@inproceedings{abul2008never, title = {Never Walk Alone: Uncertainty for Anonymity in Moving Objects Databases.}, author = {Abul, Osman and Bonchi, Francesco and Nanni, Mirco and others}, booktitle = {ICDE}, volume = {8}, pages = {376--385}, year = {2008} } @article{acharya2019context, title = {Context-Aware Local Differential Privacy}, author = {Acharya, Jayadev and Bonawitz, Keith and Kairouz, Peter and Ramage, Daniel and Sun, Ziteng}, journal = {arXiv preprint arXiv:1911.00038}, year = {2019} } @online{acxiom, title = {Acxiom}, url = {https://acxiom.com}, year = {Accessed on October 11, 2021} } @book{adler2010geometry, title = {The geometry of random fields}, author = {Adler, Robert J}, year = {2010}, publisher = {SIAM} } @misc{ahmed2017mobile, title = {Mobile edge computing: opportunities, solutions, and challenges}, author = {Ahmed, Ejaz and Rehmani, Mubashir Husain}, year = {2017}, publisher = {Elsevier} } @article{ahmed2020survey, title = {A survey of COVID-19 contact tracing apps}, author = {Ahmed, Nadeem and Michelin, Regio A and Xue, Wanli and Ruj, Sushmita and Malaney, Robert and Kanhere, Salil S and Seneviratne, Aruna and Hu, Wen and Janicke, Helge and Jha, Sanjay K}, journal = {IEEE access}, volume = {8}, pages = {134577--134601}, year = {2020}, publisher = {IEEE} } @article{al2018adaptive, title = {An adaptive geo-indistinguishability mechanism for continuous LBS queries}, author = {Al-Dhubhani, Raed and Cazalas, Jonathan M}, journal = {Wireless Networks}, volume = {24}, number = {8}, pages = {3221--3239}, year = {2018}, publisher = {Springer} } @book{allan2013probability, title = {Probability: a graduate course}, author = {Allan Gut}, volume = {75}, year = {2013}, publisher = {Springer Science \& Business Media} } @inproceedings{andres2013geo, title = {Geo-indistinguishability: Differential privacy for location-based systems}, author = {Andr{\'e}s, Miguel E and Bordenabe, Nicol{\'a}s E and Chatzikokolakis, Konstantinos and Palamidessi, Catuscia}, booktitle = {Proceedings of the 2013 ACM SIGSAC conference on Computer \& communications security}, pages = {901--914}, year = {2013}, organization = {ACM} } @article{anselin1995local, title = {Local indicators of spatial association—LISA}, author = {Anselin, Luc}, journal = {Geographical analysis}, volume = {27}, number = {2}, pages = {93--115}, year = {1995}, publisher = {Wiley Online Library} } @book{applebaum2009levy, title = {L{\'e}vy processes and stochastic calculus}, author = {Applebaum, David}, year = {2009}, publisher = {Cambridge university press} } @article{ardagna2007location, title = {Location privacy protection through obfuscation-based techniques}, author = {Ardagna, Claudio and Cremonini, Marco and Damiani, Ernesto and De Capitani di Vimercati, S and Samarati, Pierangela}, journal = {Data and Applications Security XXI}, pages = {47--60}, year = {2007}, publisher = {Springer} } @inproceedings{babcock2002sampling, title = {Sampling from a moving window over streaming data}, author = {Babcock, Brian and Datar, Mayur and Motwani, Rajeev}, booktitle = {Proceedings of the thirteenth annual ACM-SIAM symposium on Discrete algorithms}, pages = {633--634}, year = {2002}, organization = {Society for Industrial and Applied Mathematics} } @article{baum1966statistical, title = {Statistical inference for probabilistic functions of finite state Markov chains}, author = {Baum, Leonard E and Petrie, Ted}, journal = {The annals of mathematical statistics}, volume = {37}, number = {6}, pages = {1554--1563}, year = {1966}, publisher = {JSTOR} } @inproceedings{bayardo2005data, title = {Data privacy through optimal k-anonymization}, author = {Bayardo, Roberto J and Agrawal, Rakesh}, booktitle = {Data Engineering, 2005. ICDE 2005. Proceedings. 21st International Conference on}, pages = {217--228}, year = {2005}, organization = {IEEE} } @inproceedings{benaloh2009patient, title = {Patient controlled encryption: ensuring privacy of electronic medical records}, author = {Benaloh, Josh and Chase, Melissa and Horvitz, Eric and Lauter, Kristin}, booktitle = {Proceedings of the 2009 ACM workshop on Cloud computing security}, pages = {103--114}, year = {2009}, organization = {ACM} } @article{beresford2003location, title = {Location privacy in pervasive computing}, author = {Beresford, Alastair R and Stajano, Frank}, journal = {IEEE Pervasive computing}, volume = {2}, number = {1}, pages = {46--55}, year = {2003}, publisher = {IEEE} } @article{birant2007st, title = {ST-DBSCAN: An algorithm for clustering spatial--temporal data}, author = {Birant, Derya and Kut, Alp}, journal = {Data \& knowledge engineering}, volume = {60}, number = {1}, pages = {208--221}, year = {2007}, publisher = {Elsevier} } @inproceedings{bittau2017prochlo, title = {Prochlo: Strong privacy for analytics in the crowd}, author = {Bittau, Andrea and Erlingsson, {\'U}lfar and Maniatis, Petros and Mironov, Ilya and Raghunathan, Ananth and Lie, David and Rudominer, Mitch and Kode, Ushasree and Tinnes, Julien and Seefeld, Bernhard}, booktitle = {Proceedings of the 26th Symposium on Operating Systems Principles}, pages = {441--459}, year = {2017}, organization = {ACM} } @inproceedings{blocki2013differentially, title = {Differentially private data analysis of social networks via restricted sensitivity}, author = {Blocki, Jeremiah and Blum, Avrim and Datta, Anupam and Sheffet, Or}, booktitle = {Proceedings of the 4th conference on Innovations in Theoretical Computer Science}, pages = {87--96}, year = {2013}, organization = {ACM} } @article{bloom1970space, title = {Space/time trade-offs in hash coding with allowable errors}, author = {Bloom, Burton H}, journal = {Communications of the ACM}, volume = {13}, number = {7}, pages = {422--426}, year = {1970}, publisher = {ACM} } @inproceedings{bolot2013private, title = {Private decayed predicate sums on streams}, author = {Bolot, Jean and Fawaz, Nadia and Muthukrishnan, S and Nikolov, Aleksandar and Taft, Nina}, booktitle = {Proceedings of the 16th International Conference on Database Theory}, pages = {284--295}, year = {2013}, organization = {ACM} } @inproceedings{braverman2009optimal, title = {Optimal sampling from sliding windows}, author = {Braverman, Vladimir and Ostrovsky, Rafail and Zaniolo, Carlo}, booktitle = {Proceedings of the twenty-eighth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems}, pages = {147--156}, year = {2009} } @inproceedings{cao2013efficient, title = {Efficient and accurate strategies for differentially-private sliding window queries}, author = {Cao, Jianneng and Xiao, Qian and Ghinita, Gabriel and Li, Ninghui and Bertino, Elisa and Tan, Kian-Lee}, booktitle = {Proceedings of the 16th International Conference on Extending Database Technology}, pages = {191--202}, year = {2013} } @article{cao2014privacy, title = {Privacy-preserving multi-keyword ranked search over encrypted cloud data}, author = {Cao, Ning and Wang, Cong and Li, Ming and Ren, Kui and Lou, Wenjing}, journal = {IEEE Transactions on parallel and distributed systems}, volume = {25}, number = {1}, pages = {222--233}, year = {2014}, publisher = {IEEE} } @inproceedings{cao2015differentially, title = {Differentially private real-time data release over infinite trajectory streams}, author = {Cao, Yang and Yoshikawa, Masatoshi}, booktitle = {Mobile Data Management (MDM), 2015 16th IEEE International Conference on}, volume = {2}, pages = {68--73}, year = {2015}, organization = {IEEE} } @inproceedings{cao2017quantifying, title = {Quantifying differential privacy under temporal correlations}, author = {Cao, Yang and Yoshikawa, Masatoshi and Xiao, Yonghui and Xiong, Li}, booktitle = {Data Engineering (ICDE), 2017 IEEE 33rd International Conference on}, pages = {821--832}, year = {2017}, organization = {IEEE} } @article{cao2018quantifying, title = {Quantifying differential privacy in continuous data release under temporal correlations}, author = {Cao, Yang and Yoshikawa, Masatoshi and Xiao, Yonghui and Xiong, Li}, journal = {IEEE Transactions on Knowledge and Data Engineering}, volume = {31}, number = {7}, pages = {1281--1295}, year = {2018}, publisher = {IEEE} } @inproceedings{chakraborty2014ipshield, title = {ipShield: a framework for enforcing context-aware privacy}, author = {Chakraborty, Supriyo and Shen, Chenguang and Raghavan, Kasturi Rangan and Shoukry, Yasser and Millar, Matt and Srivastava, Mani}, booktitle = {11th $\{$USENIX$\}$ Symposium on Networked Systems Design and Implementation ($\{$NSDI$\}$ 14)}, pages = {143--156}, year = {2014} } @misc{chambers2016personal, title = {Personal Data: The New ``Oil'' of The Digital Economy}, author = {\c{T}uca Zb\^{a}rcea \& Asocia\c{t}ii}, year = {2016}, publisher = {Chambers and Partners}, howpublished = {\url{https://chambersandpartners.com/article/713/personal-data-the-new-oil-of-the-digital-economy}}, note = {Accessed on October 11, 2021} } @article{chan2011private, title = {Private and continual release of statistics}, author = {Chan, T-H Hubert and Shi, Elaine and Song, Dawn}, journal = {ACM Transactions on Information and System Security (TISSEC)}, volume = {14}, number = {3}, pages = {26}, year = {2011}, publisher = {ACM} } @article{chan201397, title = {97.49 on markov chains}, author = {Chan, KC and Lenard, CT and Mills, TM}, journal = {The Mathematical Gazette}, volume = {97}, number = {540}, pages = {515--520}, year = {2013}, publisher = {Cambridge University Press} } @misc{channelfour2018data, title = {Data, Democracy and Dirty Tricks}, author = {Channel 4 News Investigations Team}, publisher = {Channel 4}, year = {2018}, howpublished = {\url{https://channel4.com/news/data-democracy-and-dirty-tricks-cambridge-analytica-uncovered-investigation-expose}}, note = {Accessed on October 11, 2021} } @inproceedings{chatzikokolakis2015geo, title = {Geo-indistinguishability: A principled approach to location privacy}, author = {Chatzikokolakis, Konstantinos and Palamidessi, Catuscia and Stronati, Marco}, booktitle = {International Conference on Distributed Computing and Internet Technology}, pages = {49--72}, year = {2015}, organization = {Springer} } @article{chatzikokolakis2017methods, title = {Methods for Location Privacy: A comparative overview}, author = {Chatzikokolakis, Kostantinos and ElSalamouny, Ehab and Palamidessi, Catuscia and Anna, Pazii and others}, journal = {Foundations and Trends{\textregistered} in Privacy and Security}, volume = {1}, number = {4}, pages = {199--257}, year = {2017}, publisher = {Now Publishers, Inc.} } @article{chen2011differentially, title = {Differentially private trajectory data publication}, author = {Chen, Rui and Fung, Benjamin and Desai, Bipin C}, journal = {arXiv preprint arXiv:1112.2020}, year = {2011} } @inproceedings{chen2012differentially, title = {Differentially private sequential data publication via variable-length n-grams}, author = {Chen, Rui and Acs, Gergely and Castelluccia, Claude}, booktitle = {Proceedings of the 2012 ACM conference on Computer and communications security}, pages = {638--649}, year = {2012}, organization = {ACM} } @article{chen2014correlated, title = {Correlated network data publication via differential privacy}, author = {Chen, Rui and Fung, Benjamin C and Yu, Philip S and Desai, Bipin C}, journal = {The VLDB Journal-The International Journal on Very Large Data Bases}, volume = {23}, number = {4}, pages = {653--676}, year = {2014}, publisher = {Springer-Verlag New York, Inc.} } @inproceedings{chen2017pegasus, title = {PeGaSus: Data-Adaptive Differentially Private Stream Processing}, author = {Chen, Yan and Machanavajjhala, Ashwin and Hay, Michael and Miklau, Gerome}, booktitle = {Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security}, pages = {1375--1388}, year = {2017}, organization = {ACM} } @article{chow2011trajectory, title = {Trajectory privacy in location-based services and data publication}, author = {Chow, Chi-Yin and Mokbel, Mohamed F}, journal = {ACM Sigkdd Explorations Newsletter}, volume = {13}, number = {1}, pages = {19--29}, year = {2011}, publisher = {ACM} } @article{christin2011survey, title = {A survey on privacy in mobile participatory sensing applications}, author = {Christin, Delphine and Reinhardt, Andreas and Kanhere, Salil S and Hollick, Matthias}, journal = {Journal of systems and software}, volume = {84}, number = {11}, pages = {1928--1946}, year = {2011}, publisher = {Elsevier} } @inproceedings{cormode2003finding, title = {Finding hierarchical heavy hitters in data streams}, author = {Cormode, Graham and Korn, Flip and Muthukrishnan, Shanmugavelayutham and Srivastava, Divesh}, booktitle = {Proceedings 2003 VLDB Conference}, pages = {464--475}, year = {2003}, organization = {Elsevier} } @article{cortes2001signature, title = {Signature-based methods for data streams}, author = {Cortes, Corinna and Pregibon, Daryl}, journal = {Data Mining and Knowledge Discovery}, volume = {5}, number = {3}, pages = {167--182}, year = {2001}, publisher = {Springer} } @article{croxton1939applied, title = {Applied general statistics}, author = {Croxton, Frederick E and Cowden, Dudley J}, year = {1939}, publisher = {Prentice-Hall, Inc} } @book{daley2007introduction, title = {An introduction to the theory of point processes: volume II: general theory and structure}, author = {Daley, Daryl J and Vere-Jones, David}, year = {2007}, publisher = {Springer Science \& Business Media} } @article{datar2002maintaining, title = {Maintaining stream statistics over sliding windows}, author = {Datar, Mayur and Gionis, Aristides and Indyk, Piotr and Motwani, Rajeev}, journal = {SIAM journal on computing}, volume = {31}, number = {6}, pages = {1794--1813}, year = {2002}, publisher = {SIAM} } @article{de2013unique, title = {Unique in the crowd: The privacy bounds of human mobility}, author = {De Montjoye, Yves-Alexandre and Hidalgo, C{\'e}sar A and Verleysen, Michel and Blondel, Vincent D}, journal = {Scientific reports}, volume = {3}, pages = {1376}, year = {2013}, publisher = {Nature Publishing Group} } @article{desfontaines2020sok, title = {Sok: Differential privacies}, author = {Desfontaines, Damien and Pej{\'o}, Bal{\'a}zs}, journal = {Proceedings on Privacy Enhancing Technologies}, volume = {2020}, number = {2}, pages = {288--313}, year = {2020}, publisher = {Sciendo} } @article{douglas1973algorithms, title = {Algorithms for the reduction of the number of points required to represent a digitized line or its caricature}, author = {Douglas, David H and Peucker, Thomas K}, journal = {Cartographica: the international journal for geographic information and geovisualization}, volume = {10}, number = {2}, pages = {112--122}, year = {1973}, publisher = {University of Toronto Press} } @inproceedings{duchi2013local, title = {Local privacy and statistical minimax rates}, author = {Duchi, John C and Jordan, Michael I and Wainwright, Martin J}, booktitle = {2013 IEEE 54th Annual Symposium on Foundations of Computer Science}, pages = {429--438}, year = {2013}, organization = {IEEE} } @inproceedings{durr2011position, title = {Position sharing for location privacy in non-trusted systems}, author = {D{\"u}rr, Frank and Skvortsov, Pavel and Rothermel, Kurt}, booktitle = {Pervasive Computing and Communications (PerCom), 2011 IEEE International Conference on}, pages = {189--196}, year = {2011}, organization = {IEEE} } @inproceedings{dwork2006calibrating, title = {Calibrating noise to sensitivity in private data analysis}, author = {Dwork, Cynthia and McSherry, Frank and Nissim, Kobbi and Smith, Adam}, booktitle = {Theory of cryptography conference}, pages = {265--284}, year = {2006}, organization = {Springer} } @inproceedings{dwork2008differential, title = {Differential privacy: A survey of results}, author = {Dwork, Cynthia}, booktitle = {International Conference on Theory and Applications of Models of Computation}, pages = {1--19}, year = {2008}, organization = {Springer} } @inproceedings{dwork2010differential, title = {Differential privacy under continual observation}, author = {Dwork, Cynthia and Naor, Moni and Pitassi, Toniann and Rothblum, Guy N}, booktitle = {Proceedings of the forty-second ACM symposium on Theory of computing}, pages = {715--724}, year = {2010}, organization = {ACM} } @inproceedings{dwork2010pan, title = {Pan-Private Streaming Algorithms.