1909 lines
66 KiB
BibTeX
1909 lines
66 KiB
BibTeX
@inproceedings{abul2008never,
|
|
title = {Never Walk Alone: Uncertainty for Anonymity in Moving Objects Databases.},
|
|
author = {Abul, Osman and Bonchi, Francesco and Nanni, Mirco and others},
|
|
booktitle = {ICDE},
|
|
volume = {8},
|
|
pages = {376--385},
|
|
year = {2008}
|
|
}
|
|
|
|
@article{acharya2019context,
|
|
title = {Context-Aware Local Differential Privacy},
|
|
author = {Acharya, Jayadev and Bonawitz, Keith and Kairouz, Peter and Ramage, Daniel and Sun, Ziteng},
|
|
journal = {arXiv preprint arXiv:1911.00038},
|
|
year = {2019}
|
|
}
|
|
|
|
@book{adler2010geometry,
|
|
title = {The geometry of random fields},
|
|
author = {Adler, Robert J},
|
|
year = {2010},
|
|
publisher = {SIAM}
|
|
}
|
|
|
|
@misc{ahmed2017mobile,
|
|
title = {Mobile edge computing: opportunities, solutions, and challenges},
|
|
author = {Ahmed, Ejaz and Rehmani, Mubashir Husain},
|
|
year = {2017},
|
|
publisher = {Elsevier}
|
|
}
|
|
|
|
@article{al2018adaptive,
|
|
title = {An adaptive geo-indistinguishability mechanism for continuous LBS queries},
|
|
author = {Al-Dhubhani, Raed and Cazalas, Jonathan M},
|
|
journal = {Wireless Networks},
|
|
volume = {24},
|
|
number = {8},
|
|
pages = {3221--3239},
|
|
year = {2018},
|
|
publisher = {Springer}
|
|
}
|
|
|
|
@book{allan2013probability,
|
|
title = {Probability: a graduate course},
|
|
author = {Allan Gut},
|
|
volume = {75},
|
|
year = {2013},
|
|
publisher = {Springer Science \& Business Media}
|
|
}
|
|
|
|
@inproceedings{andres2013geo,
|
|
title = {Geo-indistinguishability: Differential privacy for location-based systems},
|
|
author = {Andr{\'e}s, Miguel E and Bordenabe, Nicol{\'a}s E and Chatzikokolakis, Konstantinos and Palamidessi, Catuscia},
|
|
booktitle = {Proceedings of the 2013 ACM SIGSAC conference on Computer \& communications security},
|
|
pages = {901--914},
|
|
year = {2013},
|
|
organization = {ACM}
|
|
}
|
|
|
|
@article{anselin1995local,
|
|
title = {Local indicators of spatial association—LISA},
|
|
author = {Anselin, Luc},
|
|
journal = {Geographical analysis},
|
|
volume = {27},
|
|
number = {2},
|
|
pages = {93--115},
|
|
year = {1995},
|
|
publisher = {Wiley Online Library}
|
|
}
|
|
|
|
@book{applebaum2009levy,
|
|
title = {L{\'e}vy processes and stochastic calculus},
|
|
author = {Applebaum, David},
|
|
year = {2009},
|
|
publisher = {Cambridge university press}
|
|
}
|
|
|
|
@article{ardagna2007location,
|
|
title = {Location privacy protection through obfuscation-based techniques},
|
|
author = {Ardagna, Claudio and Cremonini, Marco and Damiani, Ernesto and De Capitani di Vimercati, S and Samarati, Pierangela},
|
|
journal = {Data and Applications Security XXI},
|
|
pages = {47--60},
|
|
year = {2007},
|
|
publisher = {Springer}
|
|
}
|
|
|
|
@inproceedings{babcock2002sampling,
|
|
title = {Sampling from a moving window over streaming data},
|
|
author = {Babcock, Brian and Datar, Mayur and Motwani, Rajeev},
|
|
booktitle = {Proceedings of the thirteenth annual ACM-SIAM symposium on Discrete algorithms},
|
|
pages = {633--634},
|
|
year = {2002},
|
|
organization = {Society for Industrial and Applied Mathematics}
|
|
}
|
|
|
|
@article{baum1966statistical,
|
|
title = {Statistical inference for probabilistic functions of finite state Markov chains},
|
|
author = {Baum, Leonard E and Petrie, Ted},
|
|
journal = {The annals of mathematical statistics},
|
|
volume = {37},
|
|
number = {6},
|
|
pages = {1554--1563},
|
|
year = {1966},
|
|
publisher = {JSTOR}
|
|
}
|
|
|
|
@inproceedings{bayardo2005data,
|
|
title = {Data privacy through optimal k-anonymization},
|
|
author = {Bayardo, Roberto J and Agrawal, Rakesh},
|
|
booktitle = {Data Engineering, 2005. ICDE 2005. Proceedings. 21st International Conference on},
|
|
pages = {217--228},
|
|
year = {2005},
|
|
organization = {IEEE}
|
|
}
|
|
|
|
@inproceedings{benaloh2009patient,
|
|
title = {Patient controlled encryption: ensuring privacy of electronic medical records},
|
|
author = {Benaloh, Josh and Chase, Melissa and Horvitz, Eric and Lauter, Kristin},
|
|
booktitle = {Proceedings of the 2009 ACM workshop on Cloud computing security},
|
|
pages = {103--114},
|
|
year = {2009},
|
|
organization = {ACM}
|
|
}
|
|
|
|
@article{beresford2003location,
|
|
title = {Location privacy in pervasive computing},
|
|
author = {Beresford, Alastair R and Stajano, Frank},
|
|
journal = {IEEE Pervasive computing},
|
|
volume = {2},
|
|
number = {1},
|
|
pages = {46--55},
|
|
year = {2003},
|
|
publisher = {IEEE}
|
|
}
|
|
|
|
@article{birant2007st,
|
|
title = {ST-DBSCAN: An algorithm for clustering spatial--temporal data},
|
|
author = {Birant, Derya and Kut, Alp},
|
|
journal = {Data \& knowledge engineering},
|
|
volume = {60},
|
|
number = {1},
|
|
pages = {208--221},
|
|
year = {2007},
|
|
publisher = {Elsevier}
|
|
}
|
|
|
|
@inproceedings{bittau2017prochlo,
|
|
title = {Prochlo: Strong privacy for analytics in the crowd},
|
|
author = {Bittau, Andrea and Erlingsson, {\'U}lfar and Maniatis, Petros and Mironov, Ilya and Raghunathan, Ananth and Lie, David and Rudominer, Mitch and Kode, Ushasree and Tinnes, Julien and Seefeld, Bernhard},
|
|
booktitle = {Proceedings of the 26th Symposium on Operating Systems Principles},
|
|
pages = {441--459},
|
|
year = {2017},
|
|
organization = {ACM}
|
|
}
|
|
|
|
@inproceedings{blocki2013differentially,
|
|
title = {Differentially private data analysis of social networks via restricted sensitivity},
|
|
author = {Blocki, Jeremiah and Blum, Avrim and Datta, Anupam and Sheffet, Or},
|
|
booktitle = {Proceedings of the 4th conference on Innovations in Theoretical Computer Science},
|
|
pages = {87--96},
|
|
year = {2013},
|
|
organization = {ACM}
|
|
}
|
|
|
|
@article{bloom1970space,
|
|
title = {Space/time trade-offs in hash coding with allowable errors},
|
|
author = {Bloom, Burton H},
|
|
journal = {Communications of the ACM},
|
|
volume = {13},
|
|
number = {7},
|
|
pages = {422--426},
|
|
year = {1970},
|
|
publisher = {ACM}
|
|
}
|
|
|
|
@inproceedings{bolot2013private,
|
|
title = {Private decayed predicate sums on streams},
|
|
author = {Bolot, Jean and Fawaz, Nadia and Muthukrishnan, S and Nikolov, Aleksandar and Taft, Nina},
|
|
booktitle = {Proceedings of the 16th International Conference on Database Theory},
|
|
pages = {284--295},
|
|
year = {2013},
|
|
organization = {ACM}
|
|
}
|
|
|
|
@inproceedings{braverman2009optimal,
|
|
title = {Optimal sampling from sliding windows},
|
|
author = {Braverman, Vladimir and Ostrovsky, Rafail and Zaniolo, Carlo},
|
|
booktitle = {Proceedings of the twenty-eighth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems},
|
|
pages = {147--156},
|
|
year = {2009}
|
|
}
|
|
|
|
@inproceedings{cao2013efficient,
|
|
title = {Efficient and accurate strategies for differentially-private sliding window queries},
|
|
author = {Cao, Jianneng and Xiao, Qian and Ghinita, Gabriel and Li, Ninghui and Bertino, Elisa and Tan, Kian-Lee},
|
|
booktitle = {Proceedings of the 16th International Conference on Extending Database Technology},
|
|
pages = {191--202},
|
|
year = {2013}
|
|
}
|
|
|
|
@article{cao2014privacy,
|
|
title = {Privacy-preserving multi-keyword ranked search over encrypted cloud data},
|
|
author = {Cao, Ning and Wang, Cong and Li, Ming and Ren, Kui and Lou, Wenjing},
|
|
journal = {IEEE Transactions on parallel and distributed systems},
|
|
volume = {25},
|
|
number = {1},
|
|
pages = {222--233},
|
|
year = {2014},
|
|
publisher = {IEEE}
|
|
}
|
|
|
|
@inproceedings{cao2015differentially,
|
|
title = {Differentially private real-time data release over infinite trajectory streams},
|
|
author = {Cao, Yang and Yoshikawa, Masatoshi},
|
|
booktitle = {Mobile Data Management (MDM), 2015 16th IEEE International Conference on},
|
|
volume = {2},
|
|
pages = {68--73},
|
|
year = {2015},
|
|
organization = {IEEE}
|
|
}
|
|
|
|
@inproceedings{cao2017quantifying,
|
|
title = {Quantifying differential privacy under temporal correlations},
|
|
author = {Cao, Yang and Yoshikawa, Masatoshi and Xiao, Yonghui and Xiong, Li},
|
|
booktitle = {Data Engineering (ICDE), 2017 IEEE 33rd International Conference on},
|
|
pages = {821--832},
|
|
year = {2017},
|
|
organization = {IEEE}
|
|
}
|
|
|
|
@article{cao2018quantifying,
|
|
title = {Quantifying differential privacy in continuous data release under temporal correlations},
