolakis2015geo, + title = {Geo-indistinguishability: A principled approach to location privacy}, + author = {Chatzikokolakis, Konstantinos and Palamidessi, Catuscia and Stronati, Marco}, + booktitle = {International Conference on Distributed Computing and Internet Technology}, + pages = {49--72}, + year = {2015}, + organization = {Springer} +} + +@article{chatzikokolakis2017methods, + title = {Methods for Location Privacy: A comparative overview}, + author = {Chatzikokolakis, Kostantinos and ElSalamouny, Ehab and Palamidessi, Catuscia and Anna, Pazii and others}, + journal = {Foundations and Trends{\textregistered} in Privacy and Security}, + volume = {1}, + number = {4}, + pages = {199--257}, + year = {2017}, + publisher = {Now Publishers, Inc.} +} + +@article{chen2011differentially, + title = {Differentially private trajectory data publication}, + author = {Chen, Rui and Fung, Benjamin and Desai, Bipin C}, + journal = {arXiv preprint arXiv:1112.2020}, + year = {2011} +} + +@inproceedings{chen2012differentially, + title = {Differentially private sequential data publication via variable-length n-grams}, + author = {Chen, Rui and Acs, Gergely and Castelluccia, Claude}, + booktitle = {Proceedings of the 2012 ACM conference on Computer and communications security}, + pages = {638--649}, + year = {2012}, + organization = {ACM} +} + +@article{chen2014correlated, + title = {Correlated network data publication via differential privacy}, + author = {Chen, Rui and Fung, Benjamin C and Yu, Philip S and Desai, Bipin C}, + journal = {The VLDB Journal-The International Journal on Very Large Data Bases}, + volume = {23}, + number = {4}, + pages = {653--676}, + year = {2014}, + publisher = {Springer-Verlag New York, Inc.} +} + +@inproceedings{chen2017pegasus, + title = {PeGaSus: Data-Adaptive Differentially Private Stream Processing}, + author = {Chen, Yan and Machanavajjhala, Ashwin and Hay, Michael and Miklau, Gerome}, + booktitle = {Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security}, + pages = {1375--1388}, + year = {2017}, + organization = {ACM} +} + +@article{chow2011trajectory, + title = {Trajectory privacy in location-based services and data publication}, + author = {Chow, Chi-Yin and Mokbel, Mohamed F}, + journal = {ACM Sigkdd Explorations Newsletter}, + volume = {13}, + number = {1}, + pages = {19--29}, + year = {2011}, + publisher = {ACM} +} + +@article{christin2011survey, + title = {A survey on privacy in mobile participatory sensing applications}, + author = {Christin, Delphine and Reinhardt, Andreas and Kanhere, Salil S and Hollick, Matthias}, + journal = {Journal of systems and software}, + volume = {84}, + number = {11}, + pages = {1928--1946}, + year = {2011}, + publisher = {Elsevier} +} + +@inproceedings{cormode2003finding, + title = {Finding hierarchical heavy hitters in data streams}, + author = {Cormode, Graham and Korn, Flip and Muthukrishnan, Shanmugavelayutham and Srivastava, Divesh}, + booktitle = {Proceedings 2003 VLDB Conference}, + pages = {464--475}, + year = {2003}, + organization = {Elsevier} +} + +@article{cortes2001signature, + title = {Signature-based methods for data streams}, + author = {Cortes, Corinna and Pregibon, Daryl}, + journal = {Data Mining and Knowledge Discovery}, + volume = {5}, + number = {3}, + pages = {167--182}, + year = {2001}, + publisher = {Springer} +} + +@article{croxton1939applied, + title = {Applied general statistics}, + author = {Croxton, Frederick E and Cowden, Dudley J}, + year = {1939}, + publisher = {Prentice-Hall, Inc} +} + +@book{daley2007introduction, + title = {An introduction to the theory of point processes: volume II: general theory and structure}, + author = {Daley, Daryl J and Vere-Jones, David}, + year = {2007}, + publisher = {Springer Science \& Business Media} +} + +@article{datar2002maintaining, + title = {Maintaining stream statistics over sliding windows}, + author = {Datar, Mayur and Gionis, Aristides and Indyk, Piotr and Motwani, Rajeev}, + journal = {SIAM journal on computing}, + volume = {31}, + number = {6}, + pages = {1794--1813}, + year = {2002}, + publisher = {SIAM} +} + +@article{de2013unique, + title = {Unique in the crowd: The privacy bounds of human mobility}, + author = {De Montjoye, Yves-Alexandre and Hidalgo, C{\'e}sar A and Verleysen, Michel and Blondel, Vincent D}, + journal = {Scientific reports}, + volume = {3}, + pages = {1376}, + year = {2013}, + publisher = {Nature Publishing Group} +} + +@article{douglas1973algorithms, + title = {Algorithms for the reduction of the number of points required to represent a digitized line or its caricature}, + author = {Douglas, David H and Peucker, Thomas K}, + journal = {Cartographica: the international journal for geographic information and geovisualization}, + volume = {10}, + number = {2}, + pages = {112--122}, + year = {1973}, + publisher = {University of Toronto Press} +} + +@inproceedings{durr2011position, + title = {Position sharing for location privacy in non-trusted systems}, + author = {D{\"u}rr, Frank and Skvortsov, Pavel and Rothermel, Kurt}, + booktitle = {Pervasive Computing and Communications (PerCom), 2011 IEEE International Conference on}, + pages = {189--196}, + year = {2011}, + organization = {IEEE} +} + +@inproceedings{dwork2006calibrating, + title = {Calibrating noise to sensitivity in private data analysis}, + author = {Dwork, Cynthia and McSherry, Frank and Nissim, Kobbi and Smith, Adam}, + booktitle = {Theory of cryptography conference}, + pages = {265--284}, + year = {2006}, + organization = {Springer} +} + +@inproceedings{dwork2008differential, + title = {Differential privacy: A survey of results}, + author = {Dwork, Cynthia}, + booktitle = {International Conference on Theory and Applications of Models of Computation}, + pages = {1--19}, + year = {2008}, + organization = {Springer} +} + +@inproceedings{dwork2010differential, + title = {Differential privacy under continual observation}, + author = {Dwork, Cynthia and Naor, Moni and Pitassi, Toniann and Rothblum, Guy N}, + booktitle = {Proceedings of the forty-second ACM symposium on Theory of computing}, + pages = {715--724}, + year = {2010}, + organization = {ACM} +} + +@inproceedings{dwork2010pan, + title = {Pan-Private Streaming Algorithms.}, + author = {Dwork, Cynthia and Naor, Moni and Pitassi, Toniann and Rothblum, Guy N and Yekhanin, Sergey}, + booktitle = {ICS}, + pages = {66--80}, + year = {2010} +} + +@article{dwork2011firm, + title = {A firm foundation for private data analysis}, + author = {Dwork, Cynthia}, + journal = {Communications of the ACM}, + volume = {54}, + number = {1}, + pages = {86--95}, + year = {2011}, + publisher = {ACM} +} + +@article{dwork2014algorithmic, + title = {The algorithmic foundations of differential privacy}, + author = {Dwork, Cynthia and Roth, Aaron and others}, + journal = {Foundations and Trends{\textregistered} in Theoretical Computer Science}, + volume = {9}, + number = {3--4}, + pages = {211--407}, + year = {2014}, + publisher = {Now Publishers, Inc.