}, author = {Dwork, Cynthia and Naor, Moni and Pitassi, Toniann and Rothblum, Guy N and Yekhanin, Sergey}, booktitle = {ICS}, pages = {66--80}, year = {2010} } @article{dwork2011firm, title = {A firm foundation for private data analysis}, author = {Dwork, Cynthia}, journal = {Communications of the ACM}, volume = {54}, number = {1}, pages = {86--95}, year = {2011}, publisher = {ACM} } @article{dwork2014algorithmic, title = {The algorithmic foundations of differential privacy}, author = {Dwork, Cynthia and Roth, Aaron and others}, journal = {Foundations and Trends{\textregistered} in Theoretical Computer Science}, volume = {9}, number = {3--4}, pages = {211--407}, year = {2014}, publisher = {Now Publishers, Inc.} } @article{eames2003contact, title = {Contact tracing and disease control}, author = {Eames, Ken TD and Keeling, Matt J}, journal = {Proceedings of the Royal Society of London. Series B: Biological Sciences}, volume = {270}, number = {1533}, pages = {2565--2571}, year = {2003}, publisher = {The Royal Society} } @misc{economist2016data, title = {The world's most valuable resource is no longer oil, but data}, publisher = {The Economist}, year = {2016}, howpublished = {\url{https://economist.com/leaders/2017/05/06/the-worlds-most-valuable-resource-is-no-longer-oil-but-data}}, note = {Accessed on October 11, 2021} } @inproceedings{efthymiou2015big, title = {Big data entity resolution: From highly to somehow similar entity descriptions in the Web}, author = {Efthymiou, Vasilis and Stefanidis, Kostas and Christophides, Vassilis}, booktitle = {2015 IEEE International Conference on Big Data (Big Data)}, pages = {401--410}, year = {2015}, organization = {IEEE} } @inproceedings{eiter2017spatial, title = {Spatial ontology-mediated query answering over mobility streams}, author = {Eiter, Thomas and Parreira, Josiane Xavier and Schneider, Patrik}, booktitle = {European Semantic Web Conference}, pages = {219--237}, year = {2017}, organization = {Springer} } @inproceedings{erdogdu2015privacy, title = {Privacy-utility trade-off under continual observation}, author = {Erdogdu, Murat A and Fawaz, Nadia}, booktitle = {ISIT}, pages = {1801--1805}, year = {2015} } @inproceedings{erlingsson2014rappor, title = {Rappor: Randomized aggregatable privacy-preserving ordinal response}, author = {Erlingsson, {\'U}lfar and Pihur, Vasyl and Korolova, Aleksandra}, booktitle = {Proceedings of the 2014 ACM SIGSAC conference on computer and communications security}, pages = {1054--1067}, year = {2014}, organization = {ACM} } @inproceedings{errounda2018continuous, title = {Continuous location statistics sharing algorithm with local differential privacy}, author = {Errounda, Fatima Zahra and Liu, Yan}, booktitle = {2018 IEEE International Conference on Big Data (Big Data)}, pages = {5147--5152}, year = {2018}, organization = {IEEE} } @online{experian, title = {Experian}, url = {https://experian.com}, year = {Accessed on October 11, 2021} } @online{facebook, title = {Facebook}, \url = {https://facebook.com}, year = {Accessed on October 11, 2021} } @inproceedings{fan2013differentially, title = {Differentially private multi-dimensional time series release for traffic monitoring}, author = {Fan, Liyue and Xiong, Li and Sunderam, Vaidy}, booktitle = {IFIP Annual Conference on Data and Applications Security and Privacy}, pages = {33--48}, year = {2013}, organization = {Springer} } @article{fan2014adaptive, title = {An adaptive approach to real-time aggregate monitoring with differential privacy}, author = {Fan, Liyue and Xiong, Li}, journal = {IEEE Transactions on Knowledge and Data Engineering}, volume = {26}, number = {9}, pages = {2094--2106}, year = {2014}, publisher = {IEEE} } @inproceedings{farokhi2020temporally, title = {Temporally Discounted Differential Privacy for Evolving Datasets on an Infinite Horizon}, author = {Farokhi, Farhad}, booktitle = {2020 ACM/IEEE 11th International Conference on Cyber-Physical Systems (ICCPS)}, pages = {1--8}, year = {2020}, organization = {IEEE} } @article{fiore2019privacy, title = {Privacy of trajectory micro-data: a survey}, author = {Fiore, Marco and Katsikouli, Panagiota and Zavou, Elli and Cunche, Mathieu and Fessant, Fran{\c{c}}oise and Hello, Dominique Le and Aivodji, Ulrich Matchi and Olivier, Baptiste and Quertier, Tony and Stanica, Razvan}, journal = {arXiv preprint arXiv:1903.12211}, year = {2019} } @online{foursquare, title = {Foursquare}, url = {https://foursquare.com}, year = {Accessed on October 11, 2021} } @misc{franceschi-bicchierairussell2015redditor, title = {Redditor cracks anonymous data trove to pinpoint Muslim cab drivers}, author = {Franceschi-Bicchierai, Lorenzo}, year = {2015}, publisher = {Mashable}, howpublished = {\url{https://mashable.com/2015/01/28/redditor-muslim-cab-drivers}}, note = {Accessed on October 11, 2021} } @book{fuller2009introduction, title = {Introduction to statistical time series}, author = {Fuller, Wayne A}, volume = {428}, year = {2009}, publisher = {John Wiley \& Sons} } @inproceedings{fung2008anonymity, title = {Anonymity for continuous data publishing}, author = {Fung, Benjamin and Wang, Ke and Fu, Ada Wai-Chee and Pei, Jian}, booktitle = {Proceedings of the 11th international conference on Extending database technology: Advances in database technology}, pages = {264--275}, year = {2008}, organization = {ACM} } @book{gagniuc2017markov, title = {Markov Chains: From Theory to Implementation and Experimentation}, author = {Gagniuc, Paul A}, year = {2017}, publisher = {John Wiley \& Sons} } @incollection{gama2007data, title = {Data stream processing}, author = {Gama, Jo{\~a}o and Rodrigues, Pedro Pereira}, booktitle = {Learning from Data Streams}, pages = {25--39}, year = {2007}, publisher = {Springer} } @inproceedings{gambs2010show, title = {Show me how you move and I will tell you who you are}, author = {Gambs, S{\'e}bastien and Killijian, Marc-Olivier and del Prado Cortez, Miguel N{\'u}{\~n}ez}, booktitle = {Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS}, pages = {34--41}, year = {2010} } @inproceedings{ganta2008composition, title = {Composition attacks and auxiliary information in data privacy}, author = {Ganta, Srivatsava Ranjit and Kasiviswanathan, Shiva Prasad and Smith, Adam}, booktitle = {Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining}, pages = {265--273}, year = {2008}, organization = {ACM} } @article{garcia2015edge, title = {Edge-centric computing: Vision and challenges}, author = {Garcia Lopez, Pedro and Montresor, Alberto and Epema, Dick and Datta, Anwitaman and Higashino, Teruo and Iamnitchi, Adriana and Barcellos, Marinho and Felber, Pascal and Riviere, Etienne}, journal = {ACM SIGCOMM Computer Communication Review}, volume = {45}, number = {5}, pages = {37--42}, year = {2015}, publisher = {ACM} } @article{gedik2008protecting, title = {Protecting location privacy with personalized k-anonymity: Architecture and algorithms}, author = {Gedik, Bugra and Liu, Ling}, journal = {IEEE Transactions on Mobile Computing}, volume = {7}, number = {1}, pages = {1--18}, year = {2008}, publisher = {IEEE} } @inproceedings{ghinita2008private, title = {Private queries in location based services: anonymizers are not necessary}, author = {Ghinita, Gabriel and Kalnis, Panos and Khoshgozaran, Ali and Shahabi, Cyrus and Tan, Kian-Lee}, booktitle = {Proceedings of the 2008 ACM SIGMOD international conference on Management of data}, pages = {121--132}, year = {2008}, organization = {ACM} } @inproceedings{ghinita2009preventing, title = {Preventing velocity-based linkage attacks in location-aware applications}, author = {Ghinita, Gabriel and Damiani, Maria Luisa and Silvestri, Claudio and Bertino, Elisa}, booktitle = {Proceedings of the 17th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems}, pages = {246--255}, year = {2009}, organization = {ACM} } @online{gmaps, title = {Google Maps}, url = {https://google.com/maps}, year = {Accessed on October 11, 2021} } @article{goldreich1998secure, title = {Secure multi-party computation}, author = {Goldreich, Oded}, journal = {Manuscript. Preliminary version}, volume = {78}, year = {1998} } @inproceedings{gotz2012maskit, title = {Maskit: Privately releasing user context streams for personalized mobile applications}, author = {G{\"o}tz, Michaela and Nath, Suman and Gehrke, Johannes}, booktitle = {Proceedings of the 2012 ACM SIGMOD International Conference on Management of Data}, pages = {289--300}, year = {2012}, organization = {ACM} } @book{grunwald2007minimum, title = {The minimum description length principle}, author = {Gr{\"u}nwald, Peter D}, year = {2007}, publisher = {MIT press} } @article{gruteser2004protecting, title = {Protecting privacy, in continuous location-tracking applications}, author = {Gruteser, Marco and Liu, Xuan}, journal = {IEEE Security \& Privacy}, volume = {2}, number = {2}, pages = {28--34}, year = {2004}, publisher = {IEEE} } @misc{gualtieri2016perishable, author = {Mike Gualtieri, Rowan Curran, Holger Kisker and Emily Miller}, title = {Perishable Insights -- Stop Wasting Money On Unactionable Analytics}, organization = {Forrester}, year = {2016} } @article{gursoy2018differentially, title = {Differentially private and utility preserving publication of trajectory data}, author = {Gursoy, Mehmet Emre and Liu, Ling and Truex, Stacey and Yu, Lei}, journal = {IEEE Transactions on Mobile Computing}, year = {2018}, publisher = {IEEE} } @incollection{haas2016data, title = {Data-stream sampling: basic techniques and results}, author = {Haas, Peter J}, booktitle = {Data Stream Management}, pages = {13--44}, year = {2016}, publisher = {Springer} } @inproceedings{hariharan2004project, title = {Project Lachesis: parsing and modeling location histories}, author = {Hariharan, Ramaswamy and Toyama, Kentaro}, booktitle = {International Conference on Geographic Information Science}, pages = {106--124}, year = {2004}, organization = {Springer} } @inproceedings{hazarika2001qualitative, title = {Qualitative spatio-temporal continuity}, author = {Hazarika, Shyamanta M and Cohn, Anthony G}, booktitle = {International Conference on Spatial Information Theory}, pages = {92--107}, year = {2001}, organization = {Springer} } @article{he2011preventing, title = {Preventing equivalence attacks in updated, anonymized data}, author = {He, Yeye and Barman, Siddharth and Naughton, Jeffrey}, year = {2011} } @article{he2015dpt, title = {DPT: differentially private trajectory synthesis using hierarchical reference systems}, author = {He, Xi and Cormode, Graham and Machanavajjhala, Ashwin and Procopiuc, Cecilia M and Srivastava, Divesh}, journal = {Proceedings of the VLDB Endowment}, volume = {8}, number = {11}, pages = {1154--1165}, year = {2015}, publisher = {VLDB Endowment} } @inproceedings{hua2015differentially, title = {Differentially private publication of general time-serial trajectory data}, author = {Hua, Jingyu and Gao, Yue and Zhong, Sheng}, booktitle = {Computer Communications (INFOCOM), 2015 IEEE Conference on}, pages = {549--557}, year = {2015}, organization = {IEEE} } @article{huguenin2017predictive, title = {A predictive model for user motivation and utility implications of privacy-protection mechanisms in location check-ins}, author = {Huguenin, K{\'e}vin and Bilogrevic, Igor and Machado, Joana Soares and Mihaila, Stefan and Shokri, Reza and Dacosta, Italo and Hubaux, Jean-Pierre}, journal = {IEEE Transactions on Mobile Computing}, volume = {17}, number = {4}, pages = {760--774}, year = {2017}, publisher = {IEEE} } @article{jain2016big, title = {Big data privacy: a technological perspective and review}, author = {Jain, Priyank and Gyanchandani, Manasi and Khare, Nilay}, journal = {Journal of Big Data}, volume = {3}, number = {1}, pages = {25}, year = {2016}, publisher = {Springer} } @article{ji2014differential, title = {Differential privacy and machine learning: a survey and review}, author = {Ji, Zhanglong and Lipton, Zachary C and Elkan, Charles}, journal = {arXiv preprint arXiv:1412.7584}, year = {2014} } @article{jiang2006research, title = {Research issues in data stream association rule mining}, author = {Jiang, Nan and Gruenwald, Le}, journal = {ACM Sigmod Record}, volume = {35}, number = {1}, pages = {14--19}, year = {2006}, publisher = {ACM New York, NY, USA} } @inproceedings{jiang2013publishing, title = {Publishing trajectories with differential privacy guarantees}, author = {Jiang, Kaifeng and Shao, Dongxu and Bressan, St{\'e}phane and Kister, Thomas and Tan, Kian-Lee}, booktitle = {Proceedings of the 25th International Conference on Scientific and Statistical Database Management}, pages = {12}, year = {2013}, organization = {ACM} } @article{johnson2018towards, title = {Towards practical differential privacy for SQL queries}, author = {Johnson, Noah and Near, Joseph P and Song, Dawn}, journal = {Proceedings of the VLDB Endowment}, volume = {11}, number = {5}, pages = {526--539}, year = {2018}, publisher = {VLDB Endowment} } @article{kalman1960new, title = {A new approach to linear filtering and prediction problems}, author = {Kalman, Rudolph Emil}, journal = {Journal of basic Engineering}, volume = {82}, number = {1}, pages = {35--45}, year = {1960}, publisher = {American Society of Mechanical Engineers} } @inproceedings{kamara2010cryptographic, title = {Cryptographic cloud storage}, author = {Kamara, Seny and Lauter, Kristin}, booktitle = {International Conference on Financial Cryptography and Data Security}, pages = {136--149}, year = {2010}, organization = {Springer} } @book{karlin2014first, title = {A first course in stochastic processes}, author = {Karlin, Samuel}, year = {2014}, publisher = {Academic press} } @inproceedings{katsomallos2014easyharvest, title = {EasyHarvest: Supporting the deployment and management of sensing applications on smartphones}, author = {Katsomallos, Manos and Lalis, Spyros}, booktitle = {Pervasive Computing and Communications Workshops (PERCOM Workshops), 2014 IEEE International Conference on}, pages = {80--85}, year = {2014}, organization = {IEEE} } @inproceedings{katsomallos2017open, title = {An open framework for flexible plug-in privacy mechanisms in crowdsensing applications}, author = {Katsomallos, Manos and Lalis, Spyros and Papaioannou, Thanasis and Theodorakopoulos, George}, booktitle = {Pervasive Computing and Communications Workshops (PerCom Workshops), 2017 IEEE International Conference on}, pages = {237--242}, year = {2017}, organization = {IEEE} } @article{katsomallos2019privacy, title = {Privacy, Space and Time: a Survey on Privacy-Preserving Continuous Data Publishing}, author = {Katsomallos, Manos and Tzompanaki, Katerina and Kotzinos, Dimitris}, journal = {Journal of Spatial Information Science}, volume = {2019}, number = {19}, pages = {57--103}, year = {2019} } @inproceedings{kellaris2013practical, title = {Practical differential privacy via grouping and smoothing}, author = {Kellaris, Georgios and Papadopoulos, Stavros}, booktitle = {Proceedings of the VLDB Endowment}, volume = {6}, number = {5}, pages = {301--312}, year = {2013}, organization = {VLDB Endowment} } @article{kellaris2014differentially, title = {Differentially private event sequences over infinite streams}, author = {Kellaris, Georgios and Papadopoulos, Stavros and Xiao, Xiaokui and Papadias, Dimitris}, journal = {Proceedings of the VLDB Endowment}, volume = {7}, number = {12}, pages = {1155--1166}, year = {2014}, publisher = {VLDB Endowment} } @article{khurana2010smart, title = {Smart-grid security issues}, author = {Khurana, Himanshu and Hadley, Mark and Lu, Ning and Frincke, Deborah A}, journal = {IEEE Security \& Privacy}, volume = {8}, number = {1}, pages = {81--85}, year = {2010}, publisher = {IEEE} } @inproceedings{kido2005anonymous, title = {An anonymous communication technique using dummies for location-based services}, author = {Kido, Hidetoshi and Yanagisawa, Yutaka and