the-last-thing/text/bibliography.bib
2021-10-15 08:58:54 +02:00

2075 lines
71 KiB
BibTeX

@inproceedings{abul2008never,
title = {Never Walk Alone: Uncertainty for Anonymity in Moving Objects Databases.},
author = {Abul, Osman and Bonchi, Francesco and Nanni, Mirco and others},
booktitle = {ICDE},
volume = {8},
pages = {376--385},
year = {2008}
}
@article{acharya2019context,
title = {Context-Aware Local Differential Privacy},
author = {Acharya, Jayadev and Bonawitz, Keith and Kairouz, Peter and Ramage, Daniel and Sun, Ziteng},
journal = {arXiv preprint arXiv:1911.00038},
year = {2019}
}
@online{acxiom,
title = {Acxiom},
url = {https://acxiom.com},
year = {Accessed on October 11, 2021}
}
@book{adler2010geometry,
title = {The geometry of random fields},
author = {Adler, Robert J},
year = {2010},
publisher = {SIAM}
}
@misc{ahmed2017mobile,
title = {Mobile edge computing: opportunities, solutions, and challenges},
author = {Ahmed, Ejaz and Rehmani, Mubashir Husain},
year = {2017},
publisher = {Elsevier}
}
@article{ahmed2020survey,
title = {A survey of COVID-19 contact tracing apps},
author = {Ahmed, Nadeem and Michelin, Regio A and Xue, Wanli and Ruj, Sushmita and Malaney, Robert and Kanhere, Salil S and Seneviratne, Aruna and Hu, Wen and Janicke, Helge and Jha, Sanjay K},
journal = {IEEE access},
volume = {8},
pages = {134577--134601},
year = {2020},
publisher = {IEEE}
}
@article{al2018adaptive,
title = {An adaptive geo-indistinguishability mechanism for continuous LBS queries},
author = {Al-Dhubhani, Raed and Cazalas, Jonathan M},
journal = {Wireless Networks},
volume = {24},
number = {8},
pages = {3221--3239},
year = {2018},
publisher = {Springer}
}
@book{allan2013probability,
title = {Probability: a graduate course},
author = {Allan Gut},
volume = {75},
year = {2013},
publisher = {Springer Science \& Business Media}
}
@inproceedings{andres2013geo,
title = {Geo-indistinguishability: Differential privacy for location-based systems},
author = {Andr{\'e}s, Miguel E and Bordenabe, Nicol{\'a}s E and Chatzikokolakis, Konstantinos and Palamidessi, Catuscia},
booktitle = {Proceedings of the 2013 ACM SIGSAC conference on Computer \& communications security},
pages = {901--914},
year = {2013},
organization = {ACM}
}
@article{anselin1995local,
title = {Local indicators of spatial association—LISA},
author = {Anselin, Luc},
journal = {Geographical analysis},
volume = {27},
number = {2},
pages = {93--115},
year = {1995},
publisher = {Wiley Online Library}
}
@book{applebaum2009levy,
title = {L{\'e}vy processes and stochastic calculus},
author = {Applebaum, David},
year = {2009},
publisher = {Cambridge university press}
}
@article{ardagna2007location,
title = {Location privacy protection through obfuscation-based techniques},
author = {Ardagna, Claudio and Cremonini, Marco and Damiani, Ernesto and De Capitani di Vimercati, S and Samarati, Pierangela},
journal = {Data and Applications Security XXI},
pages = {47--60},
year = {2007},
publisher = {Springer}
}
@inproceedings{babcock2002sampling,
title = {Sampling from a moving window over streaming data},
author = {Babcock, Brian and Datar, Mayur and Motwani, Rajeev},
booktitle = {Proceedings of the thirteenth annual ACM-SIAM symposium on Discrete algorithms},
pages = {633--634},
year = {2002},
organization = {Society for Industrial and Applied Mathematics}
}
@article{baum1966statistical,
title = {Statistical inference for probabilistic functions of finite state Markov chains},
author = {Baum, Leonard E and Petrie, Ted},
journal = {The annals of mathematical statistics},
volume = {37},
number = {6},
pages = {1554--1563},
year = {1966},
publisher = {JSTOR}
}
@inproceedings{bayardo2005data,
title = {Data privacy through optimal k-anonymization},
author = {Bayardo, Roberto J and Agrawal, Rakesh},
booktitle = {Data Engineering, 2005. ICDE 2005. Proceedings. 21st International Conference on},
pages = {217--228},
year = {2005},
organization = {IEEE}
}
@inproceedings{benaloh2009patient,
title = {Patient controlled encryption: ensuring privacy of electronic medical records},
author = {Benaloh, Josh and Chase, Melissa and Horvitz, Eric and Lauter, Kristin},
booktitle = {Proceedings of the 2009 ACM workshop on Cloud computing security},
pages = {103--114},
year = {2009},
organization = {ACM}
}
@article{beresford2003location,
title = {Location privacy in pervasive computing},
author = {Beresford, Alastair R and Stajano, Frank},
journal = {IEEE Pervasive computing},
volume = {2},
number = {1},
pages = {46--55},
year = {2003},
publisher = {IEEE}
}
@article{birant2007st,
title = {ST-DBSCAN: An algorithm for clustering spatial--temporal data},
author = {Birant, Derya and Kut, Alp},
journal = {Data \& knowledge engineering},
volume = {60},
number = {1},
pages = {208--221},
year = {2007},
publisher = {Elsevier}
}
@inproceedings{bittau2017prochlo,
title = {Prochlo: Strong privacy for analytics in the crowd},
author = {Bittau, Andrea and Erlingsson, {\'U}lfar and Maniatis, Petros and Mironov, Ilya and Raghunathan, Ananth and Lie, David and Rudominer, Mitch and Kode, Ushasree and Tinnes, Julien and Seefeld, Bernhard},
booktitle = {Proceedings of the 26th Symposium on Operating Systems Principles},
pages = {441--459},
year = {2017},
organization = {ACM}
}
@inproceedings{blocki2013differentially,
title = {Differentially private data analysis of social networks via restricted sensitivity},
author = {Blocki, Jeremiah and Blum, Avrim and Datta, Anupam and Sheffet, Or},
booktitle = {Proceedings of the 4th conference on Innovations in Theoretical Computer Science},
pages = {87--96},
year = {2013},
organization = {ACM}
}
@article{bloom1970space,
title = {Space/time trade-offs in hash coding with allowable errors},
author = {Bloom, Burton H},
journal = {Communications of the ACM},
volume = {13},
number = {7},
pages = {422--426},
year = {1970},
publisher = {ACM}
}
@inproceedings{bolot2013private,
title = {Private decayed predicate sums on streams},
author = {Bolot, Jean and Fawaz, Nadia and Muthukrishnan, S and Nikolov, Aleksandar and Taft, Nina},
booktitle = {Proceedings of the 16th International Conference on Database Theory},
pages = {284--295},
year = {2013},
organization = {ACM}
}
@inproceedings{braverman2009optimal,
title = {Optimal sampling from sliding windows},
author = {Braverman, Vladimir and Ostrovsky, Rafail and Zaniolo, Carlo},
booktitle = {Proceedings of the twenty-eighth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems},
pages = {147--156},
year = {2009}
}
@inproceedings{cao2013efficient,
title = {Efficient and accurate strategies for differentially-private sliding window queries},
author = {Cao, Jianneng and Xiao, Qian and Ghinita, Gabriel and Li, Ninghui and Bertino, Elisa and Tan, Kian-Lee},
booktitle = {Proceedings of the 16th International Conference on Extending Database Technology},
pages = {191--202},
year = {2013}
}
@article{cao2014privacy,
title = {Privacy-preserving multi-keyword ranked search over encrypted cloud data},
author = {Cao, Ning and Wang, Cong and Li, Ming and Ren, Kui and Lou, Wenjing},
journal = {IEEE Transactions on parallel and distributed systems},
volume = {25},
number = {1},
pages = {222--233},
year = {2014},
publisher = {IEEE}
}
@inproceedings{cao2015differentially,