} +} + +@misc{economist2016data, + title = {The world's most valuable resource is no longer oil, but data}, + publisher = {The Economist}, + year = {2016}, + howpublished = {\url{https://www.economist.com/leaders/2017/05/06/the-worlds-most-valuable-resource-is-no-longer-oil-but-data}}, + note = {Accessed: December 1, 2019} +} + +@inproceedings{efthymiou2015big, + title = {Big data entity resolution: From highly to somehow similar entity descriptions in the Web}, + author = {Efthymiou, Vasilis and Stefanidis, Kostas and Christophides, Vassilis}, + booktitle = {2015 IEEE International Conference on Big Data (Big Data)}, + pages = {401--410}, + year = {2015}, + organization = {IEEE} +} + +@inproceedings{eiter2017spatial, + title = {Spatial ontology-mediated query answering over mobility streams}, + author = {Eiter, Thomas and Parreira, Josiane Xavier and Schneider, Patrik}, + booktitle = {European Semantic Web Conference}, + pages = {219--237}, + year = {2017}, + organization = {Springer} +} + +@inproceedings{erdogdu2015privacy, + title = {Privacy-utility trade-off under continual observation}, + author = {Erdogdu, Murat A and Fawaz, Nadia}, + booktitle = {ISIT}, + pages = {1801--1805}, + year = {2015} +} + +@inproceedings{erlingsson2014rappor, + title = {Rappor: Randomized aggregatable privacy-preserving ordinal response}, + author = {Erlingsson, {\'U}lfar and Pihur, Vasyl and Korolova, Aleksandra}, + booktitle = {Proceedings of the 2014 ACM SIGSAC conference on computer and communications security}, + pages = {1054--1067}, + year = {2014}, + organization = {ACM} +} + +@online{experian, + title = {Experian}, + url = {https://www.experian.com}, + year = {Accessed: November 11, 2020} +} + +@online{facebook, + title = {Facebook}, + url = {https://www.facebook.com}, + year = {Accessed: November 11, 2020} +} + +@inproceedings{fan2013differentially, + title = {Differentially private multi-dimensional time series release for traffic monitoring}, + author = {Fan, Liyue and Xiong, Li and Sunderam, Vaidy}, + booktitle = {IFIP Annual Conference on Data and Applications Security and Privacy}, + pages = {33--48}, + year = {2013}, + organization = {Springer} +} + +@article{fan2014adaptive, + title = {An adaptive approach to real-time aggregate monitoring with differential privacy}, + author = {Fan, Liyue and Xiong, Li}, + journal = {IEEE Transactions on Knowledge and Data Engineering}, + volume = {26}, + number = {9}, + pages = {2094--2106}, + year = {2014}, + publisher = {IEEE} +} + +@inproceedings{farokhi2020temporally, + title = {Temporally Discounted Differential Privacy for Evolving Datasets on an Infinite Horizon}, + author = {Farokhi, Farhad}, + booktitle = {2020 ACM/IEEE 11th International Conference on Cyber-Physical Systems (ICCPS)}, + pages = {1--8}, + year = {2020}, + organization = {IEEE} +} + +@article{fiore2019privacy, + title = {Privacy of trajectory micro-data: a survey}, + author = {Fiore, Marco and Katsikouli, Panagiota and Zavou, Elli and Cunche, Mathieu and Fessant, Fran{\c{c}}oise and Hello, Dominique Le and Aivodji, Ulrich Matchi and Olivier, Baptiste and Quertier, Tony and Stanica, Razvan}, + journal = {arXiv preprint arXiv:1903.12211}, + year = {2019} +} + +@online{foursquare, + title = {Foursquare}, + url = {https://www.foursquare.com}, + year = {Accessed: November 11, 2020} +} + +@misc{franceschi-bicchierairussell2015redditor, + title = {Redditor cracks anonymous data trove to pinpoint Muslim cab drivers}, + author = {Franceschi-Bicchierai, Lorenzo}, + year = {2015}, + publisher = {Mashable}, + howpublished = {\url{https://mashable.com/2015/01/28/redditor-muslim-cab-drivers}}, + note = {Accessed: July 1, 2020} +} + +@book{fuller2009introduction, + title = {Introduction to statistical time series}, + author = {Fuller, Wayne A}, + volume = {428}, + year = {2009}, + publisher = {John Wiley \& Sons} +} + +@inproceedings{fung2008anonymity, + title = {Anonymity for continuous data publishing}, + author = {Fung, Benjamin and Wang, Ke and Fu, Ada Wai-Chee and Pei, Jian}, + booktitle = {Proceedings of the 11th international conference on Extending database technology: Advances in database technology}, + pages = {264--275}, + year = {2008}, + organization = {ACM} +} + +@book{gagniuc2017markov, + title = {Markov Chains: From Theory to Implementation and Experimentation}, + author = {Gagniuc, Paul A}, + year = {2017}, + publisher = {John Wiley \& Sons} +} + +@incollection{gama2007data, + title = {Data stream processing}, + author = {Gama, Jo{\~a}o and Rodrigues, Pedro Pereira}, + booktitle = {Learning from Data Streams}, + pages = {25--39}, + year = {2007}, + publisher = {Springer} +} + +@inproceedings{gambs2010show, + title = {Show me how you move and I will tell you who you are}, + author = {Gambs, S{\'e}bastien and Killijian, Marc-Olivier and del Prado Cortez, Miguel N{\'u}{\~n}ez}, + booktitle = {Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS}, + pages = {34--41}, + year = {2010} +} + +@inproceedings{ganta2008composition, + title = {Composition attacks and auxiliary information in data privacy}, + author = {Ganta, Srivatsava Ranjit and Kasiviswanathan, Shiva Prasad and Smith, Adam}, + booktitle = {Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining}, + pages = {265--273}, + year = {2008}, + organization = {ACM} +} + +@article{garcia2015edge, + title = {Edge-centric computing: Vision and challenges}, + author = {Garcia Lopez, Pedro and Montresor, Alberto and Epema, Dick and Datta, Anwitaman and Higashino, Teruo and Iamnitchi, Adriana and Barcellos, Marinho and Felber, Pascal and Riviere, Etienne}, + journal = {ACM SIGCOMM Computer Communication Review}, + volume = {45}, + number = {5}, + pages = {37--42}, + year = {2015}, + publisher = {ACM} +} + +@article{gedik2008protecting, + title = {Protecting location privacy with personalized k-anonymity: Architecture and algorithms}, + author = {Gedik, Bugra and Liu, Ling}, + journal = {IEEE Transactions on Mobile Computing}, + volume = {7}, + number = {1}, + pages = {1--18}, + year = {2008}, + publisher = {IEEE} +} + +@inproceedings{ghinita2008private, + title = {Private queries in location based services: anonymizers are not necessary}, + author = {Ghinita, Gabriel and Kalnis, Panos and Khoshgozaran, Ali and Shahabi, Cyrus and Tan, Kian-Lee}, + booktitle = {Proceedings of the 2008 ACM SIGMOD international conference on Management of data}, + pages = {121--132}, + year = {2008}, + organization = {ACM} +} + +@inproceedings{ghinita2009preventing, + title = {Preventing velocity-based linkage attacks in location-aware applications}, + author = {Ghinita, Gabriel and Damiani, Maria Luisa and Silvestri, Claudio and Bertino, Elisa}, + booktitle = {Proceedings of the 17th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems}, + pages = {246--255}, + year = {2009}, + organization = {ACM} +} + +@online{gmaps, + title = {Google Maps}, + url = {https://maps.google.com}, + year = {Accessed: November 11, 2020} +} + +@article{goldreich1998secure, + title = {Secure multi-party computation}, + author = {Goldreich, Oded}, + journal = {Manuscript. Preliminary version}, + volume = {78}, + year = {1998} +} + +@inproceedings{gotz2012maskit, + title = {Maskit: Privately releasing user context streams for personalized mobile applications}, + author = {G{\"o}tz, Michaela and Nath, Suman and Gehrke, Johannes}, + booktitle = {Proceedings of the 2012 ACM SIGMOD International Conference on Management of Data}, + pages = {289--300}, + year = {2012}, + organization = {ACM} +} + +@book{grunwald2007minimum, + title = {The minimum description length principle}, + author = {Gr{\"u}nwald, Peter D}, + year = {2007}, + publisher = {MIT press} +} + +@article{gruteser2004protecting, + title = {Protecting privacy, in continuous location-tracking applications}, + author = {Gruteser, Marco and Liu, Xuan}, + journal = {IEEE Security \& Privacy}, + volume = {2}, + number = {2}, + pages = {28--34}, + year = {2004}, + publisher = {IEEE} +} + +@misc{gualtieri2016perishable, + author = {Mike Gualtieri, Rowan Curran, Holger Kisker and Emily Miller}, + title = {Perishable Insights -- Stop Wasting Money On Unactionable Analytics}, + organization = {Forrester}, + year = {2016} +} + +@article{gursoy2018differentially, + title = {Differentially private and utility preserving publication of trajectory data}, + author = {Gursoy, Mehmet Emre and Liu, Ling and Truex, Stacey and Yu, Lei}, + journal = {IEEE Transactions on Mobile Computing}, + year = {2018}, + publisher = {IEEE} +} + +@incollection{haas2016data, + title = {Data-stream sampling: basic techniques and results}, + author = {Haas, Peter J}, + booktitle = {Data Stream Management}, + pages = {13--44}, + year = {2016}, + publisher = {Springer} +} + +@inproceedings{hariharan2004project, + title = {Project Lachesis: parsing and modeling location histories}, + author = {Hariharan, Ramaswamy and Toyama, Kentaro}, + booktitle = {International Conference on Geographic Information Science}, + pages = {106--124}, + year = {2004}, + organization = {Springer} +} + +@inproceedings{hazarika2001qualitative, + title = {Qualitative spatio-temporal continuity}, + author = {Hazarika, Shyamanta M and Cohn, Anthony G}, + booktitle = {International Conference on Spatial Information Theory}, + pages = {92--107}, + year = {2001}, + organization = {Springer} +} + +@article{he2011preventing, + title = {Preventing equivalence attacks in updated, anonymized data}, + author = {He, Yeye and Barman, Siddharth and Naughton, Jeffrey}, + year = {2011} +} + +@article{he2015dpt, + title = {DPT: differentially private trajectory synthesis using hierarchical reference systems}, + author = {He, Xi and Cormode, Graham and Machanavajjhala, Ashwin and Procopiuc, Cecilia M and Srivastava, Divesh}, + journal = {Proceedings of the VLDB Endowment}, + volume = {8}, + number = {11}, + pages = {1154--1165}, + year = {2015}, + publisher = {VLDB Endowment} +} + +@inproceedings{hua2015differentially, + title = {Differentially private publication of general time-serial trajectory data}, + author = {Hua, Jingyu and Gao, Yue and Zhong, Sheng}, + booktitle = {Computer Communications (INFOCOM), 2015 IEEE Conference on}, + pages = {549--557}, + year = {2015}, + organization = {IEEE} +} + +@article{huguenin2017predictive, + title = {A predictive model for user motivation and utility implications of privacy-protection mechanisms in location check-ins}, + author = {Huguenin, K{\'e}vin and Bilogrevic, Igor and Machado, Joana Soares and Mihaila, Stefan and Shokri, Reza and Dacosta, Italo and Hubaux, Jean-Pierre}, + journal = {IEEE Transactions on Mobile Computing}, + volume = {17}, + number = {4}, + pages = {760--774}, + year = {2017}, + publisher = {IEEE} +} + +@article{jain2016big, + title = {Big data privacy: a technological perspective and review}, + author = {Jain, Priyank and Gyanchandani, Manasi and Khare, Nilay}, + journal = {Journal of Big Data}, + volume = {3}, + number = {1}, + pages = {25}, + year = {2016}, + publisher = {Springer} +} + +@article{ji2014differential, + title = {Differential privacy and machine learning: a survey and review}, + author = {Ji, Zhanglong and Lipton, Zachary C and Elkan, Charles}, + journal = {arXiv preprint arXiv:1412.7584}, + year = {2014} +} + +@article{jiang2006research, + title = {Research issues in data stream association rule mining}, + author = {Jiang, Nan and Gruenwald, Le}, + journal = {ACM Sigmod Record}, + volume = {35}, + number = {1}, + pages = {14--19}, + year = {2006}, + publisher = {ACM New York, NY, USA} +} + + +@inproceedings{jiang2013publishing, + title = {Publishing trajectories with differential privacy guarantees}, + author = {Jiang, Kaifeng and Shao, Dongxu and Bressan, St{\'e}phane and Kister, Thomas and Tan, Kian-Lee}, + booktitle = {Proceedings of the 25th International Conference on Scientific and Statistical Database Management}, + pages = {12}, + year = {2013}, + organization = {ACM} } @article{johnson2018towards, - title={Towards practical differential privacy for SQL queries}, - author={Johnson, Noah and Near, Joseph P and Song, Dawn}, - journal={Proceedings of the VLDB Endowment}, - volume={11}, - number={5}, - pages={526--539}, - year={2018}, - publisher={VLDB Endowment} + title = {Towards practical differential privacy for SQL queries}, + author = {Johnson, Noah and Near, Joseph P and Song, Dawn}, + journal = {Proceedings of the VLDB Endowment}, + volume = {11}, + number = {5}, + pages = {526--539}, + year = {2018}, + publisher = {VLDB Endowment} +} + +@article{kalman1960new, + title = {A new approach to linear filtering and prediction problems}, + author = {Kalman, Rudolph Emil}, + journal = {Journal of basic Engineering}, + volume = {82}, + number = {1}, + pages = {35--45}, + year = {1960}, + publisher = {American Society of Mechanical Engineers} +} + +@inproceedings{kamara2010cryptographic, + title = {Cryptographic cloud storage}, + author = {Kamara, Seny and Lauter, Kristin}, + booktitle = {International Conference on Financial Cryptography and Data Security}, + pages = {136--149}, + year = {2010}, + organization = {Springer} +} + +@book{karlin2014first, + title = {A first course in stochastic processes}, + author = {Karlin, Samuel}, + year = {2014}, + publisher = {Academic press} +} + +@inproceedings{katsomallos2014easyharvest, + title = {EasyHarvest: Supporting the deployment and management of sensing applications on smartphones}, + author = {Katsomallos, Manos and Lalis, Spyros}, + booktitle = {Pervasive Computing and Communications Workshops (PERCOM Workshops), 2014 IEEE International Conference on}, + pages = {80--85}, + year = {2014}, + organization = {IEEE} +} + +@inproceedings{katsomallos2017open, + title = {An open framework for flexible plug-in privacy mechanisms in crowdsensing applications}, + author = {Katsomallos, Manos and Lalis, Spyros and Papaioannou, Thanasis and Theodorakopoulos, George}, + booktitle = {Pervasive Computing and Communications Workshops (PerCom Workshops), 2017 IEEE International Conference on}, + pages = {237--242}, + year = {2017}, + organization = {IEEE} +} + +@article{katsomallos2019privacy, + title = {Privacy, Space and Time: a Survey on Privacy-Preserving Continuous Data Publishing}, + author = {Katsomallos, Manos and Tzompanaki, Katerina and Kotzinos, Dimitris}, + journal = {Journal of Spatial Information Science}, + volume = {2019}, + number = {19}, + pages = {57--103}, + year = {2019} +} + +@inproceedings{kellaris2013practical, + title = {Practical differential privacy via grouping and smoothing}, + author = {Kellaris, Georgios and Papadopoulos, Stavros}, + booktitle = {Proceedings of the VLDB Endowment}, + volume = {6}, + number = {5}, + pages = {301--312}, + year = {2013}, + organization = {VLDB Endowment} +} + +@article{kellaris2014differentially, + title = {Differentially private event sequences over infinite streams}, + author = {Kellaris, Georgios and Papadopoulos, Stavros and Xiao, Xiaokui and Papadias, Dimitris}, + journal = {Proceedings of the VLDB Endowment}, + volume = {7}, + number = {12}, + pages = {1155--1166}, + year = {2014}, + publisher = {VLDB Endowment} +} + +@inproceedings{kido2005anonymous, + title = {An anonymous communication technique using dummies for location-based services}, + author = {Kido, Hidetoshi and Yanagisawa, Yutaka and Satoh, Tetsuji}, + booktitle = {Pervasive Services, 2005. ICPS'05. Proceedings. International Conference on}, + pages = {88--97}, + year = {2005}, + organization = {IEEE} +} + +@inproceedings{kifer2009attacks, + title = {Attacks on privacy and deFinetti's theorem}, + author = {Kifer, Daniel}, + booktitle = {Proceedings of the 2009 ACM SIGMOD International Conference on Management of data}, + pages = {127--138}, + year = {2009}, + organization = {ACM} +} + +@inproceedings{kifer2011no, + title = {No free lunch in data privacy}, + author = {Kifer, Daniel and Machanavajjhala, Ashwin}, + booktitle = {Proceedings of the 2011 ACM SIGMOD International Conference on Management of data}, + pages = {193--204}, + year = {2011}, + organization = {ACM} +} + +@article{kifer2014pufferfish, + title = {Pufferfish: A framework for mathematical privacy definitions}, + author = {Kifer, Daniel and Machanavajjhala, Ashwin}, + journal = {ACM Transactions on Database Systems (TODS)}, + volume = {39}, + number = {1}, + pages = {3}, + year = {2014}, + publisher = {ACM} +} + +@article{king1983centralized, + title = {Centralized versus decentralized computing: organizational considerations and management options}, + author = {King, John Leslie}, + journal = {ACM Computing Surveys (CSUR)}, + volume = {15}, + number = {4}, + pages = {319--349}, + year = {1983}, + publisher = {ACM} +} + +@incollection{knuth1968art, + author = {Knuth, Donald Ervin}, + title = {Seminumerical Algorithms}, + booktitle = {The Art of Computer Programming}, + publisher = {Addison-Wesley}, + year = {1968}, + volume = {2}, + edition = {2}, + isbn = {0-201-03801-3} +} + +@inproceedings{krumm2013placer, + title = {Placer: semantic place labels from diary data}, + author = {Krumm, John and Rouhana, Dany}, + booktitle = {Proceedings of the 2013 ACM international joint conference on Pervasive and ubiquitous computing}, + pages = {163--172}, + year = {2013} +} + +@article{lafferty2001conditional, + title = {Conditional random fields: Probabilistic models for segmenting and labeling sequence data}, + author = {Lafferty, John and McCallum, Andrew and Pereira, Fernando CN}, + year = {2001} +} + +@article{laney20013d, + title = {3D data management: Controlling data volume, velocity and variety}, + author = {Laney, Doug}, + journal = {META Group Research Note}, + volume = {6}, + number = {70}, + year = {2001} +} + +@book{lawler2010random, + title = {Random walk: a modern introduction}, + author = {Lawler, Gregory F and Limic, Vlada}, + volume = {123}, + year = {2010}, + publisher = {Cambridge University Press} +} + +@inproceedings{lee2008trajectory, + title = {Trajectory outlier detection: A partition-and-detect framework}, + author = {Lee, Jae-Gil and Han, Jiawei and Li, Xiaolei}, + booktitle = {2008 IEEE 24th International Conference on Data Engineering}, + pages = {140--149}, + year = {2008}, + organization = {IEEE} +} + +@inproceedings{lee2011much, + title = {How much is enough? choosing $\varepsilon$ for differential privacy}, + author = {Lee, Jaewoo and Clifton, Chris}, + booktitle = {International Conference on Information Security}, + pages = {325--340}, + year = {2011}, + organization = {Springer} +} + +@article{legendre1993spatial, + title = {Spatial autocorrelation: trouble or new paradigm?}, + author = {Legendre, Pierre}, + journal = {Ecology}, + volume = {74}, + number = {6}, + pages = {1659--1673}, + year = {1993}, + publisher = {Wiley Online Library} +} + +@inproceedings{li2007hiding, + title = {Hiding in the crowd: Privacy preservation on evolving streams through correlation tracking}, + author = {Li, Feifei and Sun, Jimeng and Papadimitriou, Spiros and Mihaila, George A and Stanoi, Ioana}, + booktitle = {Data Engineering, 2007. ICDE 2007. IEEE 23rd International Conference on}, + pages = {686--695}, + year = {2007}, + organization = {IEEE} +} + +@inproceedings{li2007t, + title = {t-closeness: Privacy beyond k-anonymity and l-diversity}, + author = {Li, Ninghui and Li, Tiancheng and Venkatasubramanian, Suresh}, + booktitle = {Data Engineering, 2007. ICDE 2007. IEEE 23rd International Conference on}, + pages = {106--115}, + year = {2007}, + organization = {IEEE} +} + +@inproceedings{li2008mining, + title = {Mining user similarity based on location history}, + author = {Li, Quannan and Zheng, Yu