Satoh, Tetsuji}, booktitle = {Pervasive Services, 2005. ICPS'05. Proceedings. International Conference on}, pages = {88--97}, year = {2005}, organization = {IEEE} } @inproceedings{kifer2009attacks, title = {Attacks on privacy and deFinetti's theorem}, author = {Kifer, Daniel}, booktitle = {Proceedings of the 2009 ACM SIGMOD International Conference on Management of data}, pages = {127--138}, year = {2009}, organization = {ACM} } @inproceedings{kifer2011no, title = {No free lunch in data privacy}, author = {Kifer, Daniel and Machanavajjhala, Ashwin}, booktitle = {Proceedings of the 2011 ACM SIGMOD International Conference on Management of data}, pages = {193--204}, year = {2011}, organization = {ACM} } @article{kifer2014pufferfish, title = {Pufferfish: A framework for mathematical privacy definitions}, author = {Kifer, Daniel and Machanavajjhala, Ashwin}, journal = {ACM Transactions on Database Systems (TODS)}, volume = {39}, number = {1}, pages = {3}, year = {2014}, publisher = {ACM} } @article{king1983centralized, title = {Centralized versus decentralized computing: organizational considerations and management options}, author = {King, John Leslie}, journal = {ACM Computing Surveys (CSUR)}, volume = {15}, number = {4}, pages = {319--349}, year = {1983}, publisher = {ACM} } @incollection{knuth1968art, author = {Knuth, Donald Ervin}, title = {Seminumerical Algorithms}, booktitle = {The Art of Computer Programming}, publisher = {Addison-Wesley}, year = {1968}, volume = {2}, edition = {2}, isbn = {0-201-03801-3} } @inproceedings{krumm2013placer, title = {Placer: semantic place labels from diary data}, author = {Krumm, John and Rouhana, Dany}, booktitle = {Proceedings of the 2013 ACM international joint conference on Pervasive and ubiquitous computing}, pages = {163--172}, year = {2013} } @article{lafferty2001conditional, title = {Conditional random fields: Probabilistic models for segmenting and labeling sequence data}, author = {Lafferty, John and McCallum, Andrew and Pereira, Fernando CN}, year = {2001} } @article{laney20013d, title = {3D data management: Controlling data volume, velocity and variety}, author = {Laney, Doug}, journal = {META Group Research Note}, volume = {6}, number = {70}, year = {2001} } @book{lawler2010random, title = {Random walk: a modern introduction}, author = {Lawler, Gregory F and Limic, Vlada}, volume = {123}, year = {2010}, publisher = {Cambridge University Press} } @inproceedings{lee2008trajectory, title = {Trajectory outlier detection: A partition-and-detect framework}, author = {Lee, Jae-Gil and Han, Jiawei and Li, Xiaolei}, booktitle = {2008 IEEE 24th International Conference on Data Engineering}, pages = {140--149}, year = {2008}, organization = {IEEE} } @inproceedings{lee2011much, title = {How much is enough? choosing $\varepsilon$ for differential privacy}, author = {Lee, Jaewoo and Clifton, Chris}, booktitle = {International Conference on Information Security}, pages = {325--340}, year = {2011}, organization = {Springer} } @article{legendre1993spatial, title = {Spatial autocorrelation: trouble or new paradigm?}, author = {Legendre, Pierre}, journal = {Ecology}, volume = {74}, number = {6}, pages = {1659--1673}, year = {1993}, publisher = {Wiley Online Library} } @inproceedings{li2007hiding, title = {Hiding in the crowd: Privacy preservation on evolving streams through correlation tracking}, author = {Li, Feifei and Sun, Jimeng and Papadimitriou, Spiros and Mihaila, George A and Stanoi, Ioana}, booktitle = {Data Engineering, 2007. ICDE 2007. IEEE 23rd International Conference on}, pages = {686--695}, year = {2007}, organization = {IEEE} } @inproceedings{li2007t, title = {t-closeness: Privacy beyond k-anonymity and l-diversity}, author = {Li, Ninghui and Li, Tiancheng and Venkatasubramanian, Suresh}, booktitle = {Data Engineering, 2007. ICDE 2007. IEEE 23rd International Conference on}, pages = {106--115}, year = {2007}, organization = {IEEE} } @inproceedings{li2008mining, title = {Mining user similarity based on location history}, author = {Li, Quannan and Zheng, Yu and Xie, Xing and Chen, Yukun and Liu, Wenyu and Ma, Wei-Ying}, booktitle = {Proceedings of the 16th ACM SIGSPATIAL international conference on Advances in geographic information systems}, pages = {1--10}, year = {2008} } @inproceedings{li2012sampling, title = {On sampling, anonymization, and differential privacy or, k-anonymization meets differential privacy}, author = {Li, Ninghui and Qardaji, Wahbeh and Su, Dong}, booktitle = {Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security}, pages = {32--33}, year = {2012}, organization = {ACM} } @article{li2016hybrid, title = {A hybrid approach to prevent composition attacks for independent data releases}, author = {Li, Jiuyong and Baig, Muzammil M and Sattar, AHM Sarowar and Ding, Xiaofeng and Liu, Jixue and Vincent, Millist W}, journal = {Information Sciences}, volume = {367}, pages = {324--336}, year = {2016}, publisher = {Elsevier} } @article{li2017achieving, title = {Achieving differential privacy of trajectory data publishing in participatory sensing}, author = {Li, Meng and Zhu, Liehuang and Zhang, Zijian and Xu, Rixin}, journal = {Information Sciences}, volume = {400}, pages = {1--13}, year = {2017}, publisher = {Elsevier} } @incollection{lifshits2012lectures, title = {Lectures on Gaussian processes}, author = {Lifshits, Mikhail}, booktitle = {Lectures on Gaussian Processes}, pages = {1--117}, year = {2012}, publisher = {Springer} } @inproceedings{liu2016dependence, title = {Dependence Makes You Vulnerable: Differential Privacy Under Dependent Tuples}, author = {Liu, Changchang and Chakraborty, Supriyo and Mittal, Prateek}, booktitle = {NDSS}, volume = {16}, pages = {21--24}, year = {2016} } @article{lyon2014surveillance, title = {Surveillance, Snowden, and big data: Capacities, consequences, critique}, author = {Lyon, David}, journal = {Big Data \& Society}, volume = {1}, number = {2}, pages = {2053951714541861}, year = {2014}, publisher = {SAGE Publications Sage UK: London, England} } @article{ma2017plp, title = {PLP: Protecting location privacy against correlation analyze Attack in crowdsensing}, author = {Ma, Qiang and Zhang, Shanfeng and Zhu, Tong and Liu, Kebin and Zhang, Lan and He, Wenbo and Liu, Yunhao}, journal = {IEEE transactions on mobile computing}, volume = {16}, number = {9}, pages = {2588--2598}, year = {2017}, publisher = {IEEE} } @article{ma2019real, title = {Real-time privacy-preserving data release over vehicle trajectory}, author = {Ma, Zhuo and Zhang, Tian and Liu, Ximeng and Li, Xinghua and Ren, Kui}, journal = {IEEE transactions on vehicular technology}, volume = {68}, number = {8}, pages = {8091--8102}, year = {2019}, publisher = {IEEE} } @inproceedings{machanavajjhala2006diversity, title = {l-diversity: Privacy beyond k-anonymity}, author = {Machanavajjhala, Ashwin and Gehrke, Johannes and Kifer, Daniel and Venkitasubramaniam, Muthuramakrishnan}, booktitle = {Data Engineering, 2006. ICDE'06. Proceedings of the 22nd International Conference on}, pages = {24--24}, year = {2006}, organization = {IEEE} } @article{machanavajjhala2015designing, title = {Designing statistical privacy for your data}, author = {Machanavajjhala, Ashwin and Kifer, Daniel}, journal = {Communications of the ACM}, volume = {58}, number = {3}, pages = {58--67}, year = {2015}, publisher = {ACM} } @techreport{makonin2018hue, title = {HUE: The hourly usage of energy dataset for buildings in British Columbia}, author = {Makonin, Stephen}, year = {2018} } @article{matyas1990visual, title = {Visual analysis of single-case time series: Effects of variability, serial dependence, and magnitude of intervention effects}, author = {Matyas, Thomas A and Greenwood, Kenneth M}, journal = {Journal of Applied Behavior Analysis}, volume = {23}, number = {3}, pages = {341--351}, year = {1990}, publisher = {Wiley Online Library} } @inproceedings{mcsherry2007mechanism, title = {Mechanism design via differential privacy}, author = {McSherry, Frank and Talwar, Kunal}, booktitle = {Foundations of Computer Science, 2007. FOCS'07. 