title = {Differentially private real-time data release over infinite trajectory streams},
author = {Cao, Yang and Yoshikawa, Masatoshi},
booktitle = {Mobile Data Management (MDM), 2015 16th IEEE International Conference on},
volume = {2},
pages = {68--73},
year = {2015},
organization = {IEEE}
}
@inproceedings{cao2017quantifying,
title = {Quantifying differential privacy under temporal correlations},
author = {Cao, Yang and Yoshikawa, Masatoshi and Xiao, Yonghui and Xiong, Li},
booktitle = {Data Engineering (ICDE), 2017 IEEE 33rd International Conference on},
pages = {821--832},
year = {2017},
organization = {IEEE}
}
@article{cao2018quantifying,
title = {Quantifying differential privacy in continuous data release under temporal correlations},
author = {Cao, Yang and Yoshikawa, Masatoshi and Xiao, Yonghui and Xiong, Li},
journal = {IEEE Transactions on Knowledge and Data Engineering},
volume = {31},
number = {7},
pages = {1281--1295},
year = {2018},
publisher = {IEEE}
}
@inproceedings{chakraborty2014ipshield,
title = {ipShield: a framework for enforcing context-aware privacy},
author = {Chakraborty, Supriyo and Shen, Chenguang and Raghavan, Kasturi Rangan and Shoukry, Yasser and Millar, Matt and Srivastava, Mani},
booktitle = {11th $\{$USENIX$\}$ Symposium on Networked Systems Design and Implementation ($\{$NSDI$\}$ 14)},
pages = {143--156},
year = {2014}
}
@misc{chambers2016personal,
title = {Personal Data: The New ``Oil'' of The Digital Economy},
author = {\c{T}uca Zb\^{a}rcea \& Asocia\c{t}ii},
year = {2016},
publisher = {Chambers and Partners},
howpublished = {\url{https://chambersandpartners.com/article/713/personal-data-the-new-oil-of-the-digital-economy}},
note = {Accessed on October 11, 2021}
}
@article{chan2011private,
title = {Private and continual release of statistics},
author = {Chan, T-H Hubert and Shi, Elaine and Song, Dawn},
journal = {ACM Transactions on Information and System Security (TISSEC)},
volume = {14},
number = {3},
pages = {26},
year = {2011},
publisher = {ACM}
}
@article{chan201397,
title = {97.49 on markov chains},
author = {Chan, KC and Lenard, CT and Mills, TM},
journal = {The Mathematical Gazette},
volume = {97},
number = {540},
pages = {515--520},
year = {2013},
publisher = {Cambridge University Press}
}
@misc{channelfour2018data,
title = {Data, Democracy and Dirty Tricks},
author = {Channel 4 News Investigations Team},
publisher = {Channel 4},
year = {2018},
howpublished = {\url{https://channel4.com/news/data-democracy-and-dirty-tricks-cambridge-analytica-uncovered-investigation-expose}},
note = {Accessed on October 11, 2021}
}
@inproceedings{chatzikokolakis2015geo,
title = {Geo-indistinguishability: A principled approach to location privacy},
author = {Chatzikokolakis, Konstantinos and Palamidessi, Catuscia and Stronati, Marco},
booktitle = {International Conference on Distributed Computing and Internet Technology},
pages = {49--72},
year = {2015},
organization = {Springer}
}
@article{chatzikokolakis2017methods,
title = {Methods for Location Privacy: A comparative overview},
author = {Chatzikokolakis, Kostantinos and ElSalamouny, Ehab and Palamidessi, Catuscia and Anna, Pazii and others},
journal = {Foundations and Trends{\textregistered} in Privacy and Security},
volume = {1},
number = {4},
pages = {199--257},
year = {2017},
publisher = {Now Publishers, Inc.}
}
@article{chen2011differentially,
title = {Differentially private trajectory data publication},
author = {Chen, Rui and Fung, Benjamin and Desai, Bipin C},
journal = {arXiv preprint arXiv:1112.2020},
year = {2011}
}
@inproceedings{chen2012differentially,
title = {Differentially private sequential data publication via variable-length n-grams},
author = {Chen, Rui and Acs, Gergely and Castelluccia, Claude},
booktitle = {Proceedings of the 2012 ACM conference on Computer and communications security},
pages = {638--649},
year = {2012},
organization = {ACM}
}
@article{chen2014correlated,
title = {Correlated network data publication via differential privacy},
author = {Chen, Rui and Fung, Benjamin C and Yu, Philip S and Desai, Bipin C},
journal = {The VLDB Journal-The International Journal on Very Large Data Bases},
volume = {23},
number = {4},
pages = {653--676},
year = {2014},
publisher = {Springer-Verlag New York, Inc.}
}
@inproceedings{chen2017pegasus,
title = {PeGaSus: Data-Adaptive Differentially Private Stream Processing},
author = {Chen, Yan and Machanavajjhala, Ashwin and Hay, Michael and Miklau, Gerome},
booktitle = {Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security},
pages = {1375--1388},
year = {2017},
organization = {ACM}
}
@article{chow2011trajectory,
title = {Trajectory privacy in location-based services and data publication},
author = {Chow, Chi-Yin and Mokbel, Mohamed F},
journal = {ACM Sigkdd Explorations Newsletter},
volume = {13},
number = {1},
pages = {19--29},
year = {2011},
publisher = {ACM}
}
@article{christin2011survey,
title = {A survey on privacy in mobile participatory sensing applications},
author = {Christin, Delphine and Reinhardt, Andreas and Kanhere, Salil S and Hollick, Matthias},
journal = {Journal of systems and software},
volume = {84},
number = {11},
pages = {1928--1946},
year = {2011},
publisher = {Elsevier}
}
@inproceedings{cormode2003finding,
title = {Finding hierarchical heavy hitters in data streams},
author = {Cormode, Graham and Korn, Flip and Muthukrishnan, Shanmugavelayutham and Srivastava, Divesh},
booktitle = {Proceedings 2003 VLDB Conference},
pages = {464--475},
year = {2003},
organization = {Elsevier}
}
@article{cortes2001signature,
title = {Signature-based methods for data streams},
author = {Cortes, Corinna and Pregibon, Daryl},
journal = {Data Mining and Knowledge Discovery},
volume = {5},
number = {3},
pages = {167--182},
year = {2001},
publisher = {Springer}
}
@article{croxton1939applied,
title = {Applied general statistics},
author = {Croxton, Frederick E and Cowden, Dudley J},
year = {1939},
publisher = {Prentice-Hall, Inc}
}
@book{daley2007introduction,
title = {An introduction to the theory of point processes: volume II: general theory and structure},
author = {Daley, Daryl J and Vere-Jones, David},
year = {2007},
publisher = {Springer Science \& Business Media}
}
@article{datar2002maintaining,
title = {Maintaining stream statistics over sliding windows},
author = {Datar, Mayur and Gionis, Aristides and Indyk, Piotr and Motwani, Rajeev},
journal = {SIAM journal on computing},
volume = {31},
number = {6},
pages = {1794--1813},
year = {2002},
publisher = {SIAM}
}
@article{de2013unique,
title = {Unique in the crowd: The privacy bounds of human mobility},
author = {De Montjoye, Yves-Alexandre and Hidalgo, C{\'e}sar A and Verleysen, Michel and Blondel, Vincent D},
journal = {Scientific reports},
volume = {3},
pages = {1376},
year = {2013},
publisher = {Nature Publishing Group}
}
@article{desfontaines2020sok,
title = {Sok: Differential privacies},
author = {Desfontaines, Damien and Pej{\'o}, Bal{\'a}zs},
journal = {Proceedings on Privacy Enhancing Technologies},
volume = {2020},
number = {2},
pages = {288--313},
year = {2020},
publisher = {Sciendo}
}
@article{douglas1973algorithms,
title = {Algorithms for the reduction of the number of points required to represent a digitized line or its caricature},