|
|
author = {Cao, Yang and Yoshikawa, Masatoshi and Xiao, Yonghui and Xiong, Li},
|
|
journal = {IEEE Transactions on Knowledge and Data Engineering},
|
|
volume = {31},
|
|
number = {7},
|
|
pages = {1281--1295},
|
|
year = {2018},
|
|
publisher = {IEEE}
|
|
}
|
|
|
|
@inproceedings{chakraborty2014ipshield,
|
|
title = {ipShield: a framework for enforcing context-aware privacy},
|
|
author = {Chakraborty, Supriyo and Shen, Chenguang and Raghavan, Kasturi Rangan and Shoukry, Yasser and Millar, Matt and Srivastava, Mani},
|
|
booktitle = {11th $\{$USENIX$\}$ Symposium on Networked Systems Design and Implementation ($\{$NSDI$\}$ 14)},
|
|
pages = {143--156},
|
|
year = {2014}
|
|
}
|
|
|
|
@misc{chambers2016personal,
|
|
title = {Personal Data: The New ``Oil'' of The Digital Economy},
|
|
author = {\c{T}uca Zb\^{a}rcea \& Asocia\c{t}ii},
|
|
year = {2016},
|
|
publisher = {Chambers and Partners},
|
|
howpublished = {\url{https://www.chambersandpartners.com/article/713/personal-data-the-new-oil-of-the-digital-economy}},
|
|
note = {Accessed: December 1, 2019}
|
|
}
|
|
|
|
@article{chan2011private,
|
|
title = {Private and continual release of statistics},
|
|
author = {Chan, T-H Hubert and Shi, Elaine and Song, Dawn},
|
|
journal = {ACM Transactions on Information and System Security (TISSEC)},
|
|
volume = {14},
|
|
number = {3},
|
|
pages = {26},
|
|
year = {2011},
|
|
publisher = {ACM}
|
|
}
|
|
|
|
@article{chan201397,
|
|
title = {97.49 on markov chains},
|
|
author = {Chan, KC and Lenard, CT and Mills, TM},
|
|
journal = {The Mathematical Gazette},
|
|
volume = {97},
|
|
number = {540},
|
|
pages = {515--520},
|
|
year = {2013},
|
|
publisher = {Cambridge University Press}
|
|
}
|
|
|
|
@misc{channelfour2018data,
|
|
title = {Data, Democracy and Dirty Tricks},
|
|
publisher = {Channel 4},
|
|
year = {2018},
|
|
howpublished = {\url{https://www.channel4.com/news/data-democracy-and-dirty-tricks-cambridge-analytica-uncovered-investigation-expose}},
|
|
note = {Accessed: December 1, 2019}
|
|
}
|
|
|
|
@inproceedings{chatzikokolakis2015geo,
|
|
title = {Geo-indistinguishability: A principled approach to location privacy},
|
|
author = {Chatzikokolakis, Konstantinos and Palamidessi, Catuscia and Stronati, Marco},
|
|
booktitle = {International Conference on Distributed Computing and Internet Technology},
|
|
pages = {49--72},
|
|
year = {2015},
|
|
organization = {Springer}
|
|
}
|
|
|
|
@article{chatzikokolakis2017methods,
|
|
title = {Methods for Location Privacy: A comparative overview},
|
|
author = {Chatzikokolakis, Kostantinos and ElSalamouny, Ehab and Palamidessi, Catuscia and Anna, Pazii and others},
|
|
journal = {Foundations and Trends{\textregistered} in Privacy and Security},
|
|
volume = {1},
|
|
number = {4},
|
|
pages = {199--257},
|
|
year = {2017},
|
|
publisher = {Now Publishers, Inc.}
|
|
}
|
|
|
|
@article{chen2011differentially,
|
|
title = {Differentially private trajectory data publication},
|
|
author = {Chen, Rui and Fung, Benjamin and Desai, Bipin C},
|
|
journal = {arXiv preprint arXiv:1112.2020},
|
|
year = {2011}
|
|
}
|
|
|
|
@inproceedings{chen2012differentially,
|
|
title = {Differentially private sequential data publication via variable-length n-grams},
|
|
author = {Chen, Rui and Acs, Gergely and Castelluccia, Claude},
|
|
booktitle = {Proceedings of the 2012 ACM conference on Computer and communications security},
|
|
pages = {638--649},
|
|
year = {2012},
|
|
organization = {ACM}
|
|
}
|
|
|
|
@article{chen2014correlated,
|
|
title = {Correlated network data publication via differential privacy},
|
|
author = {Chen, Rui and Fung, Benjamin C and Yu, Philip S and Desai, Bipin C},
|
|
journal = {The VLDB Journal-The International Journal on Very Large Data Bases},
|
|
volume = {23},
|
|
number = {4},
|
|
pages = {653--676},
|
|
year = {2014},
|
|
publisher = {Springer-Verlag New York, Inc.}
|
|
}
|
|
|
|
@inproceedings{chen2017pegasus,
|
|
title = {PeGaSus: Data-Adaptive Differentially Private Stream Processing},
|
|
author = {Chen, Yan and Machanavajjhala, Ashwin and Hay, Michael and Miklau, Gerome},
|
|
booktitle = {Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security},
|
|
pages = {1375--1388},
|
|
year = {2017},
|
|
organization = {ACM}
|
|
}
|
|
|
|
@article{chow2011trajectory,
|
|
title = {Trajectory privacy in location-based services and data publication},
|
|
author = {Chow, Chi-Yin and Mokbel, Mohamed F},
|
|
journal = {ACM Sigkdd Explorations Newsletter},
|
|
volume = {13},
|
|
number = {1},
|
|
pages = {19--29},
|
|
year = {2011},
|
|
publisher = {ACM}
|
|
}
|
|
|
|
@article{christin2011survey,
|
|
title = {A survey on privacy in mobile participatory sensing applications},
|
|
author = {Christin, Delphine and Reinhardt, Andreas and Kanhere, Salil S and Hollick, Matthias},
|
|
journal = {Journal of systems and software},
|
|
volume = {84},
|
|
number = {11},
|
|
pages = {1928--1946},
|
|
year = {2011},
|
|
publisher = {Elsevier}
|
|
}
|
|
|
|
@inproceedings{cormode2003finding,
|
|
title = {Finding hierarchical heavy hitters in data streams},
|
|
author = {Cormode, Graham and Korn, Flip and Muthukrishnan, Shanmugavelayutham and Srivastava, Divesh},
|
|
booktitle = {Proceedings 2003 VLDB Conference},
|
|
pages = {464--475},
|
|
year = {2003},
|
|
organization = {Elsevier}
|
|
}
|
|
|
|
@article{cortes2001signature,
|
|
title = {Signature-based methods for data streams},
|
|
author = {Cortes, Corinna and Pregibon, Daryl},
|
|
journal = {Data Mining and Knowledge Discovery},
|
|
volume = {5},
|
|
number = {3},
|
|
pages = {167--182},
|
|
year = {2001},
|
|
publisher = {Springer}
|
|
}
|
|
|
|
@article{croxton1939applied,
|
|
title = {Applied general statistics},
|
|
author = {Croxton, Frederick E and Cowden, Dudley J},
|
|
year = {1939},
|
|
publisher = {Prentice-Hall, Inc}
|
|
}
|
|
|
|
@book{daley2007introduction,
|
|
title = {An introduction to the theory of point processes: volume II: general theory and structure},
|
|
author = {Daley, Daryl J and Vere-Jones, David},
|
|
year = {2007},
|
|
publisher = {Springer Science \& Business Media}
|
|
}
|
|
|
|
@article{datar2002maintaining,
|
|
title = {Maintaining stream statistics over sliding windows},
|
|
author = {Datar, Mayur and Gionis, Aristides and Indyk, Piotr and Motwani, Rajeev},
|
|
journal = {SIAM journal on computing},
|
|
volume = {31},
|
|
number = {6},
|
|
pages = {1794--1813},
|
|
year = {2002},
|
|
publisher = {SIAM}
|
|
}
|
|
|
|
@article{de2013unique,
|
|
title = {Unique in the crowd: The privacy bounds of human mobility},
|
|
author = {De Montjoye, Yves-Alexandre and Hidalgo, C{\'e}sar A and Verleysen, Michel and Blondel, Vincent D},
|
|
journal = {Scientific reports},
|
|
volume = {3},
|
|
pages = {1376},
|
|
year = {2013},
|
|
publisher = {Nature Publishing Group}
|
|
}
|
|
|
|
@article{douglas1973algorithms,
|
|
title = {Algorithms for the reduction of the number of points required to represent a digitized line or its caricature},
|
|
author = {Douglas, David H and Peucker, Thomas K},
|
|
journal = {Cartographica: the international journal for geographic information and geovisualization},
|
|
volume = {10},
|
|
number = {2},
|
|
pages = {112--122},
|
|
year = {1973},
|
|
publisher = {University of Toronto Press}
|
|
}
|
|
|
|
@inproceedings{durr2011position,
|
|
title = {Position sharing for location privacy in non-trusted systems},
|
|
author = {D{\"u}rr, Frank and Skvortsov, Pavel and Rothermel, Kurt},
|
|
booktitle = {Pervasive Computing and Communications (PerCom), 2011 IEEE International Conference on},
|
|
pages = {189--196},
|
|
year = {2011},
|
|
organization = {IEEE}
|
|
}
|
|
|
|
@inproceedings{dwork2006calibrating,
|
|
title = {Calibrating noise to sensitivity in private data analysis},
|
|
author = {Dwork, Cynthia and McSherry, Frank and Nissim, Kobbi and Smith, Adam},
|
|
booktitle = {Theory of cryptography conference},
|
|
pages = {265--284},
|
|
year = {2006},
|
|
organization = {Springer}
|
|
}
|
|
|
|
@inproceedings{dwork2008differential,
|
|
title = {Differential privacy: A survey of results},
|
|
author = {Dwork, Cynthia},
|
|
booktitle = {International Conference on Theory and Applications of Models of Computation},
|
|
pages = {1--19},
|
|
year = {2008},
|
|
organization = {Springer}
|
|
}
|
|
|
|
@inproceedings{dwork2010differential,
|
|
title = {Differential privacy under continual observation},
|
|