48th Annual IEEE Symposium on}, pages = {94--103}, year = {2007}, organization = {IEEE} } @inproceedings{mcsherry2009privacy, title = {Privacy integrated queries: an extensible platform for privacy-preserving data analysis}, author = {McSherry, Frank D}, booktitle = {Proceedings of the 2009 ACM SIGMOD International Conference on Management of data}, pages = {19--30}, year = {2009}, organization = {ACM} } @inproceedings{metwally2005duplicate, title = {Duplicate detection in click streams}, author = {Metwally, Ahmed and Agrawal, Divyakant and El Abbadi, Amr}, booktitle = {Proceedings of the 14th international conference on World Wide Web}, pages = {12--21}, year = {2005} } @article{moran1950notes, title = {Notes on continuous stochastic phenomena}, author = {Moran, Patrick AP}, journal = {Biometrika}, volume = {37}, number = {1/2}, pages = {17--23}, year = {1950}, publisher = {JSTOR} } @inproceedings{motwani2007efficient, title = {Efficient algorithms for masking and finding quasi-identifiers}, author = {Motwani, Rajeev and Xu, Ying}, booktitle = {Proceedings of the Conference on Very Large Data Bases (VLDB)}, pages = {83--93}, year = {2007} } @article{muthukrishnan2005data, title = {Data streams: Algorithms and applications}, author = {Muthukrishnan, Shanmugavelayutham and others}, journal = {Foundations and Trends{\textregistered} in Theoretical Computer Science}, volume = {1}, number = {2}, pages = {117--236}, year = {2005}, publisher = {Now Publishers, Inc.} } @inproceedings{naim2019off, title = {ON-OFF privacy with correlated requests}, author = {Naim, Carolina and Ye, Fangwei and El Rouayheb, Salim}, booktitle = {2019 IEEE International Symposium on Information Theory (ISIT)}, pages = {817--821}, year = {2019}, organization = {IEEE} } @inproceedings{narayanan2008robust, title = {Robust de-anonymization of large sparse data sets}, author = {Narayanan, Arvind and Shmatikov, Vitaly}, booktitle = {Security and Privacy, 2008. SP 2008. IEEE Symposium on}, pages = {111--125}, year = {2008}, organization = {IEEE} } @online{osm, title = {OpenStreetMap}, url = {https://openstreetmap.org}, year = {Accessed on October 11, 2021} } @article{ou2018optimal, title = {An optimal pufferfish privacy mechanism for temporally correlated trajectories}, author = {Ou, Lu and Qin, Zheng and Liao, Shaolin and Yin, Hui and Jia, Xiaohua}, journal = {IEEE Access}, volume = {6}, pages = {37150--37165}, year = {2018}, publisher = {IEEE} } @inproceedings{ozccep2015stream, title = {Stream-query compilation with ontologies}, author = {{\"O}z{\c{c}}ep, {\"O}zg{\"u}r L{\"u}tf{\"u} and M{\"o}ller, Ralf and Neuenstadt, Christian}, booktitle = {Australasian Joint Conference on Artificial Intelligence}, pages = {457--463}, year = {2015}, organization = {Springer} } @article{papoulis1984bayes, title = {Bayes' theorem in statistics and Bayes' theorem in statistics (reexamined)}, author = {Papoulis, A}, journal = {Probability, random variables, and stochastic processes. 2nd ed. New York, NY: McGraw-Hill}, pages = {38--114}, year = {1984} } @book{park2018fundamentals, title = {Fundamentals of Probability and Stochastic Processes with Applications to Communications}, author = {Park, Kun Il and Park}, year = {2018}, publisher = {Springer} } @inproceedings{perera2014mosden, title = {Mosden: An internet of things middleware for resource constrained mobile devices}, author = {Perera, Charith and Jayaraman, Prem Prakash and Zaslavsky, Arkady and Christen, Peter and Georgakopoulos, Dimitrios}, booktitle = {2014 47th Hawaii International Conference on System Sciences}, pages = {1053--1062}, year = {2014}, organization = {IEEE} } @inproceedings{primault2015time, title = {Time distortion anonymization for the publication of mobility data with high utility}, author = {Primault, Vincent and Mokhtar, Sonia Ben and Lauradoux, C{\'e}dric and Brunie, Lionel}, booktitle = {Trustcom/BigDataSE/ISPA, 2015 IEEE}, volume = {1}, pages = {539--546}, year = {2015}, organization = {IEEE} } @article{primault2018long, title = {The Long Road to Computational Location Privacy: A Survey}, author = {Primault, Vincent and Boutet, Antoine and Mokhtar, Sonia Ben and Brunie, Lionel}, journal = {IEEE Communications Surveys \& Tutorials}, year = {2018}, publisher = {IEEE} } @book{quinlan2014c4, title = {Programs for machine learning}, author = {Quinlan, J Ross}, year = {2014}, publisher = {Elsevier} } @inproceedings{quoc2017privapprox, title = {PrivApprox: privacy-preserving stream analytics}, author = {Quoc, Do Le and Beck, Martin and Bhatotia, Pramod and Chen, Ruichuan and Fetzer, Christof and Strufe, Thorsten}, booktitle = {Proceedings of the 2017 USENIX Conference on Usenix Annual Technical Conference}, pages = {659--672}, year = {2017}, organization = {USENIX Association} } @article{raghupathi2014big, title = {Big data analytics in healthcare: promise and potential}, author = {Raghupathi, Wullianallur and Raghupathi, Viju}, journal = {Health information science and systems}, volume = {2}, number = {1}, pages = {3}, year = {2014}, publisher = {BioMed Central} } @article{ramsay2004functional, title = {Functional data analysis}, author = {Ramsay, James O}, journal = {Encyclopedia of Statistical Sciences}, volume = {4}, year = {2004}, publisher = {Wiley Online Library} } @inproceedings{riederer2016findyou, title = {Findyou: A personal location privacy auditing tool}, author = {Riederer, Christopher and Echickson, Daniel and Huang, Stephanie and Chaintreau, Augustin}, booktitle = {Proceedings of the 25th International Conference Companion on World Wide Web}, pages = {243--246}, year = {2016} } @online{ring, title = {Ring}, url = {https://ring.com}, year = {Accessed on October 11, 2021} } @book{rogers2000diffusions, title = {Diffusions, Markov processes and martingales: Volume 2, It{\^o} calculus}, author = {Rogers, L Chris G and Williams, David}, volume = {2}, year = {2000}, publisher = {Cambridge university press} } @misc{russell2018fitness, title = {Fitness app {Strava} exposes the location of military bases}, author = {Russell, Jon}, year = {2018}, publisher = {TechCrunch}, howpublished = {\url{https://techcrunch.com/2018/01/28/strava-exposes-military-bases}}, note = {Accessed on October 11, 2021} } @inproceedings{samarati1998protecting, title = {Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression}, author = {Samarati, Pierangela and Sweeney, Latanya}, booktitle = {IEEE Symposium on Research in Security and Privacy in}, year = {1998}, organization = {IEEE} } @article{sapiezynski2019interaction, title = {Interaction data from the copenhagen networks study}, author = {Sapiezynski, Piotr and Stopczynski, Arkadiusz and Lassen, David Dreyer and Lehmann, Sune}, journal = {Scientific Data}, volume = {6}, number = {1}, pages = {1--10}, year = {2019}, publisher = {Nature Publishing Group} } @article{satyanarayanan2017emergence, title = {The emergence of edge computing}, author = {Satyanarayanan, Mahadev}, journal = {Computer}, volume = {50}, number = {1}, pages = {30--39}, year = {2017}, publisher = {IEEE} } @article{savage2013value, title = {The value of online privacy}, author = {Savage, Scott and Waldman, Donald M}, year = {2013} } @article{scaltsas1981identity, title = {Identity, Origin and Spatiotemporal Continuity}, author = {Scaltsas, Theodore}, journal = {Philosophy}, volume = {56}, number = {217}, pages = {395--402}, year = {1981}, publisher = {JSTOR} } @article{shannon2001mathematical, title = {A mathematical theory of communication}, author = {Shannon, Claude Elwood}, journal = {ACM SIGMOBILE mobile computing and communications review}, volume = {5}, number = {1}, pages = {3--55}, year = {2001}, publisher = {ACM} } @article{shmueli2012limiting, title = {Limiting disclosure of sensitive data in sequential releases of databases}, author = {Shmueli, Erez and Tassa, Tamir and Wasserstein, Raz and Shapira, Bracha and Rokach, Lior}, journal = {Information Sciences}, volume = {191}, pages = {98--127}, year = {2012}, publisher = {Elsevier} } @article{shmueli2015privacy, title = {Privacy by diversity in sequential releases of databases}, author = {Shmueli, Erez and Tassa, Tamir}, journal = {Information Sciences}, volume = {298}, pages = {344--372}, year = {2015}, publisher = {Elsevier} } @article{silva2013data, title = {Data stream clustering: A survey}, author = {Silva, Jonathan A and Faria, Elaine R and Barros, Rodrigo C and Hruschka, Eduardo R and De Carvalho, Andre CPLF and Gama, Jo{\~a}o}, journal = {ACM Computing Surveys (CSUR)}, volume = {46}, number = {1}, pages = {13}, year = {2013}, publisher = {ACM} } @inproceedings{simi2017extensive, title = {An extensive study on data anonymization algorithms based on k-anonymity}, author = {Simi, Ms MS and Nayaki, Mrs K Sankara and Elayidom, M Sudheep}, booktitle = {IOP Conference Series: Materials Science and Engineering}, volume = {225}, number = {1}, pages = {012279}, year = {2017}, organization = {IOP Publishing} } @book{skorokhod2005basic, title = {Basic principles and applications of probability theory}, author = {Skorokhod, Valeriy}, year = {2005}, publisher = {Springer Science \& Business Media} } @inproceedings{song2017pufferfish, title = {Pufferfish privacy mechanisms for correlated data}, author = {Song, Shuang and Wang, Yizhen and Chaudhuri, Kamalika}, booktitle = {Proceedings of the 2017 ACM International Conference on Management of Data}, pages = {1291--1306}, year = {2017}, organization = {ACM} } @article{soria2016big, title = {Big data privacy: challenges to privacy principles and models}, author = {Soria-Comas, Jordi and Domingo-Ferrer, Josep}, journal = {Data Science and Engineering}, volume = {1}, number = {1}, pages = {21--28}, year = {2016}, publisher = {Springer} } @inproceedings{sorkine2004laplacian, title = {Laplacian surface editing}, author = {Sorkine, Olga and Cohen-Or, Daniel and Lipman, Yaron and Alexa, Marc and R{\"o}ssl, Christian and Seidel, H-P}, booktitle = {Proceedings of the 2004 Eurographics/ACM SIGGRAPH symposium on Geometry processing}, pages = {175--184}, year = {2004} } @article{stigler1989francis, title = {Francis Galton's account of the invention of correlation}, author = {Stigler, Stephen M}, journal = {Statistical Science}, pages = {73--79}, year = {1989}, publisher = {JSTOR} } @article{sweeney2002achieving, title = {Achieving k-anonymity privacy protection using generalization and suppression}, author = {Sweeney, Latanya}, journal = {International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems}, volume = {10}, number = {05}, pages = {571--588}, year = {2002}, publisher = {World Scientific} } @article{sweeney2002k, title = {k-anonymity: A model for protecting privacy}, author = {Sweeney, Latanya}, journal = {International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems}, volume = {10}, number = {05}, pages = {557--570}, year = {2002}, publisher = {World Scientific} } @article{tankard2016gdpr, title = {What the GDPR means for businesses}, author = {Tankard, Colin}, journal = {Network Security}, volume = {2016}, number = {6}, pages = {5--8}, year = {2016}, publisher = {Elsevier} } @article{tobler1970computer, title = {A computer movie simulating urban growth in the Detroit region}, author = {Tobler, Waldo R}, journal = {Economic geography}, volume = {46}, number = {sup1}, pages = {234--240}, year = {1970}, publisher = {Taylor \& Francis} } @online{tousanticovid, title = {TousAntiCovid}, url = {https://bonjour.tousanticovid.gouv.fr}, year = {Accessed on October 11, 2021} } @online{transunion, title = {TransUnion}, url = {https://transunion.com}, year = {Accessed on October 11, 2021} } @online{twitter, title = {Twitter}, url = {https://twitter.com}, year = {Accessed on October 11, 2021} } @inproceedings{varghese2016challenges, title = {Challenges and opportunities in edge computing}, author = {Varghese, Blesson and Wang, Nan and Barbhuiya, Sakil and Kilpatrick, Peter and Nikolopoulos, Dimitrios S}, booktitle = {2016 IEEE International Conference on Smart Cloud (SmartCloud)}, pages = {20--26}, year = {2016}, organization = {IEEE} } @article{vitter1985random, title = {Random sampling with a reservoir}, author = {Vitter, Jeffrey S}, journal = {ACM Transactions on Mathematical Software (TOMS)}, volume = {11}, number = {1}, pages = {37--57}, year = {1985}, publisher = {ACM} } @article{walters1982introduction, title = {An introduction to ergodic theory}, author = {Walters, Peter}, journal = {Graduate Texts in Mathematics}, year = {1982} } @inproceedings{wang2006anonymizing, title = {Anonymizing sequential releases}, author = {Wang, Ke and Fung, Benjamin}, booktitle = {Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining}, pages = {414--423}, year = {2006}, organization = {ACM} } @inproceedings{wang2009survey, title = {A survey on privacy preserving data mining}, author = {Wang, Jian and Luo, Yongcheng and Zhao, Yan and Le, Jiajin}, booktitle = {Database Technology and Applications, 2009 First International Workshop on}, pages = {111--114}, year = {2009}, organization = {IEEE} } @article{wang2010privacy, title = {Privacy-preserving data publishing: A survey on recent developments}, author = {Wang, K and Chen, R and Fung, BC and Yu, PS}, journal = {ACM Computing Surveys}, year = {2010} } @inproceedings{wang2016rescuedp, title = {RescueDP: Real-time spatio-temporal crowd-sourced data publishing with differential privacy}, author = {Wang, Qian and Zhang, Yan and Lu, Xiao and Wang, Zhibo and Qin, Zhan and Ren, Kui}, booktitle = {Computer Communications, IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on}, pages = {1--9}, year = {2016}, organization = {IEEE} } @article{wang2017cts, title = {CTS-DP: publishing correlated time-series data via differential privacy}, author = {Wang, Hao and Xu, Zhengquan}, journal = {Knowledge-Based Systems}, volume = {122}, pages = {167--179}, year = {2017}, publisher = {Elsevier} } @inproceedings{wang2017locally, title = {Locally differentially private protocols for frequency estimation}, author = {Wang, Tianhao and Blocki, Jeremiah and Li, Ninghui and Jha, Somesh}, booktitle = {26th $\{$USENIX$\}$ Security Symposium ($\{$USENIX$\}$ Security 17)}, pages = {729--745}, year = {2017} } @inproceedings{meshgi2015expanding, title={Expanding histogram of colors with gridding to improve tracking accuracy}, author={Meshgi, Kourosh and Ishii, Shin}, booktitle={2015 14th IAPR International Conference on Machine Vision Applications (MVA)}, pages={475--479}, year={2015}, organization={IEEE} } @inproceedings{wang2017privacy, title = {Privacy Preserving Anonymity for Periodical SRS Data Publishing}, author = {Wang, Jie-Teng and Lin, Wen-Yang}, booktitle = {Data Engineering (ICDE), 2017 IEEE 33rd International Conference on}, pages = {1344--1355}, year = {2017}, organization = {IEEE} } @article{wang2018privacy, title = {Privacy-protected statistics publication over social media user trajectory streams}, author = {Wang, Shuo and Sinnott, Richard and Nepal, Surya}, journal = {Future Generation Computer Systems}, volume = {87}, pages = {792--802}, year = {2018}, publisher = {Elsevier} } @article{wang2021current, title = {Why current differential privacy schemes are inapplicable for correlated data publishing?