and Xie, Xing and Chen, Yukun and Liu, Wenyu and Ma, Wei-Ying}, + booktitle = {Proceedings of the 16th ACM SIGSPATIAL international conference on Advances in geographic information systems}, + pages = {1--10}, + year = {2008} +} + +@inproceedings{li2012sampling, + title = {On sampling, anonymization, and differential privacy or, k-anonymization meets differential privacy}, + author = {Li, Ninghui and Qardaji, Wahbeh and Su, Dong}, + booktitle = {Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security}, + pages = {32--33}, + year = {2012}, + organization = {ACM} +} + +@article{li2016hybrid, + title = {A hybrid approach to prevent composition attacks for independent data releases}, + author = {Li, Jiuyong and Baig, Muzammil M and Sattar, AHM Sarowar and Ding, Xiaofeng and Liu, Jixue and Vincent, Millist W}, + journal = {Information Sciences}, + volume = {367}, + pages = {324--336}, + year = {2016}, + publisher = {Elsevier} +} + +@article{li2017achieving, + title = {Achieving differential privacy of trajectory data publishing in participatory sensing}, + author = {Li, Meng and Zhu, Liehuang and Zhang, Zijian and Xu, Rixin}, + journal = {Information Sciences}, + volume = {400}, + pages = {1--13}, + year = {2017}, + publisher = {Elsevier} +} + +@incollection{lifshits2012lectures, + title = {Lectures on Gaussian processes}, + author = {Lifshits, Mikhail}, + booktitle = {Lectures on Gaussian Processes}, + pages = {1--117}, + year = {2012}, + publisher = {Springer} +} + +@inproceedings{liu2016dependence, + title = {Dependence Makes You Vulnerable: Differential Privacy Under Dependent Tuples}, + author = {Liu, Changchang and Chakraborty, Supriyo and Mittal, Prateek}, + booktitle = {NDSS}, + volume = {16}, + pages = {21--24}, + year = {2016} +} + +@article{lyon2014surveillance, + title = {Surveillance, Snowden, and big data: Capacities, consequences, critique}, + author = {Lyon, David}, + journal = {Big Data \& Society}, + volume = {1}, + number = {2}, + pages = {2053951714541861}, + year = {2014}, + publisher = {SAGE Publications Sage UK: London, England} +} + +@article{ma2017plp, + title = {PLP: Protecting location privacy against correlation analyze Attack in crowdsensing}, + author = {Ma, Qiang and Zhang, Shanfeng and Zhu, Tong and Liu, Kebin and Zhang, Lan and He, Wenbo and Liu, Yunhao}, + journal = {IEEE transactions on mobile computing}, + volume = {16}, + number = {9}, + pages = {2588--2598}, + year = {2017}, + publisher = {IEEE} +} + +@inproceedings{machanavajjhala2006diversity, + title = {l-diversity: Privacy beyond k-anonymity}, + author = {Machanavajjhala, Ashwin and Gehrke, Johannes and Kifer, Daniel and Venkitasubramaniam, Muthuramakrishnan}, + booktitle = {Data Engineering, 2006. ICDE'06. Proceedings of the 22nd International Conference on}, + pages = {24--24}, + year = {2006}, + organization = {IEEE} +} + +@article{machanavajjhala2015designing, + title = {Designing statistical privacy for your data}, + author = {Machanavajjhala, Ashwin and Kifer, Daniel}, + journal = {Communications of the ACM}, + volume = {58}, + number = {3}, + pages = {58--67}, + year = {2015}, + publisher = {ACM} +} + +@article{matyas1990visual, + title = {Visual analysis of single-case time series: Effects of variability, serial dependence, and magnitude of intervention effects}, + author = {Matyas, Thomas A and Greenwood, Kenneth M}, + journal = {Journal of Applied Behavior Analysis}, + volume = {23}, + number = {3}, + pages = {341--351}, + year = {1990}, + publisher = {Wiley Online Library} +} + +@inproceedings{mcsherry2007mechanism, + title = {Mechanism design via differential privacy}, + author = {McSherry, Frank and Talwar, Kunal}, + booktitle = {Foundations of Computer Science, 2007. FOCS'07. 48th Annual IEEE Symposium on}, + pages = {94--103}, + year = {2007}, + organization = {IEEE} +} + +@inproceedings{mcsherry2009privacy, + title = {Privacy integrated queries: an extensible platform for privacy-preserving data analysis}, + author = {McSherry, Frank D}, + booktitle = {Proceedings of the 2009 ACM SIGMOD International Conference on Management of data}, + pages = {19--30}, + year = {2009}, + organization = {ACM} +} + +@inproceedings{metwally2005duplicate, + title = {Duplicate detection in click streams}, + author = {Metwally, Ahmed and Agrawal, Divyakant and El Abbadi, Amr}, + booktitle = {Proceedings of the 14th international conference on World Wide Web}, + pages = {12--21}, + year = {2005} +} + +@article{moran1950notes, + title = {Notes on continuous stochastic phenomena}, + author = {Moran, Patrick AP}, + journal = {Biometrika}, + volume = {37}, + number = {1/2}, + pages = {17--23}, + year = {1950}, + publisher = {JSTOR} +} + +@inproceedings{motwani2007efficient, + title = {Efficient algorithms for masking and finding quasi-identifiers}, + author = {Motwani, Rajeev and Xu, Ying}, + booktitle = {Proceedings of the Conference on Very Large Data Bases (VLDB)}, + pages = {83--93}, + year = {2007} +} + +@article{muthukrishnan2005data, + title = {Data streams: Algorithms and applications}, + author = {Muthukrishnan, Shanmugavelayutham and others}, + journal = {Foundations and Trends{\textregistered} in Theoretical Computer Science}, + volume = {1}, + number = {2}, + pages = {117--236}, + year = {2005}, + publisher = {Now Publishers, Inc.} +} + +@inproceedings{narayanan2008robust, + title = {Robust de-anonymization of large sparse data sets}, + author = {Narayanan, Arvind and Shmatikov, Vitaly}, + booktitle = {Security and Privacy, 2008. SP 2008. IEEE Symposium on}, + pages = {111--125}, + year = {2008}, + organization = {IEEE} +} + +@misc{osm, + author = {{Wikipedia contributors}}, + title = {OpenStreetMap --- {Wikipedia}{,} The Free Encyclopedia}, + year = {2020}, + url = {https://en.wikipedia.org/w/index.php?title=OpenStreetMap&oldid=985394598}, + note = {Accessed: November 11, 2020} +} + +@inproceedings{ozccep2015stream, + title = {Stream-query compilation with ontologies}, + author = {{\"O}z{\c{c}}ep, {\"O}zg{\"u}r L{\"u}tf{\"u} and M{\"o}ller, Ralf and Neuenstadt, Christian}, + booktitle = {Australasian Joint Conference on Artificial Intelligence}, + pages = {457--463}, + year = {2015}, + organization = {Springer} +} + +@article{papoulis1984bayes, + title = {Bayes' theorem in statistics and Bayes' theorem in statistics (reexamined)}, + author = {Papoulis, A}, + journal = {Probability, random variables, and stochastic processes. 