author = {Douglas, David H and Peucker, Thomas K},
journal = {Cartographica: the international journal for geographic information and geovisualization},
volume = {10},
number = {2},
pages = {112--122},
year = {1973},
publisher = {University of Toronto Press}
}
@inproceedings{duchi2013local,
title = {Local privacy and statistical minimax rates},
author = {Duchi, John C and Jordan, Michael I and Wainwright, Martin J},
booktitle = {2013 IEEE 54th Annual Symposium on Foundations of Computer Science},
pages = {429--438},
year = {2013},
organization = {IEEE}
}
@inproceedings{durr2011position,
title = {Position sharing for location privacy in non-trusted systems},
author = {D{\"u}rr, Frank and Skvortsov, Pavel and Rothermel, Kurt},
booktitle = {Pervasive Computing and Communications (PerCom), 2011 IEEE International Conference on},
pages = {189--196},
year = {2011},
organization = {IEEE}
}
@inproceedings{dwork2006calibrating,
title = {Calibrating noise to sensitivity in private data analysis},
author = {Dwork, Cynthia and McSherry, Frank and Nissim, Kobbi and Smith, Adam},
booktitle = {Theory of cryptography conference},
pages = {265--284},
year = {2006},
organization = {Springer}
}
@inproceedings{dwork2008differential,
title = {Differential privacy: A survey of results},
author = {Dwork, Cynthia},
booktitle = {International Conference on Theory and Applications of Models of Computation},
pages = {1--19},
year = {2008},
organization = {Springer}
}
@inproceedings{dwork2010differential,
title = {Differential privacy under continual observation},
author = {Dwork, Cynthia and Naor, Moni and Pitassi, Toniann and Rothblum, Guy N},
booktitle = {Proceedings of the forty-second ACM symposium on Theory of computing},
pages = {715--724},
year = {2010},
organization = {ACM}
}
@inproceedings{dwork2010pan,
title = {Pan-Private Streaming Algorithms.},
author = {Dwork, Cynthia and Naor, Moni and Pitassi, Toniann and Rothblum, Guy N and Yekhanin, Sergey},
booktitle = {ICS},
pages = {66--80},
year = {2010}
}
@article{dwork2011firm,
title = {A firm foundation for private data analysis},
author = {Dwork, Cynthia},
journal = {Communications of the ACM},
volume = {54},
number = {1},
pages = {86--95},
year = {2011},
publisher = {ACM}
}
@article{dwork2014algorithmic,
title = {The algorithmic foundations of differential privacy},
author = {Dwork, Cynthia and Roth, Aaron and others},
journal = {Foundations and Trends{\textregistered} in Theoretical Computer Science},
volume = {9},
number = {3--4},
pages = {211--407},
year = {2014},
publisher = {Now Publishers, Inc.}
}
@article{eames2003contact,
title = {Contact tracing and disease control},
author = {Eames, Ken TD and Keeling, Matt J},
journal = {Proceedings of the Royal Society of London. Series B: Biological Sciences},
volume = {270},
number = {1533},
pages = {2565--2571},
year = {2003},
publisher = {The Royal Society}
}
@misc{economist2016data,
title = {The world's most valuable resource is no longer oil, but data},
publisher = {The Economist},
year = {2016},
howpublished = {\url{https://economist.com/leaders/2017/05/06/the-worlds-most-valuable-resource-is-no-longer-oil-but-data}},
note = {Accessed on October 11, 2021}
}
@inproceedings{efthymiou2015big,
title = {Big data entity resolution: From highly to somehow similar entity descriptions in the Web},
author = {Efthymiou, Vasilis and Stefanidis, Kostas and Christophides, Vassilis},
booktitle = {2015 IEEE International Conference on Big Data (Big Data)},
pages = {401--410},
year = {2015},
organization = {IEEE}
}
@inproceedings{eiter2017spatial,
title = {Spatial ontology-mediated query answering over mobility streams},
author = {Eiter, Thomas and Parreira, Josiane Xavier and Schneider, Patrik},
booktitle = {European Semantic Web Conference},
pages = {219--237},
year = {2017},
organization = {Springer}
}
@inproceedings{erdogdu2015privacy,
title = {Privacy-utility trade-off under continual observation},
author = {Erdogdu, Murat A and Fawaz, Nadia},
booktitle = {ISIT},
pages = {1801--1805},
year = {2015}
}
@inproceedings{erlingsson2014rappor,
title = {Rappor: Randomized aggregatable privacy-preserving ordinal response},
author = {Erlingsson, {\'U}lfar and Pihur, Vasyl and Korolova, Aleksandra},
booktitle = {Proceedings of the 2014 ACM SIGSAC conference on computer and communications security},
pages = {1054--1067},
year = {2014},
organization = {ACM}
}
@inproceedings{errounda2018continuous,
title = {Continuous location statistics sharing algorithm with local differential privacy},
author = {Errounda, Fatima Zahra and Liu, Yan},
booktitle = {2018 IEEE International Conference on Big Data (Big Data)},
pages = {5147--5152},
year = {2018},
organization = {IEEE}
}
@online{experian,
title = {Experian},
url = {https://experian.com},
year = {Accessed on October 11, 2021}
}
@online{facebook,
title = {Facebook},
\url = {https://facebook.com},
year = {Accessed on October 11, 2021}
}
@inproceedings{fan2013differentially,
title = {Differentially private multi-dimensional time series release for traffic monitoring},
author = {Fan, Liyue and Xiong, Li and Sunderam, Vaidy},
booktitle = {IFIP Annual Conference on Data and Applications Security and Privacy},
pages = {33--48},
year = {2013},
organization = {Springer}
}
@article{fan2014adaptive,
title = {An adaptive approach to real-time aggregate monitoring with differential privacy},
author = {Fan, Liyue and Xiong, Li},
journal = {IEEE Transactions on Knowledge and Data Engineering},
volume = {26},
number = {9},
pages = {2094--2106},
year = {2014},
publisher = {IEEE}
}
@inproceedings{farokhi2020temporally,
title = {Temporally Discounted Differential Privacy for Evolving Datasets on an Infinite Horizon},
author = {Farokhi, Farhad},
booktitle = {2020 ACM/IEEE 11th International Conference on Cyber-Physical Systems (ICCPS)},
pages = {1--8},
year = {2020},
organization = {IEEE}
}
@article{fiore2019privacy,
title = {Privacy of trajectory micro-data: a survey},
author = {Fiore, Marco and Katsikouli, Panagiota and Zavou, Elli and Cunche, Mathieu and Fessant, Fran{\c{c}}oise and Hello, Dominique Le and Aivodji, Ulrich Matchi and Olivier, Baptiste and Quertier, Tony and Stanica, Razvan},
journal = {arXiv preprint arXiv:1903.12211},
year = {2019}
}
@online{foursquare,
title = {Foursquare},
url = {https://foursquare.com},
year = {Accessed on October 11, 2021}
}
@misc{franceschi-bicchierairussell2015redditor,
title = {Redditor cracks anonymous data trove to pinpoint Muslim cab drivers},
author = {Franceschi-Bicchierai, Lorenzo},
year = {2015},
publisher = {Mashable},
howpublished = {\url{https://mashable.com/2015/01/28/redditor-muslim-cab-drivers}},
note = {Accessed on October 11, 2021}
}
@book{fuller2009introduction,
title = {Introduction to statistical time series},
author = {Fuller, Wayne A},
volume = {428},
year = {2009},
publisher = {John Wiley \& Sons}
}
@inproceedings{fung2008anonymity,
title = {Anonymity for continuous data publishing},
author = {Fung, Benjamin and Wang, Ke and Fu, Ada Wai-Chee and Pei, Jian},
booktitle = {Proceedings of the 11th international conference on Extending database technology: Advances in database technology},
pages = {264--275},
year = {2008},
organization = {ACM}