author = {Dwork, Cynthia and Naor, Moni and Pitassi, Toniann and Rothblum, Guy N},
|
|
booktitle = {Proceedings of the forty-second ACM symposium on Theory of computing},
|
|
pages = {715--724},
|
|
year = {2010},
|
|
organization = {ACM}
|
|
}
|
|
|
|
@inproceedings{dwork2010pan,
|
|
title = {Pan-Private Streaming Algorithms.},
|
|
author = {Dwork, Cynthia and Naor, Moni and Pitassi, Toniann and Rothblum, Guy N and Yekhanin, Sergey},
|
|
booktitle = {ICS},
|
|
pages = {66--80},
|
|
year = {2010}
|
|
}
|
|
|
|
@article{dwork2011firm,
|
|
title = {A firm foundation for private data analysis},
|
|
author = {Dwork, Cynthia},
|
|
journal = {Communications of the ACM},
|
|
volume = {54},
|
|
number = {1},
|
|
pages = {86--95},
|
|
year = {2011},
|
|
publisher = {ACM}
|
|
}
|
|
|
|
@article{dwork2014algorithmic,
|
|
title = {The algorithmic foundations of differential privacy},
|
|
author = {Dwork, Cynthia and Roth, Aaron and others},
|
|
journal = {Foundations and Trends{\textregistered} in Theoretical Computer Science},
|
|
volume = {9},
|
|
number = {3--4},
|
|
pages = {211--407},
|
|
year = {2014},
|
|
publisher = {Now Publishers, Inc.}
|
|
}
|
|
|
|
@misc{economist2016data,
|
|
title = {The world's most valuable resource is no longer oil, but data},
|
|
publisher = {The Economist},
|
|
year = {2016},
|
|
howpublished = {\url{https://www.economist.com/leaders/2017/05/06/the-worlds-most-valuable-resource-is-no-longer-oil-but-data}},
|
|
note = {Accessed: December 1, 2019}
|
|
}
|
|
|
|
@inproceedings{efthymiou2015big,
|
|
title = {Big data entity resolution: From highly to somehow similar entity descriptions in the Web},
|
|
author = {Efthymiou, Vasilis and Stefanidis, Kostas and Christophides, Vassilis},
|
|
booktitle = {2015 IEEE International Conference on Big Data (Big Data)},
|
|
pages = {401--410},
|
|
year = {2015},
|
|
organization = {IEEE}
|
|
}
|
|
|
|
@inproceedings{eiter2017spatial,
|
|
title = {Spatial ontology-mediated query answering over mobility streams},
|
|
author = {Eiter, Thomas and Parreira, Josiane Xavier and Schneider, Patrik},
|
|
booktitle = {European Semantic Web Conference},
|
|
pages = {219--237},
|
|
year = {2017},
|
|
organization = {Springer}
|
|
}
|
|
|
|
@inproceedings{erdogdu2015privacy,
|
|
title = {Privacy-utility trade-off under continual observation},
|
|
author = {Erdogdu, Murat A and Fawaz, Nadia},
|
|
booktitle = {ISIT},
|
|
pages = {1801--1805},
|
|
year = {2015}
|
|
}
|
|
|
|
@inproceedings{erlingsson2014rappor,
|
|
title = {Rappor: Randomized aggregatable privacy-preserving ordinal response},
|
|
author = {Erlingsson, {\'U}lfar and Pihur, Vasyl and Korolova, Aleksandra},
|
|
booktitle = {Proceedings of the 2014 ACM SIGSAC conference on computer and communications security},
|
|
pages = {1054--1067},
|
|
year = {2014},
|
|
organization = {ACM}
|
|
}
|
|
|
|
@online{experian,
|
|
title = {Experian},
|
|
url = {https://www.experian.com},
|
|
year = {Accessed: November 11, 2020}
|
|
}
|
|
|
|
@online{facebook,
|
|
title = {Facebook},
|
|
url = {https://www.facebook.com},
|
|
year = {Accessed: November 11, 2020}
|
|
}
|
|
|
|
@inproceedings{fan2013differentially,
|
|
title = {Differentially private multi-dimensional time series release for traffic monitoring},
|
|
author = {Fan, Liyue and Xiong, Li and Sunderam, Vaidy},
|
|
booktitle = {IFIP Annual Conference on Data and Applications Security and Privacy},
|
|
pages = {33--48},
|
|
year = {2013},
|
|
organization = {Springer}
|
|
}
|
|
|
|
@article{fan2014adaptive,
|
|
title = {An adaptive approach to real-time aggregate monitoring with differential privacy},
|
|
author = {Fan, Liyue and Xiong, Li},
|
|
journal = {IEEE Transactions on Knowledge and Data Engineering},
|
|
volume = {26},
|
|
number = {9},
|
|
pages = {2094--2106},
|
|
year = {2014},
|
|
publisher = {IEEE}
|
|
}
|
|
|
|
@inproceedings{farokhi2020temporally,
|
|
title = {Temporally Discounted Differential Privacy for Evolving Datasets on an Infinite Horizon},
|
|
author = {Farokhi, Farhad},
|
|
booktitle = {2020 ACM/IEEE 11th International Conference on Cyber-Physical Systems (ICCPS)},
|
|
pages = {1--8},
|
|
year = {2020},
|
|
organization = {IEEE}
|
|
}
|
|
|
|
@article{fiore2019privacy,
|
|
title = {Privacy of trajectory micro-data: a survey},
|
|
author = {Fiore, Marco and Katsikouli, Panagiota and Zavou, Elli and Cunche, Mathieu and Fessant, Fran{\c{c}}oise and Hello, Dominique Le and Aivodji, Ulrich Matchi and Olivier, Baptiste and Quertier, Tony and Stanica, Razvan},
|
|
journal = {arXiv preprint arXiv:1903.12211},
|
|
year = {2019}
|
|
}
|
|
|
|
@online{foursquare,
|
|
title = {Foursquare},
|
|
url = {https://www.foursquare.com},
|
|
year = {Accessed: November 11, 2020}
|
|
}
|
|
|
|
@misc{franceschi-bicchierairussell2015redditor,
|
|
title = {Redditor cracks anonymous data trove to pinpoint Muslim cab drivers},
|
|
author = {Franceschi-Bicchierai, Lorenzo},
|
|
year = {2015},
|
|
publisher = {Mashable},
|
|
howpublished = {\url{https://mashable.com/2015/01/28/redditor-muslim-cab-drivers}},
|
|
note = {Accessed: July 1, 2020}
|
|
}
|
|
|
|
@book{fuller2009introduction,
|
|
title = {Introduction to statistical time series},
|
|
author = {Fuller, Wayne A},
|
|
volume = {428},
|
|
year = {2009},
|
|
publisher = {John Wiley \& Sons}
|
|
}
|
|
|
|
@inproceedings{fung2008anonymity,
|
|
title = {Anonymity for continuous data publishing},
|
|
author = {Fung, Benjamin and Wang, Ke and Fu, Ada Wai-Chee and Pei, Jian},
|
|
booktitle = {Proceedings of the 11th international conference on Extending database technology: Advances in database technology},
|
|
pages = {264--275},
|
|
year = {2008},
|
|
organization = {ACM}
|
|
}
|
|
|
|
@book{gagniuc2017markov,
|
|
title = {Markov Chains: From Theory to Implementation and Experimentation},
|
|
author = {Gagniuc, Paul A},
|
|
year = {2017},
|
|
publisher = {John Wiley \& Sons}
|
|
}
|
|
|
|
@incollection{gama2007data,
|
|
title = {Data stream processing},
|
|
author = {Gama, Jo{\~a}o and Rodrigues, Pedro Pereira},
|
|
booktitle = {Learning from Data Streams},
|
|
pages = {25--39},
|
|
year = {2007},
|
|
publisher = {Springer}
|
|
}
|
|
|
|
@inproceedings{gambs2010show,
|
|
title = {Show me how you move and I will tell you who you are},
|
|
author = {Gambs, S{\'e}bastien and Killijian, Marc-Olivier and del Prado Cortez, Miguel N{\'u}{\~n}ez},
|
|
booktitle = {Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS},
|
|
pages = {34--41},
|
|
year = {2010}
|
|
}
|
|
|
|
@inproceedings{ganta2008composition,
|
|
title = {Composition attacks and auxiliary information in data privacy},
|
|
author = {Ganta, Srivatsava Ranjit and Kasiviswanathan, Shiva Prasad and Smith, Adam},
|
|
booktitle = {Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining},
|
|
pages = {265--273},
|
|
year = {2008},
|
|
organization = {ACM}
|
|
}
|
|
|
|
@article{garcia2015edge,
|
|
title = {Edge-centric computing: Vision and challenges},
|
|
author = {Garcia Lopez, Pedro and Montresor, Alberto and Epema, Dick and Datta, Anwitaman and Higashino, Teruo and Iamnitchi, Adriana and Barcellos, Marinho and Felber, Pascal and Riviere, Etienne},
|
|
journal = {ACM SIGCOMM Computer Communication Review},
|
|
volume = {45},
|
|
number = {5},
|
|
pages = {37--42},
|
|
year = {2015},
|
|
publisher = {ACM}
|
|
}
|
|
|
|
@article{gedik2008protecting,
|
|
title = {Protecting location privacy with personalized k-anonymity: Architecture and algorithms},
|
|
author = {Gedik, Bugra and Liu, Ling},
|
|
journal = {IEEE Transactions on Mobile Computing},
|
|
volume = {7},
|
|
number = {1},
|
|
pages = {1--18},
|
|
year = {2008},
|
|
publisher = {IEEE}
|
|
}
|
|
|
|
@inproceedings{ghinita2008private,
|
|
title = {Private queries in location based services: anonymizers are not necessary},
|
|
author = {Ghinita, Gabriel and Kalnis, Panos and Khoshgozaran, Ali and Shahabi, Cyrus and Tan, Kian-Lee},
|
|
booktitle = {Proceedings of the 2008 ACM SIGMOD international conference on Management of data},
|
|
pages = {121--132},
|
|
year = {2008},
|
|
organization = {ACM}
|
|
}
|
|
|
|
@inproceedings{ghinita2009preventing,
|
|
title = {Preventing velocity-based linkage attacks in location-aware applications},
|
|
author = {Ghinita, Gabriel and Damiani, Maria Luisa and Silvestri, Claudio and Bertino, Elisa},
|
|
booktitle = {Proceedings of the 17th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems},
|
|
pages = {246--255},