}, author = {Wang, Hao and Xu, Zhengquan and Jia, Shan and Xia, Ying and Zhang, Xu}, journal = {World Wide Web}, volume = {24}, pages = {1--23}, year = {2021}, publisher = {Springer} } @article{warner1965randomized, title = {Randomized response: A survey technique for eliminating evasive answer bias}, author = {Warner, Stanley L}, journal = {Journal of the American Statistical Association}, volume = {60}, number = {309}, pages = {63--69}, year = {1965}, publisher = {Taylor \& Francis} } @online{waze, title = {Waze}, url = {https://waze.com}, year = {Accessed on October 11, 2021} } @incollection{wei2006time, title = {Time series analysis}, author = {Wei, William WS}, booktitle = {The Oxford Handbook of Quantitative Methods in Psychology: Vol. 2}, year = {2006} } @article{wernke2014classification, title = {A classification of location privacy attacks and approaches}, author = {Wernke, Marius and Skvortsov, Pavel and D{\"u}rr, Frank and Rothermel, Kurt}, journal = {Personal and ubiquitous computing}, volume = {18}, number = {1}, pages = {163--175}, year = {2014}, publisher = {Springer} } @book{wiggins1967identity, title = {Identity and spatio-temporal continuity}, author = {Wiggins, David}, year = {1967}, publisher = {Blackwell Oxford} } @online{wiki, title = {Wikipedia}, url = {https://wikipedia.com}, year = {Accessed on October 11, 2021} } @misc{wired2014data, title = {Data Is the New Oil of the Digital Economy}, author = {Joris Toonders}, year = {2014}, publisher = {Wired}, howpublished = {\url{https://wired.com/insights/2014/07/data-new-oil-digital-economy}}, note = {Accessed on October 11, 2021} } @misc{wolfgang1999stochastic, title = {Stochastic Processes: From Physics to Finance}, author = {Wolfgang, Paul and Baschnagel, J}, year = {1999}, publisher = {Springer-Verlag, Berlin} } @inproceedings{wong2007minimality, title = {Minimality attack in privacy preserving data publishing}, author = {Wong, Raymond Chi-Wing and Fu, Ada Wai-Chee and Wang, Ke and Pei, Jian}, booktitle = {Proceedings of the 33rd international conference on Very large data bases}, pages = {543--554}, year = {2007}, organization = {VLDB Endowment} } @inproceedings{xiao2007m, title = {M-invariance: towards privacy preserving re-publication of dynamic data sets}, author = {Xiao, Xiaokui and Tao, Yufei}, booktitle = {Proceedings of the 2007 ACM SIGMOD international conference on Management of data}, pages = {689--700}, year = {2007}, organization = {ACM} } @inproceedings{xiao2015protecting, title = {Protecting locations with differential privacy under temporal correlations}, author = {Xiao, Yonghui and Xiong, Li}, booktitle = {Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security}, pages = {1298--1309}, year = {2015}, organization = {ACM} } @article{xiao2017loclok, title = {LocLok: location cloaking with differential privacy via hidden markov model}, author = {Xiao, Yonghui and Xiong, Li and Zhang, Si and Cao, Yang}, journal = {Proceedings of the VLDB Endowment}, volume = {10}, number = {12}, pages = {1901--1904}, year = {2017}, publisher = {VLDB Endowment} } @online{xssfopes2020tweet, title = {{@xssfopes: ``can anyone spot the issue with the algo? red is original data point, 400 ``anonymized'' data points calculated''}}, url = {https://twitter.com/xssfox/status/1251116087116042241}, year = {Accessed on October 11, 2021} } @inproceedings{yang2015bayesian, title = {Bayesian differential privacy on correlated data}, author = {Yang, Bin and Sato, Issei and Nakagawa, Hiroshi}, booktitle = {Proceedings of the 2015 ACM SIGMOD international conference on Management of Data}, pages = {747--762}, year = {2015}, organization = {ACM} } @inproceedings{ye2012meca, title = {Meca: mobile edge capture and analysis middleware for social sensing applications}, author = {Ye, Fan and Ganti, Raghu and Dimaghani, Raheleh and Grueneberg, Keith and Calo, Seraphin}, booktitle = {Proceedings of the 21st International Conference on World Wide Web}, pages = {699--702}, year = {2012}, organization = {ACM} } @inproceedings{ye2017trajectory, title = {A trajectory privacy-preserving algorithm based on road networks in continuous location-based services}, author = {Ye, Ayong and Li, Yacheng and Xu, Li and Li, Qing and Lin, Hui}, booktitle = {2017 IEEE Trustcom/BigDataSE/ICESS}, pages = {510--516}, year = {2017}, organization = {IEEE} } @inproceedings{ye2019preserving, title = {Preserving ON-OFF privacy for past and future requests}, author = {Ye, Fangwei and Naim, Carolina and El Rouayheb, Salim}, booktitle = {2019 IEEE Information Theory Workshop (ITW)}, pages = {1--5}, year = {2019}, organization = {IEEE} } @article{ye2020off, title = {ON-OFF Privacy in the Presence of Correlation}, author = {Ye, Fangwei and Naim, Carolina and Rouayheb, Salim El}, journal = {arXiv preprint arXiv:2004.04186}, year = {2020} } @article{ye2021off, title = {ON-OFF Privacy Against Correlation Over Time}, author = {Ye, Fangwei and Naim, Carolina and El Rouayheb, Salim}, journal = {IEEE Transactions on Information Forensics and Security}, volume = {16}, pages = {2104--2117}, year = {2021}, publisher = {IEEE} } @inproceedings{yuan2010t, title = {T-drive: driving directions based on taxi trajectories}, author = {Yuan, Jing and Zheng, Yu and Zhang, Chengyang and Xie, Wenlei and Xie, Xing and Sun, Guangzhong and Huang, Yan}, booktitle = {Proceedings of the 18th SIGSPATIAL International conference on advances in geographic information systems}, pages = {99--108}, year = {2010} } @inproceedings{yuan2011find, title = {Where to find my next passenger}, author = {Yuan, Jing and Zheng, Yu and Zhang, Liuhang and Xie, XIng and Sun, Guangzhong}, booktitle = {Proceedings of the 13th international conference on Ubiquitous computing}, pages = {109--118}, year = {2011} } @article{zhang2017privbayes, title = {Privbayes: Private data release via bayesian networks}, author = {Zhang, Jun and Cormode, Graham and Procopiuc, Cecilia M and Srivastava, Divesh and Xiao, Xiaokui}, journal = {ACM Transactions on Database Systems (TODS)}, volume = {42}, number = {4}, pages = {25}, year = {2017}, publisher = {ACM} } @inproceedings{zhao2017dependent, title = {Dependent Differential Privacy for Correlated Data}, author = {Zhao, Jun and Zhang, Junshan and Poor, H Vincent}, booktitle = {Globecom Workshops (GC Wkshps), 2017 IEEE}, pages = {1--7}, year = {2017}, organization = {IEEE} } @inproceedings{zheng2008learning, title = {Learning transportation mode from raw gps data for geographic applications on the web}, author = {Zheng, Yu and Liu, Like and Wang, Longhao and Xie, Xing}, booktitle = {Proceedings of the 17th international conference on World Wide Web}, pages = {247--256}, year = {2008} } @article{zheng2010geolife, title = {Geolife: A collaborative social networking service among user, location and trajectory.}, author = {Zheng, Yu and Xie, Xing and Ma, Wei-Ying and others}, journal = {IEEE Data Eng. Bull.}, volume = {33}, number = {2}, pages = {32--39}, year = {2010}, publisher = {Citeseer} } @article{zheng2015trajectory, title = {Trajectory data mining: an overview}, author = {Zheng, Yu}, journal = {ACM Transactions on Intelligent Systems and Technology (TIST)}, volume = {6}, number = {3}, pages = {1--41}, year = {2015}, publisher = {ACM New York, NY, USA} } @inproceedings{zhou2004discovering, title = {Discovering personal gazetteers: an interactive clustering approach}, author = {Zhou, Changqing and Frankowski, Dan and Ludford, Pamela and Shekhar, Shashi and Terveen, Loren}, booktitle = {Proceedings of the 12th annual ACM international workshop on Geographic information systems}, pages = {266--273}, year = {2004} } @article{zhou2008brief, title = {A brief survey on anonymization techniques for privacy preserving publishing of social network data}, author = {Zhou, Bin and Pei, Jian and Luk, WoShun}, journal = {ACM Sigkdd Explorations Newsletter}, volume = {10}, number = {2}, pages = {12--22}, year = {2008}, publisher = {ACM} } @inproceedings{zhou2009continuous, title = {Continuous privacy preserving publishing of data streams}, author = {Zhou, Bin and Han, Yi and Pei, Jian and Jiang, Bin and Tao, Yufei and Jia, Yan}, booktitle = {Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology}, pages = {648--659}, year = {2009}, organization = {ACM} } @article{zhu2015correlated, title = {Correlated differential privacy: hiding information in non-IID data set}, author = {Zhu, Tianqing and Xiong, Ping and Li, Gang and Zhou, Wanlei}, journal = {IEEE Transactions on Information Forensics and Security}, volume = {10}, number = {2}, pages = {229--242}, year = {2015}, publisher = {IEEE} } @article{zhu2017answering, title = {Answering differentially private queries for continual data sets release}, author = {Zhu, Tianqing and Li, Gang and Xiong, Ping and Zhou, Wanlei}, journal = {Future Generation Computer Systems}, year = {2017}, publisher = {Elsevier} }