}
@book{gagniuc2017markov,
title = {Markov Chains: From Theory to Implementation and Experimentation},
author = {Gagniuc, Paul A},
year = {2017},
publisher = {John Wiley \& Sons}
}
@incollection{gama2007data,
title = {Data stream processing},
author = {Gama, Jo{\~a}o and Rodrigues, Pedro Pereira},
booktitle = {Learning from Data Streams},
pages = {25--39},
year = {2007},
publisher = {Springer}
}
@inproceedings{gambs2010show,
title = {Show me how you move and I will tell you who you are},
author = {Gambs, S{\'e}bastien and Killijian, Marc-Olivier and del Prado Cortez, Miguel N{\'u}{\~n}ez},
booktitle = {Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS},
pages = {34--41},
year = {2010}
}
@inproceedings{ganta2008composition,
title = {Composition attacks and auxiliary information in data privacy},
author = {Ganta, Srivatsava Ranjit and Kasiviswanathan, Shiva Prasad and Smith, Adam},
booktitle = {Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining},
pages = {265--273},
year = {2008},
organization = {ACM}
}
@article{garcia2015edge,
title = {Edge-centric computing: Vision and challenges},
author = {Garcia Lopez, Pedro and Montresor, Alberto and Epema, Dick and Datta, Anwitaman and Higashino, Teruo and Iamnitchi, Adriana and Barcellos, Marinho and Felber, Pascal and Riviere, Etienne},
journal = {ACM SIGCOMM Computer Communication Review},
volume = {45},
number = {5},
pages = {37--42},
year = {2015},
publisher = {ACM}
}
@article{gedik2008protecting,
title = {Protecting location privacy with personalized k-anonymity: Architecture and algorithms},
author = {Gedik, Bugra and Liu, Ling},
journal = {IEEE Transactions on Mobile Computing},
volume = {7},
number = {1},
pages = {1--18},
year = {2008},
publisher = {IEEE}
}
@inproceedings{ghinita2008private,
title = {Private queries in location based services: anonymizers are not necessary},
author = {Ghinita, Gabriel and Kalnis, Panos and Khoshgozaran, Ali and Shahabi, Cyrus and Tan, Kian-Lee},
booktitle = {Proceedings of the 2008 ACM SIGMOD international conference on Management of data},
pages = {121--132},
year = {2008},
organization = {ACM}
}
@inproceedings{ghinita2009preventing,
title = {Preventing velocity-based linkage attacks in location-aware applications},
author = {Ghinita, Gabriel and Damiani, Maria Luisa and Silvestri, Claudio and Bertino, Elisa},
booktitle = {Proceedings of the 17th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems},
pages = {246--255},
year = {2009},
organization = {ACM}
}
@online{gmaps,
title = {Google Maps},
url = {https://google.com/maps},
year = {Accessed on October 11, 2021}
}
@article{goldreich1998secure,
title = {Secure multi-party computation},
author = {Goldreich, Oded},
journal = {Manuscript. Preliminary version},
volume = {78},
year = {1998}
}
@inproceedings{gotz2012maskit,
title = {Maskit: Privately releasing user context streams for personalized mobile applications},
author = {G{\"o}tz, Michaela and Nath, Suman and Gehrke, Johannes},
booktitle = {Proceedings of the 2012 ACM SIGMOD International Conference on Management of Data},
pages = {289--300},
year = {2012},
organization = {ACM}
}
@book{grunwald2007minimum,
title = {The minimum description length principle},
author = {Gr{\"u}nwald, Peter D},
year = {2007},
publisher = {MIT press}
}
@article{gruteser2004protecting,
title = {Protecting privacy, in continuous location-tracking applications},
author = {Gruteser, Marco and Liu, Xuan},
journal = {IEEE Security \& Privacy},
volume = {2},
number = {2},
pages = {28--34},
year = {2004},
publisher = {IEEE}
}
@misc{gualtieri2016perishable,
author = {Mike Gualtieri, Rowan Curran, Holger Kisker and Emily Miller},
title = {Perishable Insights -- Stop Wasting Money On Unactionable Analytics},
organization = {Forrester},
year = {2016}
}
@article{gursoy2018differentially,
title = {Differentially private and utility preserving publication of trajectory data},
author = {Gursoy, Mehmet Emre and Liu, Ling and Truex, Stacey and Yu, Lei},
journal = {IEEE Transactions on Mobile Computing},
year = {2018},
publisher = {IEEE}
}
@incollection{haas2016data,
title = {Data-stream sampling: basic techniques and results},
author = {Haas, Peter J},
booktitle = {Data Stream Management},
pages = {13--44},
year = {2016},
publisher = {Springer}
}
@inproceedings{hariharan2004project,
title = {Project Lachesis: parsing and modeling location histories},
author = {Hariharan, Ramaswamy and Toyama, Kentaro},
booktitle = {International Conference on Geographic Information Science},
pages = {106--124},
year = {2004},
organization = {Springer}
}
@inproceedings{hazarika2001qualitative,
title = {Qualitative spatio-temporal continuity},
author = {Hazarika, Shyamanta M and Cohn, Anthony G},
booktitle = {International Conference on Spatial Information Theory},
pages = {92--107},
year = {2001},
organization = {Springer}
}
@article{he2011preventing,
title = {Preventing equivalence attacks in updated, anonymized data},
author = {He, Yeye and Barman, Siddharth and Naughton, Jeffrey},
year = {2011}
}
@article{he2015dpt,
title = {DPT: differentially private trajectory synthesis using hierarchical reference systems},
author = {He, Xi and Cormode, Graham and Machanavajjhala, Ashwin and Procopiuc, Cecilia M and Srivastava, Divesh},
journal = {Proceedings of the VLDB Endowment},
volume = {8},
number = {11},
pages = {1154--1165},
year = {2015},
publisher = {VLDB Endowment}
}
@inproceedings{hua2015differentially,
title = {Differentially private publication of general time-serial trajectory data},
author = {Hua, Jingyu and Gao, Yue and Zhong, Sheng},
booktitle = {Computer Communications (INFOCOM), 2015 IEEE Conference on},
pages = {549--557},
year = {2015},
organization = {IEEE}
}
@article{huguenin2017predictive,
title = {A predictive model for user motivation and utility implications of privacy-protection mechanisms in location check-ins},
author = {Huguenin, K{\'e}vin and Bilogrevic, Igor and Machado, Joana Soares and Mihaila, Stefan and Shokri, Reza and Dacosta, Italo and Hubaux, Jean-Pierre},
journal = {IEEE Transactions on Mobile Computing},
volume = {17},
number = {4},
pages = {760--774},
year = {2017},
publisher = {IEEE}
}
@article{jain2016big,
title = {Big data privacy: a technological perspective and review},
author = {Jain, Priyank and Gyanchandani, Manasi and Khare, Nilay},
journal = {Journal of Big Data},
volume = {3},
number = {1},
pages = {25},
year = {2016},
publisher = {Springer}
}
@article{ji2014differential,
title = {Differential privacy and machine learning: a survey and review},
author = {Ji, Zhanglong and Lipton, Zachary C and Elkan, Charles},
journal = {arXiv preprint arXiv:1412.7584},
year = {2014}
}
@article{jiang2006research,
title = {Research issues in data stream association rule mining},
author = {Jiang, Nan and Gruenwald, Le},
journal = {ACM Sigmod Record},
volume = {35},
number = {1},
pages = {14--19},
year = {2006},
publisher = {ACM New York, NY, USA}
}
@inproceedings{jiang2013publishing,
title = {Publishing trajectories with differential privacy guarantees},
author = {Jiang, Kaifeng and Shao, Dongxu and Bressan, St{\'e}phane and Kister, Thomas and Tan, Kian-Lee},
booktitle = {Proceedings of the 25th International Conference on Scientific and Statistical Database Management},