|
|
year = {2009},
|
|
organization = {ACM}
|
|
}
|
|
|
|
@online{gmaps,
|
|
title = {Google Maps},
|
|
url = {https://maps.google.com},
|
|
year = {Accessed: November 11, 2020}
|
|
}
|
|
|
|
@article{goldreich1998secure,
|
|
title = {Secure multi-party computation},
|
|
author = {Goldreich, Oded},
|
|
journal = {Manuscript. Preliminary version},
|
|
volume = {78},
|
|
year = {1998}
|
|
}
|
|
|
|
@inproceedings{gotz2012maskit,
|
|
title = {Maskit: Privately releasing user context streams for personalized mobile applications},
|
|
author = {G{\"o}tz, Michaela and Nath, Suman and Gehrke, Johannes},
|
|
booktitle = {Proceedings of the 2012 ACM SIGMOD International Conference on Management of Data},
|
|
pages = {289--300},
|
|
year = {2012},
|
|
organization = {ACM}
|
|
}
|
|
|
|
@book{grunwald2007minimum,
|
|
title = {The minimum description length principle},
|
|
author = {Gr{\"u}nwald, Peter D},
|
|
year = {2007},
|
|
publisher = {MIT press}
|
|
}
|
|
|
|
@article{gruteser2004protecting,
|
|
title = {Protecting privacy, in continuous location-tracking applications},
|
|
author = {Gruteser, Marco and Liu, Xuan},
|
|
journal = {IEEE Security \& Privacy},
|
|
volume = {2},
|
|
number = {2},
|
|
pages = {28--34},
|
|
year = {2004},
|
|
publisher = {IEEE}
|
|
}
|
|
|
|
@misc{gualtieri2016perishable,
|
|
author = {Mike Gualtieri, Rowan Curran, Holger Kisker and Emily Miller},
|
|
title = {Perishable Insights -- Stop Wasting Money On Unactionable Analytics},
|
|
organization = {Forrester},
|
|
year = {2016}
|
|
}
|
|
|
|
@article{gursoy2018differentially,
|
|
title = {Differentially private and utility preserving publication of trajectory data},
|
|
author = {Gursoy, Mehmet Emre and Liu, Ling and Truex, Stacey and Yu, Lei},
|
|
journal = {IEEE Transactions on Mobile Computing},
|
|
year = {2018},
|
|
publisher = {IEEE}
|
|
}
|
|
|
|
@incollection{haas2016data,
|
|
title = {Data-stream sampling: basic techniques and results},
|
|
author = {Haas, Peter J},
|
|
booktitle = {Data Stream Management},
|
|
pages = {13--44},
|
|
year = {2016},
|
|
publisher = {Springer}
|
|
}
|
|
|
|
@inproceedings{hariharan2004project,
|
|
title = {Project Lachesis: parsing and modeling location histories},
|
|
author = {Hariharan, Ramaswamy and Toyama, Kentaro},
|
|
booktitle = {International Conference on Geographic Information Science},
|
|
pages = {106--124},
|
|
year = {2004},
|
|
organization = {Springer}
|
|
}
|
|
|
|
@inproceedings{hazarika2001qualitative,
|
|
title = {Qualitative spatio-temporal continuity},
|
|
author = {Hazarika, Shyamanta M and Cohn, Anthony G},
|
|
booktitle = {International Conference on Spatial Information Theory},
|
|
pages = {92--107},
|
|
year = {2001},
|
|
organization = {Springer}
|
|
}
|
|
|
|
@article{he2011preventing,
|
|
title = {Preventing equivalence attacks in updated, anonymized data},
|
|
author = {He, Yeye and Barman, Siddharth and Naughton, Jeffrey},
|
|
year = {2011}
|
|
}
|
|
|
|
@article{he2015dpt,
|
|
title = {DPT: differentially private trajectory synthesis using hierarchical reference systems},
|
|
author = {He, Xi and Cormode, Graham and Machanavajjhala, Ashwin and Procopiuc, Cecilia M and Srivastava, Divesh},
|
|
journal = {Proceedings of the VLDB Endowment},
|
|
volume = {8},
|
|
number = {11},
|
|
pages = {1154--1165},
|
|
year = {2015},
|
|
publisher = {VLDB Endowment}
|
|
}
|
|
|
|
@inproceedings{hua2015differentially,
|
|
title = {Differentially private publication of general time-serial trajectory data},
|
|
author = {Hua, Jingyu and Gao, Yue and Zhong, Sheng},
|
|
booktitle = {Computer Communications (INFOCOM), 2015 IEEE Conference on},
|
|
pages = {549--557},
|
|
year = {2015},
|
|
organization = {IEEE}
|
|
}
|
|
|
|
@article{huguenin2017predictive,
|
|
title = {A predictive model for user motivation and utility implications of privacy-protection mechanisms in location check-ins},
|
|
author = {Huguenin, K{\'e}vin and Bilogrevic, Igor and Machado, Joana Soares and Mihaila, Stefan and Shokri, Reza and Dacosta, Italo and Hubaux, Jean-Pierre},
|
|
journal = {IEEE Transactions on Mobile Computing},
|
|
volume = {17},
|
|
number = {4},
|
|
pages = {760--774},
|
|
year = {2017},
|
|
publisher = {IEEE}
|
|
}
|
|
|
|
@article{jain2016big,
|
|
title = {Big data privacy: a technological perspective and review},
|
|
author = {Jain, Priyank and Gyanchandani, Manasi and Khare, Nilay},
|
|
journal = {Journal of Big Data},
|
|
volume = {3},
|
|
number = {1},
|
|
pages = {25},
|
|
year = {2016},
|
|
publisher = {Springer}
|
|
}
|
|
|
|
@article{ji2014differential,
|
|
title = {Differential privacy and machine learning: a survey and review},
|
|
author = {Ji, Zhanglong and Lipton, Zachary C and Elkan, Charles},
|
|
journal = {arXiv preprint arXiv:1412.7584},
|
|
year = {2014}
|
|
}
|
|
|
|
@article{jiang2006research,
|
|
title = {Research issues in data stream association rule mining},
|
|
author = {Jiang, Nan and Gruenwald, Le},
|
|
journal = {ACM Sigmod Record},
|
|
volume = {35},
|
|
number = {1},
|
|
pages = {14--19},
|
|
year = {2006},
|
|
publisher = {ACM New York, NY, USA}
|
|
}
|
|
|
|
|
|
@inproceedings{jiang2013publishing,
|
|
title = {Publishing trajectories with differential privacy guarantees},
|
|
author = {Jiang, Kaifeng and Shao, Dongxu and Bressan, St{\'e}phane and Kister, Thomas and Tan, Kian-Lee},
|
|
booktitle = {Proceedings of the 25th International Conference on Scientific and Statistical Database Management},
|
|
pages = {12},
|
|
year = {2013},
|
|
organization = {ACM}
|
|
}
|
|
|
|
@article{johnson2018towards,
|
|
title = {Towards practical differential privacy for SQL queries},
|
|
author = {Johnson, Noah and Near, Joseph P and Song, Dawn},
|
|
journal = {Proceedings of the VLDB Endowment},
|
|
volume = {11},
|
|
number = {5},
|
|
pages = {526--539},
|
|
year = {2018},
|
|
publisher = {VLDB Endowment}
|
|
}
|
|
|
|
@article{kalman1960new,
|
|
title = {A new approach to linear filtering and prediction problems},
|
|
author = {Kalman, Rudolph Emil},
|
|
journal = {Journal of basic Engineering},
|
|
volume = {82},
|
|
number = {1},
|
|
pages = {35--45},
|
|
year = {1960},
|
|
publisher = {American Society of Mechanical Engineers}
|
|
}
|
|
|
|
@inproceedings{kamara2010cryptographic,
|
|
title = {Cryptographic cloud storage},
|
|
author = {Kamara, Seny and Lauter, Kristin},
|
|
booktitle = {International Conference on Financial Cryptography and Data Security},
|
|
pages = {136--149},
|
|
year = {2010},
|
|
organization = {Springer}
|
|
}
|
|
|
|
@book{karlin2014first,
|
|
title = {A first course in stochastic processes},
|
|
author = {Karlin, Samuel},
|
|
year = {2014},
|
|
publisher = {Academic press}
|
|
}
|
|
|
|
@inproceedings{katsomallos2014easyharvest,
|
|
title = {EasyHarvest: Supporting the deployment and management of sensing applications on smartphones},
|
|
author = {Katsomallos, Manos and Lalis, Spyros},
|
|
booktitle = {Pervasive Computing and Communications Workshops (PERCOM Workshops), 2014 IEEE International Conference on},
|
|
pages = {80--85},
|
|
year = {2014},
|
|
organization = {IEEE}
|
|
}
|
|
|
|
@inproceedings{katsomallos2017open,
|
|
title = {An open framework for flexible plug-in privacy mechanisms in crowdsensing applications},
|
|
author = {Katsomallos, Manos and Lalis, Spyros and Papaioannou, Thanasis and Theodorakopoulos, George},
|
|
booktitle = {Pervasive Computing and Communications Workshops (PerCom Workshops), 2017 IEEE International Conference on},
|
|
pages = {237--242},
|
|
year = {2017},
|
|
organization = {IEEE}
|
|
}
|
|
|
|
@article{katsomallos2019privacy,
|
|
title = {Privacy, Space and Time: a Survey on Privacy-Preserving Continuous Data Publishing},
|
|
author = {Katsomallos, Manos and Tzompanaki, Katerina and Kotzinos, Dimitris},
|
|
journal = {Journal of Spatial Information Science},
|
|
volume = {2019},
|
|
number = {19},
|
|
pages = {57--103},
|
|
year = {2019}
|
|
}
|
|
|
|
@inproceedings{kellaris2013practical,
|
|
title = {Practical differential privacy via grouping and smoothing},
|
|
author = {Kellaris, Georgios and Papadopoulos, Stavros},
|
|
booktitle = {Proceedings of the VLDB Endowment},
|
|
volume = {6},
|
|
number = {5},
|
|
pages = {301--312},
|
|
year = {2013},
|
|
organization = {VLDB Endowment}
|
|
}
|
|
|
|
@article{kellaris2014differentially,
|
|
title = {Differentially private event sequences over infinite streams},
|
|