2nd ed. New York, NY: McGraw-Hill}, + pages = {38--114}, + year = {1984} +} + +@book{park2018fundamentals, + title = {Fundamentals of Probability and Stochastic Processes with Applications to Communications}, + author = {Park, Kun Il and Park}, + year = {2018}, + publisher = {Springer} +} + +@inproceedings{perera2014mosden, + title = {Mosden: An internet of things middleware for resource constrained mobile devices}, + author = {Perera, Charith and Jayaraman, Prem Prakash and Zaslavsky, Arkady and Christen, Peter and Georgakopoulos, Dimitrios}, + booktitle = {2014 47th Hawaii International Conference on System Sciences}, + pages = {1053--1062}, + year = {2014}, + organization = {IEEE} +} + +@inproceedings{primault2015time, + title = {Time distortion anonymization for the publication of mobility data with high utility}, + author = {Primault, Vincent and Mokhtar, Sonia Ben and Lauradoux, C{\'e}dric and Brunie, Lionel}, + booktitle = {Trustcom/BigDataSE/ISPA, 2015 IEEE}, + volume = {1}, + pages = {539--546}, + year = {2015}, + organization = {IEEE} +} + +@article{primault2018long, + title = {The Long Road to Computational Location Privacy: A Survey}, + author = {Primault, Vincent and Boutet, Antoine and Mokhtar, Sonia Ben and Brunie, Lionel}, + journal = {IEEE Communications Surveys \& Tutorials}, + year = {2018}, + publisher = {IEEE} +} + +@book{quinlan2014c4, + title = {Programs for machine learning}, + author = {Quinlan, J Ross}, + year = {2014}, + publisher = {Elsevier} +} + +@inproceedings{quoc2017privapprox, + title = {PrivApprox: privacy-preserving stream analytics}, + author = {Quoc, Do Le and Beck, Martin and Bhatotia, Pramod and Chen, Ruichuan and Fetzer, Christof and Strufe, Thorsten}, + booktitle = {Proceedings of the 2017 USENIX Conference on Usenix Annual Technical Conference}, + pages = {659--672}, + year = {2017}, + organization = {USENIX Association} +} + +@article{raghupathi2014big, + title = {Big data analytics in healthcare: promise and potential}, + author = {Raghupathi, Wullianallur and Raghupathi, Viju}, + journal = {Health information science and systems}, + volume = {2}, + number = {1}, + pages = {3}, + year = {2014}, + publisher = {BioMed Central} +} + +@article{ramsay2004functional, + title = {Functional data analysis}, + author = {Ramsay, James O}, + journal = {Encyclopedia of Statistical Sciences}, + volume = {4}, + year = {2004}, + publisher = {Wiley Online Library} +} + +@inproceedings{riederer2016findyou, + title = {Findyou: A personal location privacy auditing tool}, + author = {Riederer, Christopher and Echickson, Daniel and Huang, Stephanie and Chaintreau, Augustin}, + booktitle = {Proceedings of the 25th International Conference Companion on World Wide Web}, + pages = {243--246}, + year = {2016} +} + +@book{rogers2000diffusions, + title = {Diffusions, Markov processes and martingales: Volume 2, It{\^o} calculus}, + author = {Rogers, L Chris G and Williams, David}, + volume = {2}, + year = {2000}, + publisher = {Cambridge university press} +} + +@misc{russell2018fitness, + title = {Fitness app {Strava} exposes the location of military bases}, + author = {Russell, Jon}, + year = {2018}, + publisher = {TechCrunch}, + howpublished = {\url{https://techcrunch.com/2018/01/28/strava-exposes-military-bases}}, + note = {Accessed: July 1, 2020} +} + +@inproceedings{samarati1998protecting, + title = {Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression}, + author = {Samarati, Pierangela and Sweeney, Latanya}, + booktitle = {IEEE Symposium on Research in Security and Privacy in}, + year = {1998}, + organization = {IEEE} +} + +@article{satyanarayanan2017emergence, + title = {The emergence of edge computing}, + author = {Satyanarayanan, Mahadev}, + journal = {Computer}, + volume = {50}, + number = {1}, + pages = {30--39}, + year = {2017}, + publisher = {IEEE} +} + +@article{savage2013value, + title = {The value of online privacy}, + author = {Savage, Scott and Waldman, Donald M}, + year = {2013} +} + +% new algorithm +@article{scaltsas1981identity, + title = {Identity, Origin and Spatiotemporal Continuity}, + author = {Scaltsas, Theodore}, + journal = {Philosophy}, + volume = {56}, + number = {217}, + pages = {395--402}, + year = {1981}, + publisher = {JSTOR} +} + +@article{shannon2001mathematical, + title = {A mathematical theory of communication}, + author = {Shannon, Claude Elwood}, + journal = {ACM SIGMOBILE mobile computing and communications review}, + volume = {5}, + number = {1}, + pages = {3--55}, + year = {2001}, + publisher = {ACM} +} + +@article{shmueli2012limiting, + title = {Limiting disclosure of sensitive data in sequential releases of databases}, + author = {Shmueli, Erez and Tassa, Tamir and Wasserstein, Raz and Shapira, Bracha and Rokach, Lior}, + journal = {Information Sciences}, + volume = {191}, + pages = {98--127}, + year = {2012}, + publisher = {Elsevier} +} + +@article{shmueli2015privacy, + title = {Privacy by diversity in sequential releases of databases}, + author = {Shmueli, Erez and Tassa, Tamir}, + journal = {Information Sciences}, + volume = {298}, + pages = {344--372}, + year = {2015}, + publisher = {Elsevier} +} + +@article{silva2013data, + title = {Data stream clustering: A survey}, + author = {Silva, Jonathan A and Faria, Elaine R and Barros, Rodrigo C and Hruschka, Eduardo R and De Carvalho, Andre CPLF and Gama, Jo{\~a}o}, + journal = {ACM Computing Surveys (CSUR)}, + volume = {46}, + number = {1}, + pages = {13}, + year = {2013}, + publisher = {ACM} +} + +@inproceedings{simi2017extensive, + title = {An extensive study on data anonymization algorithms based on k-anonymity}, + author = {Simi, Ms MS and Nayaki, Mrs K Sankara and Elayidom, M Sudheep}, + booktitle = {IOP Conference Series: Materials Science and Engineering}, + volume = {225}, + number = {1}, + pages = {012279}, + year = {2017}, + organization = {IOP Publishing} +} + +@book{skorokhod2005basic, + title = {Basic principles and applications of probability theory}, + author = {Skorokhod, Valeriy}, + year = {2005}, + publisher = {Springer Science \& Business Media} +} + +@inproceedings{song2017pufferfish, + title = {Pufferfish privacy mechanisms for correlated data}, + author = {Song, Shuang and Wang, Yizhen and Chaudhuri, Kamalika}, + booktitle = {Proceedings of the 2017 ACM International Conference on Management of Data}, + pages = {1291--1306}, + year = {2017}, + organization = {ACM} +} + +@article{soria2016big, + title = {Big data privacy: challenges to privacy principles and models}, + author = {Soria-Comas, Jordi and Domingo-Ferrer, Josep}, + journal = {Data Science and Engineering}, + volume = {1}, + number = {1}, + pages = {21--28}, + year = {2016}, + publisher = {Springer} +} + +@inproceedings{sorkine2004laplacian, + title = {Laplacian surface editing}, + author = {Sorkine, Olga and Cohen-Or, Daniel and Lipman, Yaron and Alexa, Marc and R{\"o}ssl, Christian and