pages = {12},
year = {2013},
organization = {ACM}
}
@article{johnson2018towards,
title = {Towards practical differential privacy for SQL queries},
author = {Johnson, Noah and Near, Joseph P and Song, Dawn},
journal = {Proceedings of the VLDB Endowment},
volume = {11},
number = {5},
pages = {526--539},
year = {2018},
publisher = {VLDB Endowment}
}
@article{kalman1960new,
title = {A new approach to linear filtering and prediction problems},
author = {Kalman, Rudolph Emil},
journal = {Journal of basic Engineering},
volume = {82},
number = {1},
pages = {35--45},
year = {1960},
publisher = {American Society of Mechanical Engineers}
}
@inproceedings{kamara2010cryptographic,
title = {Cryptographic cloud storage},
author = {Kamara, Seny and Lauter, Kristin},
booktitle = {International Conference on Financial Cryptography and Data Security},
pages = {136--149},
year = {2010},
organization = {Springer}
}
@book{karlin2014first,
title = {A first course in stochastic processes},
author = {Karlin, Samuel},
year = {2014},
publisher = {Academic press}
}
@inproceedings{katsomallos2014easyharvest,
title = {EasyHarvest: Supporting the deployment and management of sensing applications on smartphones},
author = {Katsomallos, Manos and Lalis, Spyros},
booktitle = {Pervasive Computing and Communications Workshops (PERCOM Workshops), 2014 IEEE International Conference on},
pages = {80--85},
year = {2014},
organization = {IEEE}
}
@inproceedings{katsomallos2017open,
title = {An open framework for flexible plug-in privacy mechanisms in crowdsensing applications},
author = {Katsomallos, Manos and Lalis, Spyros and Papaioannou, Thanasis and Theodorakopoulos, George},
booktitle = {Pervasive Computing and Communications Workshops (PerCom Workshops), 2017 IEEE International Conference on},
pages = {237--242},
year = {2017},
organization = {IEEE}
}
@article{katsomallos2019privacy,
title = {Privacy, Space and Time: a Survey on Privacy-Preserving Continuous Data Publishing},
author = {Katsomallos, Manos and Tzompanaki, Katerina and Kotzinos, Dimitris},
journal = {Journal of Spatial Information Science},
volume = {2019},
number = {19},
pages = {57--103},
year = {2019}
}
@inproceedings{kellaris2013practical,
title = {Practical differential privacy via grouping and smoothing},
author = {Kellaris, Georgios and Papadopoulos, Stavros},
booktitle = {Proceedings of the VLDB Endowment},
volume = {6},
number = {5},
pages = {301--312},
year = {2013},
organization = {VLDB Endowment}
}
@article{kellaris2014differentially,
title = {Differentially private event sequences over infinite streams},
author = {Kellaris, Georgios and Papadopoulos, Stavros and Xiao, Xiaokui and Papadias, Dimitris},
journal = {Proceedings of the VLDB Endowment},
volume = {7},
number = {12},
pages = {1155--1166},
year = {2014},
publisher = {VLDB Endowment}
}
@article{khurana2010smart,
title = {Smart-grid security issues},
author = {Khurana, Himanshu and Hadley, Mark and Lu, Ning and Frincke, Deborah A},
journal = {IEEE Security \& Privacy},
volume = {8},
number = {1},
pages = {81--85},
year = {2010},
publisher = {IEEE}
}
@inproceedings{kido2005anonymous,
title = {An anonymous communication technique using dummies for location-based services},
author = {Kido, Hidetoshi and Yanagisawa, Yutaka and Satoh, Tetsuji},
booktitle = {Pervasive Services, 2005. ICPS'05. Proceedings. International Conference on},
pages = {88--97},
year = {2005},
organization = {IEEE}
}
@inproceedings{kifer2009attacks,
title = {Attacks on privacy and deFinetti's theorem},
author = {Kifer, Daniel},
booktitle = {Proceedings of the 2009 ACM SIGMOD International Conference on Management of data},
pages = {127--138},
year = {2009},
organization = {ACM}
}
@inproceedings{kifer2011no,
title = {No free lunch in data privacy},
author = {Kifer, Daniel and Machanavajjhala, Ashwin},
booktitle = {Proceedings of the 2011 ACM SIGMOD International Conference on Management of data},
pages = {193--204},
year = {2011},
organization = {ACM}
}
@article{kifer2014pufferfish,
title = {Pufferfish: A framework for mathematical privacy definitions},
author = {Kifer, Daniel and Machanavajjhala, Ashwin},
journal = {ACM Transactions on Database Systems (TODS)},
volume = {39},
number = {1},
pages = {3},
year = {2014},
publisher = {ACM}
}
@article{king1983centralized,
title = {Centralized versus decentralized computing: organizational considerations and management options},
author = {King, John Leslie},
journal = {ACM Computing Surveys (CSUR)},
volume = {15},
number = {4},
pages = {319--349},
year = {1983},
publisher = {ACM}
}
@incollection{knuth1968art,
author = {Knuth, Donald Ervin},
title = {Seminumerical Algorithms},
booktitle = {The Art of Computer Programming},
publisher = {Addison-Wesley},
year = {1968},
volume = {2},
edition = {2},
isbn = {0-201-03801-3}
}
@inproceedings{krumm2013placer,
title = {Placer: semantic place labels from diary data},
author = {Krumm, John and Rouhana, Dany},
booktitle = {Proceedings of the 2013 ACM international joint conference on Pervasive and ubiquitous computing},
pages = {163--172},
year = {2013}
}
@article{lafferty2001conditional,
title = {Conditional random fields: Probabilistic models for segmenting and labeling sequence data},
author = {Lafferty, John and McCallum, Andrew and Pereira, Fernando CN},
year = {2001}
}
@article{laney20013d,
title = {3D data management: Controlling data volume, velocity and variety},
author = {Laney, Doug},
journal = {META Group Research Note},
volume = {6},
number = {70},
year = {2001}
}
@book{lawler2010random,
title = {Random walk: a modern introduction},
author = {Lawler, Gregory F and Limic, Vlada},
volume = {123},
year = {2010},
publisher = {Cambridge University Press}
}
@inproceedings{lee2008trajectory,
title = {Trajectory outlier detection: A partition-and-detect framework},
author = {Lee, Jae-Gil and Han, Jiawei and Li, Xiaolei},
booktitle = {2008 IEEE 24th International Conference on Data Engineering},
pages = {140--149},
year = {2008},
organization = {IEEE}
}
@inproceedings{lee2011much,
title = {How much is enough? choosing $\varepsilon$ for differential privacy},
author = {Lee, Jaewoo and Clifton, Chris},
booktitle = {International Conference on Information Security},
pages = {325--340},
year = {2011},
organization = {Springer}
}
@article{legendre1993spatial,
title = {Spatial autocorrelation: trouble or new paradigm?},
author = {Legendre, Pierre},
journal = {Ecology},
volume = {74},
number = {6},
pages = {1659--1673},
year = {1993},
publisher = {Wiley Online Library}
}
@inproceedings{li2007hiding,
title = {Hiding in the crowd: Privacy preservation on evolving streams through correlation tracking},
author = {Li, Feifei and Sun, Jimeng and Papadimitriou, Spiros and Mihaila, George A and Stanoi, Ioana},
booktitle = {Data Engineering, 2007. ICDE 2007. IEEE 23rd International Conference on},
pages = {686--695},
year = {2007},
organization = {IEEE}
}
@inproceedings{li2007t,
title = {t-closeness: Privacy beyond k-anonymity and l-diversity},
author = {Li, Ninghui and Li, Tiancheng and Venkatasubramanian, Suresh},
booktitle = {Data Engineering, 2007. ICDE 2007. IEEE 23rd International Conference on},
pages = {106--115},
year = {2007},
organization = {IEEE}