author = {Kellaris, Georgios and Papadopoulos, Stavros and Xiao, Xiaokui and Papadias, Dimitris},
|
|
journal = {Proceedings of the VLDB Endowment},
|
|
volume = {7},
|
|
number = {12},
|
|
pages = {1155--1166},
|
|
year = {2014},
|
|
publisher = {VLDB Endowment}
|
|
}
|
|
|
|
@inproceedings{kido2005anonymous,
|
|
title = {An anonymous communication technique using dummies for location-based services},
|
|
author = {Kido, Hidetoshi and Yanagisawa, Yutaka and Satoh, Tetsuji},
|
|
booktitle = {Pervasive Services, 2005. ICPS'05. Proceedings. International Conference on},
|
|
pages = {88--97},
|
|
year = {2005},
|
|
organization = {IEEE}
|
|
}
|
|
|
|
@inproceedings{kifer2009attacks,
|
|
title = {Attacks on privacy and deFinetti's theorem},
|
|
author = {Kifer, Daniel},
|
|
booktitle = {Proceedings of the 2009 ACM SIGMOD International Conference on Management of data},
|
|
pages = {127--138},
|
|
year = {2009},
|
|
organization = {ACM}
|
|
}
|
|
|
|
@inproceedings{kifer2011no,
|
|
title = {No free lunch in data privacy},
|
|
author = {Kifer, Daniel and Machanavajjhala, Ashwin},
|
|
booktitle = {Proceedings of the 2011 ACM SIGMOD International Conference on Management of data},
|
|
pages = {193--204},
|
|
year = {2011},
|
|
organization = {ACM}
|
|
}
|
|
|
|
@article{kifer2014pufferfish,
|
|
title = {Pufferfish: A framework for mathematical privacy definitions},
|
|
author = {Kifer, Daniel and Machanavajjhala, Ashwin},
|
|
journal = {ACM Transactions on Database Systems (TODS)},
|
|
volume = {39},
|
|
number = {1},
|
|
pages = {3},
|
|
year = {2014},
|
|
publisher = {ACM}
|
|
}
|
|
|
|
@article{king1983centralized,
|
|
title = {Centralized versus decentralized computing: organizational considerations and management options},
|
|
author = {King, John Leslie},
|
|
journal = {ACM Computing Surveys (CSUR)},
|
|
volume = {15},
|
|
number = {4},
|
|
pages = {319--349},
|
|
year = {1983},
|
|
publisher = {ACM}
|
|
}
|
|
|
|
@incollection{knuth1968art,
|
|
author = {Knuth, Donald Ervin},
|
|
title = {Seminumerical Algorithms},
|
|
booktitle = {The Art of Computer Programming},
|
|
publisher = {Addison-Wesley},
|
|
year = {1968},
|
|
volume = {2},
|
|
edition = {2},
|
|
isbn = {0-201-03801-3}
|
|
}
|
|
|
|
@inproceedings{krumm2013placer,
|
|
title = {Placer: semantic place labels from diary data},
|
|
author = {Krumm, John and Rouhana, Dany},
|
|
booktitle = {Proceedings of the 2013 ACM international joint conference on Pervasive and ubiquitous computing},
|
|
pages = {163--172},
|
|
year = {2013}
|
|
}
|
|
|
|
@article{lafferty2001conditional,
|
|
title = {Conditional random fields: Probabilistic models for segmenting and labeling sequence data},
|
|
author = {Lafferty, John and McCallum, Andrew and Pereira, Fernando CN},
|
|
year = {2001}
|
|
}
|
|
|
|
@article{laney20013d,
|
|
title = {3D data management: Controlling data volume, velocity and variety},
|
|
author = {Laney, Doug},
|
|
journal = {META Group Research Note},
|
|
volume = {6},
|
|
number = {70},
|
|
year = {2001}
|
|
}
|
|
|
|
@book{lawler2010random,
|
|
title = {Random walk: a modern introduction},
|
|
author = {Lawler, Gregory F and Limic, Vlada},
|
|
volume = {123},
|
|
year = {2010},
|
|
publisher = {Cambridge University Press}
|
|
}
|
|
|
|
@inproceedings{lee2008trajectory,
|
|
title = {Trajectory outlier detection: A partition-and-detect framework},
|
|
author = {Lee, Jae-Gil and Han, Jiawei and Li, Xiaolei},
|
|
booktitle = {2008 IEEE 24th International Conference on Data Engineering},
|
|
pages = {140--149},
|
|
year = {2008},
|
|
organization = {IEEE}
|
|
}
|
|
|
|
@inproceedings{lee2011much,
|
|
title = {How much is enough? choosing $\varepsilon$ for differential privacy},
|
|
author = {Lee, Jaewoo and Clifton, Chris},
|
|
booktitle = {International Conference on Information Security},
|
|
pages = {325--340},
|
|
year = {2011},
|
|
organization = {Springer}
|
|
}
|
|
|
|
@article{legendre1993spatial,
|
|
title = {Spatial autocorrelation: trouble or new paradigm?},
|
|
author = {Legendre, Pierre},
|
|
journal = {Ecology},
|
|
volume = {74},
|
|
number = {6},
|
|
pages = {1659--1673},
|
|
year = {1993},
|
|
publisher = {Wiley Online Library}
|
|
}
|
|
|
|
@inproceedings{li2007hiding,
|
|
title = {Hiding in the crowd: Privacy preservation on evolving streams through correlation tracking},
|
|
author = {Li, Feifei and Sun, Jimeng and Papadimitriou, Spiros and Mihaila, George A and Stanoi, Ioana},
|
|
booktitle = {Data Engineering, 2007. ICDE 2007. IEEE 23rd International Conference on},
|
|
pages = {686--695},
|
|
year = {2007},
|
|
organization = {IEEE}
|
|
}
|
|
|
|
@inproceedings{li2007t,
|
|
title = {t-closeness: Privacy beyond k-anonymity and l-diversity},
|
|
author = {Li, Ninghui and Li, Tiancheng and Venkatasubramanian, Suresh},
|
|
booktitle = {Data Engineering, 2007. ICDE 2007. IEEE 23rd International Conference on},
|
|
pages = {106--115},
|
|
year = {2007},
|
|
organization = {IEEE}
|
|
}
|
|
|
|
@inproceedings{li2008mining,
|
|
title = {Mining user similarity based on location history},
|
|
author = {Li, Quannan and Zheng, Yu and Xie, Xing and Chen, Yukun and Liu, Wenyu and Ma, Wei-Ying},
|
|
booktitle = {Proceedings of the 16th ACM SIGSPATIAL international conference on Advances in geographic information systems},
|
|
pages = {1--10},
|
|
year = {2008}
|
|
}
|
|
|
|
@inproceedings{li2012sampling,
|
|
title = {On sampling, anonymization, and differential privacy or, k-anonymization meets differential privacy},
|
|
author = {Li, Ninghui and Qardaji, Wahbeh and Su, Dong},
|
|
booktitle = {Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security},
|
|
pages = {32--33},
|
|
year = {2012},
|
|
organization = {ACM}
|
|
}
|
|
|
|
@article{li2016hybrid,
|
|
title = {A hybrid approach to prevent composition attacks for independent data releases},
|
|
author = {Li, Jiuyong and Baig, Muzammil M and Sattar, AHM Sarowar and Ding, Xiaofeng and Liu, Jixue and Vincent, Millist W},
|
|
journal = {Information Sciences},
|
|
volume = {367},
|
|
pages = {324--336},
|
|
year = {2016},
|
|
publisher = {Elsevier}
|
|
}
|
|
|
|
@article{li2017achieving,
|
|
title = {Achieving differential privacy of trajectory data publishing in participatory sensing},
|
|
author = {Li, Meng and Zhu, Liehuang and Zhang, Zijian and Xu, Rixin},
|
|
journal = {Information Sciences},
|
|
volume = {400},
|
|
pages = {1--13},
|
|
year = {2017},
|
|
publisher = {Elsevier}
|
|
}
|
|
|
|
@incollection{lifshits2012lectures,
|
|
title = {Lectures on Gaussian processes},
|
|
author = {Lifshits, Mikhail},
|
|
booktitle = {Lectures on Gaussian Processes},
|
|
pages = {1--117},
|
|
year = {2012},
|
|
publisher = {Springer}
|
|
}
|
|
|
|
@inproceedings{liu2016dependence,
|
|
title = {Dependence Makes You Vulnerable: Differential Privacy Under Dependent Tuples},
|
|
author = {Liu, Changchang and Chakraborty, Supriyo and Mittal, Prateek},
|
|
booktitle = {NDSS},
|
|
volume = {16},
|
|
pages = {21--24},
|
|
year = {2016}
|
|
}
|
|
|
|
@article{lyon2014surveillance,
|
|
title = {Surveillance, Snowden, and big data: Capacities, consequences, critique},
|
|
author = {Lyon, David},
|
|
journal = {Big Data \& Society},
|
|
volume = {1},
|
|
number = {2},
|
|
pages = {2053951714541861},
|
|
year = {2014},
|
|
publisher = {SAGE Publications Sage UK: London, England}
|
|
}
|
|
|
|
@article{ma2017plp,
|
|
title = {PLP: Protecting location privacy against correlation analyze Attack in crowdsensing},
|
|
author = {Ma, Qiang and Zhang, Shanfeng and Zhu, Tong and Liu, Kebin and Zhang, Lan and He, Wenbo and Liu, Yunhao},
|
|
journal = {IEEE transactions on mobile computing},
|
|
volume = {16},
|
|
number = {9},
|
|
pages = {2588--2598},
|
|
year = {2017},
|
|
publisher = {IEEE}
|
|
}
|
|
|
|
@inproceedings{machanavajjhala2006diversity,
|
|
title = {l-diversity: Privacy beyond k-anonymity},
|
|
author = {Machanavajjhala, Ashwin and Gehrke, Johannes and Kifer, Daniel and Venkitasubramaniam, Muthuramakrishnan},
|
|
booktitle = {Data Engineering, 2006. ICDE'06. Proceedings of the 22nd International Conference on},
|
|
pages = {24--24},
|
|
year = {2006},
|
|
organization = {IEEE}
|
|
}
|
|
|
|
@article{machanavajjhala2015designing,
|
|
title = {Designing statistical privacy for your data},
|
|
author = {Machanavajjhala, Ashwin and Kifer, Daniel},
|
|
journal = {Communications of the ACM},
|
|
volume = {58},
|
|
number = {3},
|
|
pages = {58--67},
|
|
year = {2015},
|
|