Seidel, H-P}, + booktitle = {Proceedings of the 2004 Eurographics/ACM SIGGRAPH symposium on Geometry processing}, + pages = {175--184}, + year = {2004} +} + +@article{stigler1989francis, + title = {Francis Galton's account of the invention of correlation}, + author = {Stigler, Stephen M}, + journal = {Statistical Science}, + pages = {73--79}, + year = {1989}, + publisher = {JSTOR} +} + +@article{sweeney2002achieving, + title = {Achieving k-anonymity privacy protection using generalization and suppression}, + author = {Sweeney, Latanya}, + journal = {International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems}, + volume = {10}, + number = {05}, + pages = {571--588}, + year = {2002}, + publisher = {World Scientific} +} + +@article{sweeney2002k, + title = {k-anonymity: A model for protecting privacy}, + author = {Sweeney, Latanya}, + journal = {International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems}, + volume = {10}, + number = {05}, + pages = {557--570}, + year = {2002}, + publisher = {World Scientific} +} + +@article{tankard2016gdpr, + title = {What the GDPR means for businesses}, + author = {Tankard, Colin}, + journal = {Network Security}, + volume = {2016}, + number = {6}, + pages = {5--8}, + year = {2016}, + publisher = {Elsevier} +} + +@article{tobler1970computer, + title = {A computer movie simulating urban growth in the Detroit region}, + author = {Tobler, Waldo R}, + journal = {Economic geography}, + volume = {46}, + number = {sup1}, + pages = {234--240}, + year = {1970}, + publisher = {Taylor \& Francis} +} + +@online{transunion, + title = {TransUnion}, + url = {https://www.transunion.com}, + year = {Accessed: November 11, 2020} +} + +@online{twitter, + title = {Twitter}, + url = {https://www.twitter.com}, + year = {Accessed: November 11, 2020} +} + +@inproceedings{varghese2016challenges, + title = {Challenges and opportunities in edge computing}, + author = {Varghese, Blesson and Wang, Nan and Barbhuiya, Sakil and Kilpatrick, Peter and Nikolopoulos, Dimitrios S}, + booktitle = {2016 IEEE International Conference on Smart Cloud (SmartCloud)}, + pages = {20--26}, + year = {2016}, + organization = {IEEE} +} + +@article{vitter1985random, + title = {Random sampling with a reservoir}, + author = {Vitter, Jeffrey S}, + journal = {ACM Transactions on Mathematical Software (TOMS)}, + volume = {11}, + number = {1}, + pages = {37--57}, + year = {1985}, + publisher = {ACM} +} + +@article{walters1982introduction, + title = {An introduction to ergodic theory}, + author = {Walters, Peter}, + journal = {Graduate Texts in Mathematics}, + year = {1982} +} + +@inproceedings{wang2006anonymizing, + title = {Anonymizing sequential releases}, + author = {Wang, Ke and Fung, Benjamin}, + booktitle = {Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining}, + pages = {414--423}, + year = {2006}, + organization = {ACM} +} + +@inproceedings{wang2009survey, + title = {A survey on privacy preserving data mining}, + author = {Wang, Jian and Luo, Yongcheng and Zhao, Yan and Le, Jiajin}, + booktitle = {Database Technology and Applications, 2009 First International Workshop on}, + pages = {111--114}, + year = {2009}, + organization = {IEEE} +} + +@article{wang2010privacy, + title = {Privacy-preserving data publishing: A survey on recent developments}, + author = {Wang, K and Chen, R and Fung, BC and Yu, PS}, + journal = {ACM Computing Surveys}, + year = {2010} +} + +@inproceedings{wang2016rescuedp, + title = {RescueDP: Real-time spatio-temporal crowd-sourced data publishing with differential privacy}, + author = {Wang, Qian and Zhang, Yan and Lu, Xiao and Wang, Zhibo and Qin, Zhan and Ren, Kui}, + booktitle = {Computer Communications, IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on}, + pages = {1--9}, + year = {2016}, + organization = {IEEE} +} + +@article{wang2017cts, + title = {CTS-DP: publishing correlated time-series data via differential privacy}, + author = {Wang, Hao and Xu, Zhengquan}, + journal = {Knowledge-Based Systems}, + volume = {122}, + pages = {167--179}, + year = {2017}, + publisher = {Elsevier} +} + +@inproceedings{wang2017privacy, + title = {Privacy Preserving Anonymity for Periodical SRS Data Publishing}, + author = {Wang, Jie-Teng and Lin, Wen-Yang}, + booktitle = {Data Engineering (ICDE), 2017 IEEE 33rd International Conference on}, + pages = {1344--1355}, + year = {2017}, + organization = {IEEE} +} + +@article{warner1965randomized, + title = {Randomized response: A survey technique for eliminating evasive answer bias}, + author = {Warner, Stanley L}, + journal = {Journal of the American Statistical Association}, + volume = {60}, + number = {309}, + pages = {63--69}, + year = {1965}, + publisher = {Taylor \& Francis} +} + +@online{waze, + title = {Waze}, + url = {https://www.waze.com}, + year = {Accessed: November 11, 2020} +} + +@incollection{wei2006time, + title = {Time series analysis}, + author = {Wei, William WS}, + booktitle = {The Oxford Handbook of Quantitative Methods in Psychology: Vol. 2}, + year = {2006} +} + +@article{wernke2014classification, + title = {A classification of location privacy attacks and approaches}, + author = {Wernke, Marius and Skvortsov, Pavel and D{\"u}rr, Frank and Rothermel, Kurt}, + journal = {Personal and ubiquitous computing}, + volume = {18}, + number = {1}, + pages = {163--175}, + year = {2014}, + publisher = {Springer} +} + +@book{wiggins1967identity, + title = {Identity and spatio-temporal continuity}, + author = {Wiggins, David}, + year = {1967}, + publisher = {Blackwell Oxford} +} + +@online{wiki, + title = {Wikipedia}, + url = {https://www.wikipedia.com}, + year = {Accessed: November 11, 2020} +} + +@misc{wired2014data, + title = {Data Is the New Oil of the Digital Economy}, + author = {Joris Toonders}, + year = {2014}, + publisher = {Wired}, + howpublished = {\url{https://www.wired.com/insights/2014/07/data-new-oil-digital-economy}}, + note = {Accessed: December 1, 2019} +} + +@misc{wolfgang1999stochastic, + title = {Stochastic Processes: From Physics to Finance}, + author = {Wolfgang, Paul and Baschnagel, J}, + year = {1999}, + publisher = {Springer-Verlag, Berlin} +} + +@inproceedings{wong2007minimality, + title = {Minimality attack in privacy preserving data publishing}, + author = {Wong, Raymond Chi-Wing and Fu, Ada Wai-Chee and Wang, Ke and Pei, Jian}, + booktitle = {Proceedings of the 33rd international conference on Very large data bases}, + pages = {543--554}, + year = {2007}, + organization = {VLDB Endowment} +} + +@inproceedings{xiao2007m, + title = {M-invariance: towards privacy preserving re-publication of dynamic data sets}, + author = {Xiao, Xiaokui and Tao, Yufei}, + booktitle = {Proceedings of the 2007 ACM SIGMOD international conference on Management of data}, + pages = {689--700}, + year = {2007}, + organization = {ACM} +} + +@inproceedings{xiao2015protecting, + title = {Protecting locations with differential privacy under temporal correlations}, + author = {Xiao, Yonghui and Xiong, Li}, + booktitle = {Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security}, + pages = {1298--1309}, + year = {2015}, + organization = {ACM} +} + +@article{xiao2017loclok, + title = {LocLok: location cloaking with differential privacy via hidden markov model}, + author = {Xiao, Yonghui and Xiong, Li and Zhang, Si and Cao, Yang}, + journal = {Proceedings of the VLDB Endowment}, + volume = {10}, + number = {12}, + pages = {1901--1904}, + year = {2017}, + publisher = {VLDB Endowment} +} + +@online{xssfopes2020tweet, + title = {{@xssfopes: ``can anyone spot the issue with the algo? red is original data point, 400 ``anonymized'' data points calculated''}}, + url = {https://twitter.com/xssfox/status/1251116087116042241}, + year = {Accessed: July 16, 2020} +} + +@inproceedings{yang2015bayesian, + title = {Bayesian differential privacy on correlated data}, + author = {Yang, Bin and Sato, Issei and Nakagawa, Hiroshi}, + booktitle = {Proceedings of the 2015 ACM SIGMOD international conference on Management of Data}, + pages = {747--762}, + year = {2015}, + organization = {ACM} +} + +@inproceedings{ye2012meca, + title = {Meca: mobile edge capture and analysis middleware for social sensing applications}, + author = {Ye, Fan and Ganti, Raghu and Dimaghani, Raheleh and Grueneberg, Keith and Calo, Seraphin}, + booktitle = {Proceedings of the 21st International Conference on World Wide Web}, + pages = {699--702}, + year = {2012}, + organization = {ACM} +} + +@inproceedings{ye2017trajectory, + title = {A trajectory privacy-preserving algorithm based on road networks in continuous location-based services}, + author = {Ye, Ayong and Li, Yacheng and Xu, Li and Li, Qing and Lin, Hui}, + booktitle = {2017 IEEE Trustcom/BigDataSE/ICESS}, + pages = {510--516}, + year = {2017}, + organization = {IEEE} +} + +@inproceedings{yuan2011find, + title = {Where to find my next passenger}, + author = {Yuan, Jing and Zheng, Yu and Zhang, Liuhang and Xie, XIng and Sun, Guangzhong}, + booktitle = {Proceedings of the 13th international conference on Ubiquitous computing}, + pages = {109--118}, + year = {2011} +} + +@article{zhang2017privbayes, + title = {Privbayes: Private data release via bayesian networks}, + author = {Zhang, Jun and Cormode, Graham and Procopiuc, Cecilia M and Srivastava, Divesh and Xiao, Xiaokui}, + journal = {ACM Transactions on Database Systems (TODS)}, + volume = {42}, + number = {4}, + pages = {25}, + year = {2017}, + publisher = {ACM} +} + +@inproceedings{zhao2017dependent, + title = {Dependent Differential Privacy for Correlated Data}, + author = {Zhao, Jun and Zhang, Junshan and Poor, H Vincent}, + booktitle = {Globecom Workshops (GC Wkshps), 2017 IEEE}, + pages = {1--7}, + year = {2017}, + organization = {IEEE} +} + +@inproceedings{zheng2008learning, + title = {Learning transportation mode from raw gps data for geographic applications on the web}, + author = {Zheng, Yu and Liu, Like and Wang, Longhao and Xie, Xing}, + booktitle = {Proceedings of the 17th international conference on World Wide Web}, + pages = {247--256}, + year = {2008} +} + +@article{zheng2015trajectory, + title = {Trajectory data mining: an overview}, + author = {Zheng, Yu}, + journal = {ACM Transactions on Intelligent Systems and Technology (TIST)}, + volume = {6}, + number = {3}, + pages = {1--41}, + year = {2015}, + publisher = {ACM New York, NY, USA} +} + +@inproceedings{zhou2004discovering, + title = {Discovering personal gazetteers: an interactive clustering approach}, + author = {Zhou, Changqing and Frankowski, Dan and Ludford, Pamela and Shekhar, Shashi and Terveen, Loren}, + booktitle = {Proceedings of the 12th annual ACM international workshop on Geographic information systems}, + pages = {266--273}, + year = {2004} +} + +@article{zhou2008brief, + title = {A brief survey on anonymization techniques for privacy preserving publishing of social network data}, + author = {Zhou, Bin and Pei, Jian and Luk, WoShun}, + journal = {ACM Sigkdd Explorations Newsletter}, + volume = {10}, + number = {2}, + pages = {12--22}, + year = {2008}, + publisher = {ACM} +} + +@inproceedings{zhou2009continuous, + title = {Continuous privacy preserving publishing of data streams}, + author = {Zhou, Bin and Han, Yi and Pei, Jian and Jiang, Bin and Tao, Yufei and Jia, Yan}, + booktitle = {Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology}, + pages = {648--659}, + year = {2009}, + organization = {ACM} +} + +@article{zhu2015correlated, + title = {Correlated differential privacy: hiding information in non-IID data set}, + author = {Zhu, Tianqing and Xiong, Ping and Li, Gang and Zhou, Wanlei}, + journal = {IEEE Transactions on Information Forensics and Security}, + volume = {10}, + number = {2}, + pages = {229--242}, + year = {2015}, + publisher = {IEEE} +} + +@article{zhu2017answering, + title = {Answering differentially private queries for continual data sets release}, + author = {Zhu, Tianqing and Li, Gang and Xiong, Ping and Zhou, Wanlei}, + journal = {Future Generation Computer Systems}, + year = {2017}, + publisher = {Elsevier} +} + +@article{zheng2010geolife, + title={Geolife: A collaborative social networking service among user, location and trajectory.}, + author={Zheng, Yu and Xie, Xing and Ma, Wei-Ying and others}, + journal={IEEE Data Eng. Bull.}, + volume={33}, + number={2}, + pages={32--39}, + year={2010}, + publisher={Citeseer} +} + +@inproceedings{yuan2010t, + title={T-drive: driving directions based on taxi trajectories}, + author={Yuan, Jing and Zheng, Yu and Zhang, Chengyang and Xie, Wenlei and Xie, Xing and Sun, Guangzhong and Huang, Yan}, + booktitle={Proceedings of the 18th SIGSPATIAL International conference on advances in geographic information systems}, + pages={99--108}, + year={2010} +} + +@article{desfontaines2020sok, + title={Sok: Differential privacies}, + author={Desfontaines, Damien and Pej{\'o}, Bal{\'a}zs}, + journal={Proceedings on Privacy Enhancing Technologies}, + volume={2020}, + number={2}, + pages={288--313}, + year={2020}, + publisher={Sciendo} +} + +@inproceedings{duchi2013local, + title={Local privacy and statistical minimax rates}, + author={Duchi, John C and Jordan, Michael I and Wainwright, Martin J}, + booktitle={2013 IEEE 54th Annual Symposium on Foundations of Computer Science}, + pages={429--438}, + year={2013}, + organization={IEEE} }