}
@inproceedings{li2008mining,
title = {Mining user similarity based on location history},
author = {Li, Quannan and Zheng, Yu and Xie, Xing and Chen, Yukun and Liu, Wenyu and Ma, Wei-Ying},
booktitle = {Proceedings of the 16th ACM SIGSPATIAL international conference on Advances in geographic information systems},
pages = {1--10},
year = {2008}
}
@inproceedings{li2012sampling,
title = {On sampling, anonymization, and differential privacy or, k-anonymization meets differential privacy},
author = {Li, Ninghui and Qardaji, Wahbeh and Su, Dong},
booktitle = {Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security},
pages = {32--33},
year = {2012},
organization = {ACM}
}
@article{li2016hybrid,
title = {A hybrid approach to prevent composition attacks for independent data releases},
author = {Li, Jiuyong and Baig, Muzammil M and Sattar, AHM Sarowar and Ding, Xiaofeng and Liu, Jixue and Vincent, Millist W},
journal = {Information Sciences},
volume = {367},
pages = {324--336},
year = {2016},
publisher = {Elsevier}
}
@article{li2017achieving,
title = {Achieving differential privacy of trajectory data publishing in participatory sensing},
author = {Li, Meng and Zhu, Liehuang and Zhang, Zijian and Xu, Rixin},
journal = {Information Sciences},
volume = {400},
pages = {1--13},
year = {2017},
publisher = {Elsevier}
}
@incollection{lifshits2012lectures,
title = {Lectures on Gaussian processes},
author = {Lifshits, Mikhail},
booktitle = {Lectures on Gaussian Processes},
pages = {1--117},
year = {2012},
publisher = {Springer}
}
@inproceedings{liu2016dependence,
title = {Dependence Makes You Vulnerable: Differential Privacy Under Dependent Tuples},
author = {Liu, Changchang and Chakraborty, Supriyo and Mittal, Prateek},
booktitle = {NDSS},
volume = {16},
pages = {21--24},
year = {2016}
}
@article{lyon2014surveillance,
title = {Surveillance, Snowden, and big data: Capacities, consequences, critique},
author = {Lyon, David},
journal = {Big Data \& Society},
volume = {1},
number = {2},
pages = {2053951714541861},
year = {2014},
publisher = {SAGE Publications Sage UK: London, England}
}
@article{ma2017plp,
title = {PLP: Protecting location privacy against correlation analyze Attack in crowdsensing},
author = {Ma, Qiang and Zhang, Shanfeng and Zhu, Tong and Liu, Kebin and Zhang, Lan and He, Wenbo and Liu, Yunhao},
journal = {IEEE transactions on mobile computing},
volume = {16},
number = {9},
pages = {2588--2598},
year = {2017},
publisher = {IEEE}
}
@article{ma2019real,
title = {Real-time privacy-preserving data release over vehicle trajectory},
author = {Ma, Zhuo and Zhang, Tian and Liu, Ximeng and Li, Xinghua and Ren, Kui},
journal = {IEEE transactions on vehicular technology},
volume = {68},
number = {8},
pages = {8091--8102},
year = {2019},
publisher = {IEEE}
}
@inproceedings{machanavajjhala2006diversity,
title = {l-diversity: Privacy beyond k-anonymity},
author = {Machanavajjhala, Ashwin and Gehrke, Johannes and Kifer, Daniel and Venkitasubramaniam, Muthuramakrishnan},
booktitle = {Data Engineering, 2006. ICDE'06. Proceedings of the 22nd International Conference on},
pages = {24--24},
year = {2006},
organization = {IEEE}
}
@article{machanavajjhala2015designing,
title = {Designing statistical privacy for your data},
author = {Machanavajjhala, Ashwin and Kifer, Daniel},
journal = {Communications of the ACM},
volume = {58},
number = {3},
pages = {58--67},
year = {2015},
publisher = {ACM}
}
@techreport{makonin2018hue,
title = {HUE: The hourly usage of energy dataset for buildings in British Columbia},
author = {Makonin, Stephen},
year = {2018}
}
@article{matyas1990visual,
title = {Visual analysis of single-case time series: Effects of variability, serial dependence, and magnitude of intervention effects},
author = {Matyas, Thomas A and Greenwood, Kenneth M},
journal = {Journal of Applied Behavior Analysis},
volume = {23},
number = {3},
pages = {341--351},
year = {1990},
publisher = {Wiley Online Library}
}
@inproceedings{mcsherry2007mechanism,
title = {Mechanism design via differential privacy},
author = {McSherry, Frank and Talwar, Kunal},
booktitle = {Foundations of Computer Science, 2007. FOCS'07. 48th Annual IEEE Symposium on},
pages = {94--103},
year = {2007},
organization = {IEEE}
}
@inproceedings{mcsherry2009privacy,
title = {Privacy integrated queries: an extensible platform for privacy-preserving data analysis},
author = {McSherry, Frank D},
booktitle = {Proceedings of the 2009 ACM SIGMOD International Conference on Management of data},
pages = {19--30},
year = {2009},
organization = {ACM}
}
@inproceedings{metwally2005duplicate,
title = {Duplicate detection in click streams},
author = {Metwally, Ahmed and Agrawal, Divyakant and El Abbadi, Amr},
booktitle = {Proceedings of the 14th international conference on World Wide Web},
pages = {12--21},
year = {2005}
}
@article{moran1950notes,
title = {Notes on continuous stochastic phenomena},
author = {Moran, Patrick AP},
journal = {Biometrika},
volume = {37},
number = {1/2},
pages = {17--23},
year = {1950},
publisher = {JSTOR}
}
@inproceedings{motwani2007efficient,
title = {Efficient algorithms for masking and finding quasi-identifiers},
author = {Motwani, Rajeev and Xu, Ying},
booktitle = {Proceedings of the Conference on Very Large Data Bases (VLDB)},
pages = {83--93},
year = {2007}
}
@article{muthukrishnan2005data,
title = {Data streams: Algorithms and applications},
author = {Muthukrishnan, Shanmugavelayutham and others},
journal = {Foundations and Trends{\textregistered} in Theoretical Computer Science},
volume = {1},
number = {2},
pages = {117--236},
year = {2005},
publisher = {Now Publishers, Inc.}
}
@inproceedings{naim2019off,
title = {ON-OFF privacy with correlated requests},
author = {Naim, Carolina and Ye, Fangwei and El Rouayheb, Salim},
booktitle = {2019 IEEE International Symposium on Information Theory (ISIT)},
pages = {817--821},
year = {2019},
organization = {IEEE}
}
@inproceedings{narayanan2008robust,
title = {Robust de-anonymization of large sparse data sets},
author = {Narayanan, Arvind and Shmatikov, Vitaly},
booktitle = {Security and Privacy, 2008. SP 2008. IEEE Symposium on},
pages = {111--125},
year = {2008},
organization = {IEEE}
}
@online{osm,
title = {OpenStreetMap},
url = {https://openstreetmap.org},
year = {Accessed on October 11, 2021}
}
@article{ou2018optimal,
title = {An optimal pufferfish privacy mechanism for temporally correlated trajectories},
author = {Ou, Lu and Qin, Zheng and Liao, Shaolin and Yin, Hui and Jia, Xiaohua},
journal = {IEEE Access},
volume = {6},
pages = {37150--37165},
year = {2018},
publisher = {IEEE}
}
@inproceedings{ozccep2015stream,
title = {Stream-query compilation with ontologies},
author = {{\"O}z{\c{c}}ep, {\"O}zg{\"u}r L{\"u}tf{\"u} and M{\"o}ller, Ralf and Neuenstadt, Christian},
booktitle = {Australasian Joint Conference on Artificial Intelligence},
pages = {457--463},
year = {2015},
organization = {Springer}
}
@article{papoulis1984bayes,
title = {Bayes' theorem in statistics and Bayes' theorem in statistics (reexamined)},
author = {Papoulis, A},
journal = {Probability, random variables, and stochastic processes. 2nd ed. New York, NY: McGraw-Hill},
pages = {38--114},
year = {1984}
}
@book{park2018fundamentals,