publisher = {ACM}
|
|
}
|
|
|
|
@article{matyas1990visual,
|
|
title = {Visual analysis of single-case time series: Effects of variability, serial dependence, and magnitude of intervention effects},
|
|
author = {Matyas, Thomas A and Greenwood, Kenneth M},
|
|
journal = {Journal of Applied Behavior Analysis},
|
|
volume = {23},
|
|
number = {3},
|
|
pages = {341--351},
|
|
year = {1990},
|
|
publisher = {Wiley Online Library}
|
|
}
|
|
|
|
@inproceedings{mcsherry2007mechanism,
|
|
title = {Mechanism design via differential privacy},
|
|
author = {McSherry, Frank and Talwar, Kunal},
|
|
booktitle = {Foundations of Computer Science, 2007. FOCS'07. 48th Annual IEEE Symposium on},
|
|
pages = {94--103},
|
|
year = {2007},
|
|
organization = {IEEE}
|
|
}
|
|
|
|
@inproceedings{mcsherry2009privacy,
|
|
title = {Privacy integrated queries: an extensible platform for privacy-preserving data analysis},
|
|
author = {McSherry, Frank D},
|
|
booktitle = {Proceedings of the 2009 ACM SIGMOD International Conference on Management of data},
|
|
pages = {19--30},
|
|
year = {2009},
|
|
organization = {ACM}
|
|
}
|
|
|
|
@inproceedings{metwally2005duplicate,
|
|
title = {Duplicate detection in click streams},
|
|
author = {Metwally, Ahmed and Agrawal, Divyakant and El Abbadi, Amr},
|
|
booktitle = {Proceedings of the 14th international conference on World Wide Web},
|
|
pages = {12--21},
|
|
year = {2005}
|
|
}
|
|
|
|
@article{moran1950notes,
|
|
title = {Notes on continuous stochastic phenomena},
|
|
author = {Moran, Patrick AP},
|
|
journal = {Biometrika},
|
|
volume = {37},
|
|
number = {1/2},
|
|
pages = {17--23},
|
|
year = {1950},
|
|
publisher = {JSTOR}
|
|
}
|
|
|
|
@inproceedings{motwani2007efficient,
|
|
title = {Efficient algorithms for masking and finding quasi-identifiers},
|
|
author = {Motwani, Rajeev and Xu, Ying},
|
|
booktitle = {Proceedings of the Conference on Very Large Data Bases (VLDB)},
|
|
pages = {83--93},
|
|
year = {2007}
|
|
}
|
|
|
|
@article{muthukrishnan2005data,
|
|
title = {Data streams: Algorithms and applications},
|
|
author = {Muthukrishnan, Shanmugavelayutham and others},
|
|
journal = {Foundations and Trends{\textregistered} in Theoretical Computer Science},
|
|
volume = {1},
|
|
number = {2},
|
|
pages = {117--236},
|
|
year = {2005},
|
|
publisher = {Now Publishers, Inc.}
|
|
}
|
|
|
|
@inproceedings{narayanan2008robust,
|
|
title = {Robust de-anonymization of large sparse data sets},
|
|
author = {Narayanan, Arvind and Shmatikov, Vitaly},
|
|
booktitle = {Security and Privacy, 2008. SP 2008. IEEE Symposium on},
|
|
pages = {111--125},
|
|
year = {2008},
|
|
organization = {IEEE}
|
|
}
|
|
|
|
@misc{osm,
|
|
author = {{Wikipedia contributors}},
|
|
title = {OpenStreetMap --- {Wikipedia}{,} The Free Encyclopedia},
|
|
year = {2020},
|
|
url = {https://en.wikipedia.org/w/index.php?title=OpenStreetMap&oldid=985394598},
|
|
note = {Accessed: November 11, 2020}
|
|
}
|
|
|
|
@inproceedings{ozccep2015stream,
|
|
title = {Stream-query compilation with ontologies},
|
|
author = {{\"O}z{\c{c}}ep, {\"O}zg{\"u}r L{\"u}tf{\"u} and M{\"o}ller, Ralf and Neuenstadt, Christian},
|
|
booktitle = {Australasian Joint Conference on Artificial Intelligence},
|
|
pages = {457--463},
|
|
year = {2015},
|
|
organization = {Springer}
|
|
}
|
|
|
|
@article{papoulis1984bayes,
|
|
title = {Bayes' theorem in statistics and Bayes' theorem in statistics (reexamined)},
|
|
author = {Papoulis, A},
|
|
journal = {Probability, random variables, and stochastic processes. 2nd ed. New York, NY: McGraw-Hill},
|
|
pages = {38--114},
|
|
year = {1984}
|
|
}
|
|
|
|
@book{park2018fundamentals,
|
|
title = {Fundamentals of Probability and Stochastic Processes with Applications to Communications},
|
|
author = {Park, Kun Il and Park},
|
|
year = {2018},
|
|
publisher = {Springer}
|
|
}
|
|
|
|
@inproceedings{perera2014mosden,
|
|
title = {Mosden: An internet of things middleware for resource constrained mobile devices},
|
|
author = {Perera, Charith and Jayaraman, Prem Prakash and Zaslavsky, Arkady and Christen, Peter and Georgakopoulos, Dimitrios},
|
|
booktitle = {2014 47th Hawaii International Conference on System Sciences},
|
|
pages = {1053--1062},
|
|
year = {2014},
|
|
organization = {IEEE}
|
|
}
|
|
|
|
@inproceedings{primault2015time,
|
|
title = {Time distortion anonymization for the publication of mobility data with high utility},
|
|
author = {Primault, Vincent and Mokhtar, Sonia Ben and Lauradoux, C{\'e}dric and Brunie, Lionel},
|
|
booktitle = {Trustcom/BigDataSE/ISPA, 2015 IEEE},
|
|
volume = {1},
|
|
pages = {539--546},
|
|
year = {2015},
|
|
organization = {IEEE}
|
|
}
|
|
|
|
@article{primault2018long,
|
|
title = {The Long Road to Computational Location Privacy: A Survey},
|
|
author = {Primault, Vincent and Boutet, Antoine and Mokhtar, Sonia Ben and Brunie, Lionel},
|
|
journal = {IEEE Communications Surveys \& Tutorials},
|
|
year = {2018},
|
|
publisher = {IEEE}
|
|
}
|
|
|
|
@book{quinlan2014c4,
|
|
title = {Programs for machine learning},
|
|
author = {Quinlan, J Ross},
|
|
year = {2014},
|
|
publisher = {Elsevier}
|
|
}
|
|
|
|
@inproceedings{quoc2017privapprox,
|
|
title = {PrivApprox: privacy-preserving stream analytics},
|
|
author = {Quoc, Do Le and Beck, Martin and Bhatotia, Pramod and Chen, Ruichuan and Fetzer, Christof and Strufe, Thorsten},
|
|
booktitle = {Proceedings of the 2017 USENIX Conference on Usenix Annual Technical Conference},
|
|
pages = {659--672},
|
|
year = {2017},
|
|
organization = {USENIX Association}
|
|
}
|
|
|
|
@article{raghupathi2014big,
|
|
title = {Big data analytics in healthcare: promise and potential},
|
|
author = {Raghupathi, Wullianallur and Raghupathi, Viju},
|
|
journal = {Health information science and systems},
|
|
volume = {2},
|
|
number = {1},
|
|
pages = {3},
|
|
year = {2014},
|
|
publisher = {BioMed Central}
|
|
}
|
|
|
|
@article{ramsay2004functional,
|
|
title = {Functional data analysis},
|
|
author = {Ramsay, James O},
|
|
journal = {Encyclopedia of Statistical Sciences},
|
|
volume = {4},
|
|
year = {2004},
|
|
publisher = {Wiley Online Library}
|
|
}
|
|
|
|
@inproceedings{riederer2016findyou,
|
|
title = {Findyou: A personal location privacy auditing tool},
|
|
author = {Riederer, Christopher and Echickson, Daniel and Huang, Stephanie and Chaintreau, Augustin},
|
|
booktitle = {Proceedings of the 25th International Conference Companion on World Wide Web},
|
|
pages = {243--246},
|
|
year = {2016}
|
|
}
|
|
|
|
@book{rogers2000diffusions,
|
|
title = {Diffusions, Markov processes and martingales: Volume 2, It{\^o} calculus},
|
|
author = {Rogers, L Chris G and Williams, David},
|
|
volume = {2},
|
|
year = {2000},
|
|
publisher = {Cambridge university press}
|
|
}
|
|
|
|
@misc{russell2018fitness,
|
|
title = {Fitness app {Strava} exposes the location of military bases},
|
|
author = {Russell, Jon},
|
|
year = {2018},
|
|
publisher = {TechCrunch},
|
|
howpublished = {\url{https://techcrunch.com/2018/01/28/strava-exposes-military-bases}},
|
|
note = {Accessed: July 1, 2020}
|
|
}
|
|
|
|
@inproceedings{samarati1998protecting,
|
|
title = {Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression},
|
|
author = {Samarati, Pierangela and Sweeney, Latanya},
|
|
booktitle = {IEEE Symposium on Research in Security and Privacy in},
|
|
year = {1998},
|
|
organization = {IEEE}
|
|
}
|
|
|
|
@article{satyanarayanan2017emergence,
|
|
title = {The emergence of edge computing},
|
|
author = {Satyanarayanan, Mahadev},
|
|
journal = {Computer},
|
|
volume = {50},
|
|
number = {1},
|
|
pages = {30--39},
|
|
year = {2017},
|
|
publisher = {IEEE}
|
|
}
|
|
|
|
@article{savage2013value,
|
|
title = {The value of online privacy},
|
|
author = {Savage, Scott and Waldman, Donald M},
|
|
year = {2013}
|
|
}
|
|
|
|
% new algorithm
|
|
@article{scaltsas1981identity,
|
|
title = {Identity, Origin and Spatiotemporal Continuity},
|
|
author = {Scaltsas, Theodore},
|
|
journal = {Philosophy},
|
|
volume = {56},
|
|
number = {217},
|
|
pages = {395--402},
|
|
year = {1981},
|
|
publisher = {JSTOR}
|
|
}
|
|
|
|
@article{shannon2001mathematical,
|
|
title = {A mathematical theory of communication},
|
|
author = {Shannon, Claude Elwood},
|
|
journal = {ACM SIGMOBILE mobile computing and communications review},
|
|
volume = {5},
|
|
number = {1},
|
|
pages = {3--55},
|
|
year = {2001},
|
|
publisher = {ACM}
|
|
}
|
|
|