title = {Fundamentals of Probability and Stochastic Processes with Applications to Communications},
author = {Park, Kun Il and Park},
year = {2018},
publisher = {Springer}
}
@inproceedings{perera2014mosden,
title = {Mosden: An internet of things middleware for resource constrained mobile devices},
author = {Perera, Charith and Jayaraman, Prem Prakash and Zaslavsky, Arkady and Christen, Peter and Georgakopoulos, Dimitrios},
booktitle = {2014 47th Hawaii International Conference on System Sciences},
pages = {1053--1062},
year = {2014},
organization = {IEEE}
}
@inproceedings{primault2015time,
title = {Time distortion anonymization for the publication of mobility data with high utility},
author = {Primault, Vincent and Mokhtar, Sonia Ben and Lauradoux, C{\'e}dric and Brunie, Lionel},
booktitle = {Trustcom/BigDataSE/ISPA, 2015 IEEE},
volume = {1},
pages = {539--546},
year = {2015},
organization = {IEEE}
}
@article{primault2018long,
title = {The Long Road to Computational Location Privacy: A Survey},
author = {Primault, Vincent and Boutet, Antoine and Mokhtar, Sonia Ben and Brunie, Lionel},
journal = {IEEE Communications Surveys \& Tutorials},
year = {2018},
publisher = {IEEE}
}
@book{quinlan2014c4,
title = {Programs for machine learning},
author = {Quinlan, J Ross},
year = {2014},
publisher = {Elsevier}
}
@inproceedings{quoc2017privapprox,
title = {PrivApprox: privacy-preserving stream analytics},
author = {Quoc, Do Le and Beck, Martin and Bhatotia, Pramod and Chen, Ruichuan and Fetzer, Christof and Strufe, Thorsten},
booktitle = {Proceedings of the 2017 USENIX Conference on Usenix Annual Technical Conference},
pages = {659--672},
year = {2017},
organization = {USENIX Association}
}
@article{raghupathi2014big,
title = {Big data analytics in healthcare: promise and potential},
author = {Raghupathi, Wullianallur and Raghupathi, Viju},
journal = {Health information science and systems},
volume = {2},
number = {1},
pages = {3},
year = {2014},
publisher = {BioMed Central}
}
@article{ramsay2004functional,
title = {Functional data analysis},
author = {Ramsay, James O},
journal = {Encyclopedia of Statistical Sciences},
volume = {4},
year = {2004},
publisher = {Wiley Online Library}
}
@inproceedings{riederer2016findyou,
title = {Findyou: A personal location privacy auditing tool},
author = {Riederer, Christopher and Echickson, Daniel and Huang, Stephanie and Chaintreau, Augustin},
booktitle = {Proceedings of the 25th International Conference Companion on World Wide Web},
pages = {243--246},
year = {2016}
}
@online{ring,
title = {Ring},
url = {https://ring.com},
year = {Accessed on October 11, 2021}
}
@book{rogers2000diffusions,
title = {Diffusions, Markov processes and martingales: Volume 2, It{\^o} calculus},
author = {Rogers, L Chris G and Williams, David},
volume = {2},
year = {2000},
publisher = {Cambridge university press}
}
@misc{russell2018fitness,
title = {Fitness app {Strava} exposes the location of military bases},
author = {Russell, Jon},
year = {2018},
publisher = {TechCrunch},
howpublished = {\url{https://techcrunch.com/2018/01/28/strava-exposes-military-bases}},
note = {Accessed on October 11, 2021}
}
@inproceedings{samarati1998protecting,
title = {Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression},
author = {Samarati, Pierangela and Sweeney, Latanya},
booktitle = {IEEE Symposium on Research in Security and Privacy in},
year = {1998},
organization = {IEEE}
}
@article{sapiezynski2019interaction,
title = {Interaction data from the copenhagen networks study},
author = {Sapiezynski, Piotr and Stopczynski, Arkadiusz and Lassen, David Dreyer and Lehmann, Sune},
journal = {Scientific Data},
volume = {6},
number = {1},
pages = {1--10},
year = {2019},
publisher = {Nature Publishing Group}
}
@article{satyanarayanan2017emergence,
title = {The emergence of edge computing},
author = {Satyanarayanan, Mahadev},
journal = {Computer},
volume = {50},
number = {1},
pages = {30--39},
year = {2017},
publisher = {IEEE}
}
@article{savage2013value,
title = {The value of online privacy},
author = {Savage, Scott and Waldman, Donald M},
year = {2013}
}
@article{scaltsas1981identity,
title = {Identity, Origin and Spatiotemporal Continuity},
author = {Scaltsas, Theodore},
journal = {Philosophy},
volume = {56},
number = {217},
pages = {395--402},
year = {1981},
publisher = {JSTOR}
}
@article{shannon2001mathematical,
title = {A mathematical theory of communication},
author = {Shannon, Claude Elwood},
journal = {ACM SIGMOBILE mobile computing and communications review},
volume = {5},
number = {1},
pages = {3--55},
year = {2001},
publisher = {ACM}
}
@article{shmueli2012limiting,
title = {Limiting disclosure of sensitive data in sequential releases of databases},
author = {Shmueli, Erez and Tassa, Tamir and Wasserstein, Raz and Shapira, Bracha and Rokach, Lior},
journal = {Information Sciences},
volume = {191},
pages = {98--127},
year = {2012},
publisher = {Elsevier}
}
@article{shmueli2015privacy,
title = {Privacy by diversity in sequential releases of databases},
author = {Shmueli, Erez and Tassa, Tamir},
journal = {Information Sciences},
volume = {298},
pages = {344--372},
year = {2015},
publisher = {Elsevier}
}
@article{silva2013data,
title = {Data stream clustering: A survey},
author = {Silva, Jonathan A and Faria, Elaine R and Barros, Rodrigo C and Hruschka, Eduardo R and De Carvalho, Andre CPLF and Gama, Jo{\~a}o},
journal = {ACM Computing Surveys (CSUR)},
volume = {46},
number = {1},
pages = {13},
year = {2013},
publisher = {ACM}
}
@inproceedings{simi2017extensive,
title = {An extensive study on data anonymization algorithms based on k-anonymity},
author = {Simi, Ms MS and Nayaki, Mrs K Sankara and Elayidom, M Sudheep},
booktitle = {IOP Conference Series: Materials Science and Engineering},
volume = {225},
number = {1},
pages = {012279},
year = {2017},
organization = {IOP Publishing}
}
@book{skorokhod2005basic,
title = {Basic principles and applications of probability theory},
author = {Skorokhod, Valeriy},
year = {2005},
publisher = {Springer Science \& Business Media}
}
@inproceedings{song2017pufferfish,
title = {Pufferfish privacy mechanisms for correlated data},
author = {Song, Shuang and Wang, Yizhen and Chaudhuri, Kamalika},
booktitle = {Proceedings of the 2017 ACM International Conference on Management of Data},
pages = {1291--1306},
year = {2017},
organization = {ACM}
}
@article{soria2016big,
title = {Big data privacy: challenges to privacy principles and models},
author = {Soria-Comas, Jordi and Domingo-Ferrer, Josep},
journal = {Data Science and Engineering},
volume = {1},
number = {1},
pages = {21--28},
year = {2016},
publisher = {Springer}
}
@inproceedings{sorkine2004laplacian,
title = {Laplacian surface editing},
author = {Sorkine, Olga and Cohen-Or, Daniel and Lipman, Yaron and Alexa, Marc and R{\"o}ssl, Christian and Seidel, H-P},
booktitle = {Proceedings of the 2004 Eurographics/ACM SIGGRAPH symposium on Geometry processing},
pages = {175--184},
year = {2004}
}
@article{stigler1989francis,
title = {Francis Galton's account of the invention of correlation},
author = {Stigler, Stephen M},
journal = {Statistical Science},
pages = {73--79},
year = {1989},
publisher = {JSTOR}
}
@article{sweeney2002achieving,