|
@article{shmueli2012limiting,
|
|
title = {Limiting disclosure of sensitive data in sequential releases of databases},
|
|
author = {Shmueli, Erez and Tassa, Tamir and Wasserstein, Raz and Shapira, Bracha and Rokach, Lior},
|
|
journal = {Information Sciences},
|
|
volume = {191},
|
|
pages = {98--127},
|
|
year = {2012},
|
|
publisher = {Elsevier}
|
|
}
|
|
|
|
@article{shmueli2015privacy,
|
|
title = {Privacy by diversity in sequential releases of databases},
|
|
author = {Shmueli, Erez and Tassa, Tamir},
|
|
journal = {Information Sciences},
|
|
volume = {298},
|
|
pages = {344--372},
|
|
year = {2015},
|
|
publisher = {Elsevier}
|
|
}
|
|
|
|
@article{silva2013data,
|
|
title = {Data stream clustering: A survey},
|
|
author = {Silva, Jonathan A and Faria, Elaine R and Barros, Rodrigo C and Hruschka, Eduardo R and De Carvalho, Andre CPLF and Gama, Jo{\~a}o},
|
|
journal = {ACM Computing Surveys (CSUR)},
|
|
volume = {46},
|
|
number = {1},
|
|
pages = {13},
|
|
year = {2013},
|
|
publisher = {ACM}
|
|
}
|
|
|
|
@inproceedings{simi2017extensive,
|
|
title = {An extensive study on data anonymization algorithms based on k-anonymity},
|
|
author = {Simi, Ms MS and Nayaki, Mrs K Sankara and Elayidom, M Sudheep},
|
|
booktitle = {IOP Conference Series: Materials Science and Engineering},
|
|
volume = {225},
|
|
number = {1},
|
|
pages = {012279},
|
|
year = {2017},
|
|
organization = {IOP Publishing}
|
|
}
|
|
|
|
@book{skorokhod2005basic,
|
|
title = {Basic principles and applications of probability theory},
|
|
author = {Skorokhod, Valeriy},
|
|
year = {2005},
|
|
publisher = {Springer Science \& Business Media}
|
|
}
|
|
|
|
@inproceedings{song2017pufferfish,
|
|
title = {Pufferfish privacy mechanisms for correlated data},
|
|
author = {Song, Shuang and Wang, Yizhen and Chaudhuri, Kamalika},
|
|
booktitle = {Proceedings of the 2017 ACM International Conference on Management of Data},
|
|
pages = {1291--1306},
|
|
year = {2017},
|
|
organization = {ACM}
|
|
}
|
|
|
|
@article{soria2016big,
|
|
title = {Big data privacy: challenges to privacy principles and models},
|
|
author = {Soria-Comas, Jordi and Domingo-Ferrer, Josep},
|
|
journal = {Data Science and Engineering},
|
|
volume = {1},
|
|
number = {1},
|
|
pages = {21--28},
|
|
year = {2016},
|
|
publisher = {Springer}
|
|
}
|
|
|
|
@inproceedings{sorkine2004laplacian,
|
|
title = {Laplacian surface editing},
|
|
author = {Sorkine, Olga and Cohen-Or, Daniel and Lipman, Yaron and Alexa, Marc and R{\"o}ssl, Christian and Seidel, H-P},
|
|
booktitle = {Proceedings of the 2004 Eurographics/ACM SIGGRAPH symposium on Geometry processing},
|
|
pages = {175--184},
|
|
year = {2004}
|
|
}
|
|
|
|
@article{stigler1989francis,
|
|
title = {Francis Galton's account of the invention of correlation},
|
|
author = {Stigler, Stephen M},
|
|
journal = {Statistical Science},
|
|
pages = {73--79},
|
|
year = {1989},
|
|
publisher = {JSTOR}
|
|
}
|
|
|
|
@article{sweeney2002achieving,
|
|
title = {Achieving k-anonymity privacy protection using generalization and suppression},
|
|
author = {Sweeney, Latanya},
|
|
journal = {International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems},
|
|
volume = {10},
|
|
number = {05},
|
|
pages = {571--588},
|
|
year = {2002},
|
|
publisher = {World Scientific}
|
|
}
|
|
|
|
@article{sweeney2002k,
|
|
title = {k-anonymity: A model for protecting privacy},
|
|
author = {Sweeney, Latanya},
|
|
journal = {International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems},
|
|
volume = {10},
|
|
number = {05},
|
|
pages = {557--570},
|
|
year = {2002},
|
|
publisher = {World Scientific}
|
|
}
|
|
|
|
@article{tankard2016gdpr,
|
|
title = {What the GDPR means for businesses},
|
|
author = {Tankard, Colin},
|
|
journal = {Network Security},
|
|
volume = {2016},
|
|
number = {6},
|
|
pages = {5--8},
|
|
year = {2016},
|
|
publisher = {Elsevier}
|
|
}
|
|
|
|
@article{tobler1970computer,
|
|
title = {A computer movie simulating urban growth in the Detroit region},
|
|
author = {Tobler, Waldo R},
|
|
journal = {Economic geography},
|
|
volume = {46},
|
|
number = {sup1},
|
|
pages = {234--240},
|
|
year = {1970},
|
|
publisher = {Taylor \& Francis}
|
|
}
|
|
|
|
@online{transunion,
|
|
title = {TransUnion},
|
|
url = {https://www.transunion.com},
|
|
year = {Accessed: November 11, 2020}
|
|
}
|
|
|
|
@online{twitter,
|
|
title = {Twitter},
|
|
url = {https://www.twitter.com},
|
|
year = {Accessed: November 11, 2020}
|
|
}
|
|
|
|
@inproceedings{varghese2016challenges,
|
|
title = {Challenges and opportunities in edge computing},
|
|
author = {Varghese, Blesson and Wang, Nan and Barbhuiya, Sakil and Kilpatrick, Peter and Nikolopoulos, Dimitrios S},
|
|
booktitle = {2016 IEEE International Conference on Smart Cloud (SmartCloud)},
|
|
pages = {20--26},
|
|
year = {2016},
|
|
organization = {IEEE}
|
|
}
|
|
|
|
@article{vitter1985random,
|
|
title = {Random sampling with a reservoir},
|
|
author = {Vitter, Jeffrey S},
|
|
journal = {ACM Transactions on Mathematical Software (TOMS)},
|
|
volume = {11},
|
|
number = {1},
|
|
pages = {37--57},
|
|
year = {1985},
|
|
publisher = {ACM}
|
|
}
|
|
|
|
@article{walters1982introduction,
|
|
title = {An introduction to ergodic theory},
|
|
author = {Walters, Peter},
|
|
journal = {Graduate Texts in Mathematics},
|
|
year = {1982}
|
|
}
|
|
|
|
@inproceedings{wang2006anonymizing,
|
|
title = {Anonymizing sequential releases},
|
|
author = {Wang, Ke and Fung, Benjamin},
|
|
booktitle = {Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining},
|
|
pages = {414--423},
|
|
year = {2006},
|
|
organization = {ACM}
|
|
}
|
|
|
|
@inproceedings{wang2009survey,
|
|
title = {A survey on privacy preserving data mining},
|
|
author = {Wang, Jian and Luo, Yongcheng and Zhao, Yan and Le, Jiajin},
|
|
booktitle = {Database Technology and Applications, 2009 First International Workshop on},
|
|
pages = {111--114},
|
|
year = {2009},
|
|
organization = {IEEE}
|
|
}
|
|
|
|
@article{wang2010privacy,
|
|
title = {Privacy-preserving data publishing: A survey on recent developments},
|
|
author = {Wang, K and Chen, R and Fung, BC and Yu, PS},
|
|
journal = {ACM Computing Surveys},
|
|
year = {2010}
|
|
}
|
|
|
|
@inproceedings{wang2016rescuedp,
|
|
title = {RescueDP: Real-time spatio-temporal crowd-sourced data publishing with differential privacy},
|
|
author = {Wang, Qian and Zhang, Yan and Lu, Xiao and Wang, Zhibo and Qin, Zhan and Ren, Kui},
|
|
booktitle = {Computer Communications, IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on},
|
|
pages = {1--9},
|
|
year = {2016},
|
|
organization = {IEEE}
|
|
}
|
|
|
|
@article{wang2017cts,
|
|
title = {CTS-DP: publishing correlated time-series data via differential privacy},
|
|
author = {Wang, Hao and Xu, Zhengquan},
|
|
journal = {Knowledge-Based Systems},
|
|
volume = {122},
|
|
pages = {167--179},
|
|
year = {2017},
|
|
publisher = {Elsevier}
|
|
}
|
|
|
|
@inproceedings{wang2017privacy,
|
|
title = {Privacy Preserving Anonymity for Periodical SRS Data Publishing},
|
|
author = {Wang, Jie-Teng and Lin, Wen-Yang},
|
|
booktitle = {Data Engineering (ICDE), 2017 IEEE 33rd International Conference on},
|
|
pages = {1344--1355},
|
|
year = {2017},
|
|
organization = {IEEE}
|
|
}
|
|
|
|
@article{warner1965randomized,
|
|
title = {Randomized response: A survey technique for eliminating evasive answer bias},
|
|
author = {Warner, Stanley L},
|
|
journal = {Journal of the American Statistical Association},
|
|
volume = {60},
|
|
number = {309},
|
|
pages = {63--69},
|
|
year = {1965},
|
|
publisher = {Taylor \& Francis}
|
|
}
|
|
|
|
@online{waze,
|
|
title = {Waze},
|
|
url = {https://www.waze.com},
|
|
year = {Accessed: November 11, 2020}
|
|
}
|
|
|
|
@incollection{wei2006time,
|
|
title = {Time series analysis},
|
|
author = {Wei, William WS},
|
|
booktitle = {The Oxford Handbook of Quantitative Methods in Psychology: Vol. 2},
|
|
year = {2006}
|
|
}
|
|
|
|
@article{wernke2014classification,
|
|
title = {A classification of location privacy attacks and approaches},
|
|
author = {Wernke, Marius and Skvortsov, Pavel and D{\"u}rr, Frank and Rothermel, Kurt},
|
|
journal = {Personal and ubiquitous computing},
|
|
volume = {18},
|
|
number = {1},
|
|
pages = {163--175},
|
|
year = {2014},
|
|
publisher = {Springer}
|
|
}
|
|
|
|
@book{wiggins1967identity,
|
|
title = {Identity and spatio-temporal continuity},
|
|
author = {Wiggins, David},
|
|
year = {1967},
|
|
publisher = {Blackwell Oxford}
|
|
}
|
|
|
|
@online{wiki,
|
|
title = {Wikipedia},
|
|
url = {https://www.wikipedia.com},
|
|
year = {Accessed: November 11, 2020}
|
|
}
|
|
|
|
@misc{wired2014data,
|
|
title = {Data Is the New Oil of the Digital Economy},
|
|
author = {Joris Toonders},
|
|
year = {2014},
|
|
publisher = {Wired},
|
|
howpublished = {\url{https://www.wired.com/insights/2014/07/data-new-oil-digital-economy}},
|
|
note = {Accessed: December 1, 2019}
|
|
}
|
|
|
|
@misc{wolfgang1999stochastic,
|
|
title = {Stochastic Processes: From Physics to Finance},
|
|
author = {Wolfgang, Paul and Baschnagel, J},
|
|
year = {1999},
|
|
publisher = {Springer-Verlag, Berlin}
|
|
}
|
|
|
|
@inproceedings{wong2007minimality,
|
|
title = {Minimality attack in privacy preserving data publishing},
|
|
author = {Wong, Raymond Chi-Wing and Fu, Ada Wai-Chee and Wang, Ke and Pei, Jian},
|
|
booktitle = {Proceedings of the 33rd international conference on Very large data bases},
|
|
pages = {543--554},
|
|
year = {2007},
|
|
organization = {VLDB Endowment}
|
|
}
|
|
|
|
@inproceedings{xiao2007m,
|
|
title = {M-invariance: towards privacy preserving re-publication of dynamic data sets},
|
|
author = {Xiao, Xiaokui and Tao, Yufei},
|
|
booktitle = {Proceedings of the 2007 ACM SIGMOD international conference on Management of data},
|
|
pages = {689--700},
|
|
year = {2007},
|
|
organization = {ACM}
|
|
}
|
|
|
|
@inproceedings{xiao2015protecting,
|
|
title = {Protecting locations with differential privacy under temporal correlations},
|
|
author = {Xiao, Yonghui and Xiong, Li},
|
|
booktitle = {Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security},
|
|
pages = {1298--1309},
|
|
year = {2015},
|
|
organization = {ACM}
|
|
}
|
|
|
|
@article{xiao2017loclok,
|
|
title = {LocLok: location cloaking with differential privacy via hidden markov model},
|
|
author = {Xiao, Yonghui and Xiong, Li and Zhang, Si and Cao, Yang},
|
|
journal = {Proceedings of the VLDB Endowment},
|
|
volume = {10},
|
|
number = {12},
|
|
pages = {1901--1904},
|
|
year = {2017},
|
|
publisher = {VLDB Endowment}
|
|
}
|
|
|
|
@online{xssfopes2020tweet,
|
|
title = {{@xssfopes: ``can anyone spot the issue with the algo? red is original data point, 400 ``anonymized'' data points calculated''}},
|
|
url = {https://twitter.com/xssfox/status/1251116087116042241},
|
|
year = {Accessed: July 16, 2020}
|
|
}
|
|
|
|
@inproceedings{yang2015bayesian,
|
|
title = {Bayesian differential privacy on correlated data},
|
|
author = {Yang, Bin and Sato, Issei and Nakagawa, Hiroshi},
|
|
booktitle = {Proceedings of the 2015 ACM SIGMOD international conference on Management of Data},
|
|
pages = {747--762},
|
|
year = {2015},
|
|
organization = {ACM}
|
|
}
|
|
|
|
@inproceedings{ye2012meca,
|
|
title = {Meca: mobile edge capture and analysis middleware for social sensing applications},
|
|
author = {Ye, Fan and Ganti, Raghu and Dimaghani, Raheleh and Grueneberg, Keith and Calo, Seraphin},
|
|
booktitle = {Proceedings of the 21st International Conference on World Wide Web},
|
|
pages = {699--702},
|
|
year = {2012},
|
|
organization = {ACM}
|
|
}
|
|
|
|
@inproceedings{ye2017trajectory,
|
|
title = {A trajectory privacy-preserving algorithm based on road networks in continuous location-based services},
|
|
author = {Ye, Ayong and Li, Yacheng and Xu, Li and Li, Qing and Lin, Hui},
|
|
booktitle = {2017 IEEE Trustcom/BigDataSE/ICESS},
|
|
pages = {510--516},
|
|
year = {2017},
|
|
organization = {IEEE}
|
|
}
|
|
|
|
@inproceedings{yuan2011find,
|
|
title = {Where to find my next passenger},
|
|
author = {Yuan, Jing and Zheng, Yu and Zhang, Liuhang and Xie, XIng and Sun, Guangzhong},
|
|
booktitle = {Proceedings of the 13th international conference on Ubiquitous computing},
|
|
pages = {109--118},
|
|
year = {2011}
|
|
}
|
|
|
|
@article{zhang2017privbayes,
|
|
title = {Privbayes: Private data release via bayesian networks},
|
|
author = {Zhang, Jun and Cormode, Graham and Procopiuc, Cecilia M and Srivastava, Divesh and Xiao, Xiaokui},
|
|
journal = {ACM Transactions on Database Systems (TODS)},
|
|
volume = {42},
|
|
number = {4},
|
|
pages = {25},
|
|
year = {2017},
|
|
publisher = {ACM}
|
|
}
|
|
|
|
@inproceedings{zhao2017dependent,
|
|
title = {Dependent Differential Privacy for Correlated Data},
|
|
author = {Zhao, Jun and Zhang, Junshan and Poor, H Vincent},
|
|
booktitle = {Globecom Workshops (GC Wkshps), 2017 IEEE},
|
|
pages = {1--7},
|
|
year = {2017},
|
|
organization = {IEEE}
|
|
}
|
|
|
|
@inproceedings{zheng2008learning,
|
|
title = {Learning transportation mode from raw gps data for geographic applications on the web},
|
|
author = {Zheng, Yu and Liu, Like and Wang, Longhao and Xie, Xing},
|
|
booktitle = {Proceedings of the 17th international conference on World Wide Web},
|
|
pages = {247--256},
|
|
year = {2008}
|
|
}
|
|
|
|
@article{zheng2015trajectory,
|
|
title = {Trajectory data mining: an overview},
|
|
author = {Zheng, Yu},
|
|
journal = {ACM Transactions on Intelligent Systems and Technology (TIST)},
|
|
volume = {6},
|
|
number = {3},
|
|
pages = {1--41},
|
|
year = {2015},
|
|
publisher = {ACM New York, NY, USA}
|
|
}
|
|
|
|
@inproceedings{zhou2004discovering,
|
|
title = {Discovering personal gazetteers: an interactive clustering approach},
|
|
author = {Zhou, Changqing and Frankowski, Dan and Ludford, Pamela and Shekhar, Shashi and Terveen, Loren},
|
|
booktitle = {Proceedings of the 12th annual ACM international workshop on Geographic information systems},
|
|
pages = {266--273},
|
|
year = {2004}
|
|
}
|
|
|
|
@article{zhou2008brief,
|
|
title = {A brief survey on anonymization techniques for privacy preserving publishing of social network data},
|
|
author = {Zhou, Bin and Pei, Jian and Luk, WoShun},
|
|
journal = {ACM Sigkdd Explorations Newsletter},
|
|
volume = {10},
|
|
number = {2},
|
|
pages = {12--22},
|
|
year = {2008},
|
|
publisher = {ACM}
|
|
}
|
|
|
|
@inproceedings{zhou2009continuous,
|
|
title = {Continuous privacy preserving publishing of data streams},
|
|
author = {Zhou, Bin and Han, Yi and Pei, Jian and Jiang, Bin and Tao, Yufei and Jia, Yan},
|
|
booktitle = {Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology},
|
|
pages = {648--659},
|
|
year = {2009},
|
|
organization = {ACM}
|
|
}
|
|
|
|
@article{zhu2015correlated,
|
|
title = {Correlated differential privacy: hiding information in non-IID data set},
|
|
author = {Zhu, Tianqing and Xiong, Ping and Li, Gang and Zhou, Wanlei},
|
|
journal = {IEEE Transactions on Information Forensics and Security},
|
|
volume = {10},
|
|
number = {2},
|
|
pages = {229--242},
|
|
year = {2015},
|
|
publisher = {IEEE}
|
|
}
|
|
|
|
@article{zhu2017answering,
|
|
title = {Answering differentially private queries for continual data sets release},
|
|
author = {Zhu, Tianqing and Li, Gang and Xiong, Ping and Zhou, Wanlei},
|
|
journal = {Future Generation Computer Systems},
|
|
year = {2017},
|
|
publisher = {Elsevier}
|
|
}
|
|
|
|
@article{zheng2010geolife,
|
|
title={Geolife: A collaborative social networking service among user, location and trajectory.},
|
|
author={Zheng, Yu and Xie, Xing and Ma, Wei-Ying and others},
|
|
journal={IEEE Data Eng. Bull.},
|
|
volume={33},
|
|
number={2},
|
|
pages={32--39},
|
|
year={2010},
|
|
publisher={Citeseer}
|
|
}
|
|
|
|
@inproceedings{yuan2010t,
|
|
title={T-drive: driving directions based on taxi trajectories},
|
|
author={Yuan, Jing and Zheng, Yu and Zhang, Chengyang and Xie, Wenlei and Xie, Xing and Sun, Guangzhong and Huang, Yan},
|
|
booktitle={Proceedings of the 18th SIGSPATIAL International conference on advances in geographic information systems},
|
|
pages={99--108},
|
|
year={2010}
|
|
}
|
|
|
|
@article{desfontaines2020sok,
|
|
title={Sok: Differential privacies},
|
|
author={Desfontaines, Damien and Pej{\'o}, Bal{\'a}zs},
|
|
journal={Proceedings on Privacy Enhancing Technologies},
|
|
volume={2020},
|
|
number={2},
|
|
pages={288--313},
|
|
year={2020},
|
|
publisher={Sciendo}
|
|
}
|
|
|
|
@inproceedings{duchi2013local,
|
|
title={Local privacy and statistical minimax rates},
|
|
author={Duchi, John C and Jordan, Michael I and Wainwright, Martin J},
|
|
booktitle={2013 IEEE 54th Annual Symposium on Foundations of Computer Science},
|
|
pages={429--438},
|
|
year={2013},
|
|
organization={IEEE}
|
|
}
|