title = {Achieving k-anonymity privacy protection using generalization and suppression},
author = {Sweeney, Latanya},
journal = {International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems},
volume = {10},
number = {05},
pages = {571--588},
year = {2002},
publisher = {World Scientific}
}
@article{sweeney2002k,
title = {k-anonymity: A model for protecting privacy},
author = {Sweeney, Latanya},
journal = {International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems},
volume = {10},
number = {05},
pages = {557--570},
year = {2002},
publisher = {World Scientific}
}
@article{tankard2016gdpr,
title = {What the GDPR means for businesses},
author = {Tankard, Colin},
journal = {Network Security},
volume = {2016},
number = {6},
pages = {5--8},
year = {2016},
publisher = {Elsevier}
}
@article{tobler1970computer,
title = {A computer movie simulating urban growth in the Detroit region},
author = {Tobler, Waldo R},
journal = {Economic geography},
volume = {46},
number = {sup1},
pages = {234--240},
year = {1970},
publisher = {Taylor \& Francis}
}
@online{tousanticovid,
title = {TousAntiCovid},
url = {https://bonjour.tousanticovid.gouv.fr},
year = {Accessed on October 11, 2021}
}
@online{transunion,
title = {TransUnion},
url = {https://transunion.com},
year = {Accessed on October 11, 2021}
}
@online{twitter,
title = {Twitter},
url = {https://twitter.com},
year = {Accessed on October 11, 2021}
}
@inproceedings{varghese2016challenges,
title = {Challenges and opportunities in edge computing},
author = {Varghese, Blesson and Wang, Nan and Barbhuiya, Sakil and Kilpatrick, Peter and Nikolopoulos, Dimitrios S},
booktitle = {2016 IEEE International Conference on Smart Cloud (SmartCloud)},
pages = {20--26},
year = {2016},
organization = {IEEE}
}
@article{vitter1985random,
title = {Random sampling with a reservoir},
author = {Vitter, Jeffrey S},
journal = {ACM Transactions on Mathematical Software (TOMS)},
volume = {11},
number = {1},
pages = {37--57},
year = {1985},
publisher = {ACM}
}
@article{walters1982introduction,
title = {An introduction to ergodic theory},
author = {Walters, Peter},
journal = {Graduate Texts in Mathematics},
year = {1982}
}
@inproceedings{wang2006anonymizing,
title = {Anonymizing sequential releases},
author = {Wang, Ke and Fung, Benjamin},
booktitle = {Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining},
pages = {414--423},
year = {2006},
organization = {ACM}
}
@inproceedings{wang2009survey,
title = {A survey on privacy preserving data mining},
author = {Wang, Jian and Luo, Yongcheng and Zhao, Yan and Le, Jiajin},
booktitle = {Database Technology and Applications, 2009 First International Workshop on},
pages = {111--114},
year = {2009},
organization = {IEEE}
}
@article{wang2010privacy,
title = {Privacy-preserving data publishing: A survey on recent developments},
author = {Wang, K and Chen, R and Fung, BC and Yu, PS},
journal = {ACM Computing Surveys},
year = {2010}
}
@inproceedings{wang2016rescuedp,
title = {RescueDP: Real-time spatio-temporal crowd-sourced data publishing with differential privacy},
author = {Wang, Qian and Zhang, Yan and Lu, Xiao and Wang, Zhibo and Qin, Zhan and Ren, Kui},
booktitle = {Computer Communications, IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on},
pages = {1--9},
year = {2016},
organization = {IEEE}
}
@article{wang2017cts,
title = {CTS-DP: publishing correlated time-series data via differential privacy},
author = {Wang, Hao and Xu, Zhengquan},
journal = {Knowledge-Based Systems},
volume = {122},
pages = {167--179},
year = {2017},
publisher = {Elsevier}
}
@inproceedings{wang2017locally,
title = {Locally differentially private protocols for frequency estimation},
author = {Wang, Tianhao and Blocki, Jeremiah and Li, Ninghui and Jha, Somesh},
booktitle = {26th $\{$USENIX$\}$ Security Symposium ($\{$USENIX$\}$ Security 17)},
pages = {729--745},
year = {2017}
}
@inproceedings{meshgi2015expanding,
title={Expanding histogram of colors with gridding to improve tracking accuracy},
author={Meshgi, Kourosh and Ishii, Shin},
booktitle={2015 14th IAPR International Conference on Machine Vision Applications (MVA)},
pages={475--479},
year={2015},
organization={IEEE}
}
@inproceedings{wang2017privacy,
title = {Privacy Preserving Anonymity for Periodical SRS Data Publishing},
author = {Wang, Jie-Teng and Lin, Wen-Yang},
booktitle = {Data Engineering (ICDE), 2017 IEEE 33rd International Conference on},
pages = {1344--1355},
year = {2017},
organization = {IEEE}
}
@article{wang2018privacy,
title = {Privacy-protected statistics publication over social media user trajectory streams},
author = {Wang, Shuo and Sinnott, Richard and Nepal, Surya},
journal = {Future Generation Computer Systems},
volume = {87},
pages = {792--802},
year = {2018},
publisher = {Elsevier}
}
@article{wang2021current,
title = {Why current differential privacy schemes are inapplicable for correlated data publishing?},
author = {Wang, Hao and Xu, Zhengquan and Jia, Shan and Xia, Ying and Zhang, Xu},
journal = {World Wide Web},
volume = {24},
pages = {1--23},
year = {2021},
publisher = {Springer}
}
@article{warner1965randomized,
title = {Randomized response: A survey technique for eliminating evasive answer bias},
author = {Warner, Stanley L},
journal = {Journal of the American Statistical Association},
volume = {60},
number = {309},
pages = {63--69},
year = {1965},
publisher = {Taylor \& Francis}
}
@online{waze,
title = {Waze},
url = {https://waze.com},
year = {Accessed on October 11, 2021}
}
@incollection{wei2006time,
title = {Time series analysis},
author = {Wei, William WS},
booktitle = {The Oxford Handbook of Quantitative Methods in Psychology: Vol. 2},
year = {2006}
}
@article{wernke2014classification,
title = {A classification of location privacy attacks and approaches},
author = {Wernke, Marius and Skvortsov, Pavel and D{\"u}rr, Frank and Rothermel, Kurt},
journal = {Personal and ubiquitous computing},
volume = {18},
number = {1},
pages = {163--175},
year = {2014},
publisher = {Springer}
}
@book{wiggins1967identity,
title = {Identity and spatio-temporal continuity},
author = {Wiggins, David},
year = {1967},
publisher = {Blackwell Oxford}
}
@online{wiki,
title = {Wikipedia},
url = {https://wikipedia.com},
year = {Accessed on October 11, 2021}
}
@misc{wired2014data,
title = {Data Is the New Oil of the Digital Economy},
author = {Joris Toonders},
year = {2014},
publisher = {Wired},
howpublished = {\url{https://wired.com/insights/2014/07/data-new-oil-digital-economy}},
note = {Accessed on October 11, 2021}
}
@misc{wolfgang1999stochastic,
title = {Stochastic Processes: From Physics to Finance},
author = {Wolfgang, Paul and Baschnagel, J},
year = {1999},
publisher = {Springer-Verlag, Berlin}
}
@inproceedings{wong2007minimality,
title = {Minimality attack in privacy preserving data publishing},
author = {Wong, Raymond Chi-Wing and Fu, Ada Wai-Chee and Wang, Ke and Pei, Jian},
booktitle = {Proceedings of the 33rd international conference on Very large data bases},
pages = {543--554},
year = {2007},
organization = {VLDB Endowment}
}
@inproceedings{xiao2007m,
title = {M-invariance: towards privacy preserving re-publication of dynamic data sets},
author = {Xiao, Xiaokui and Tao, Yufei},
booktitle = {Proceedings of the 2007 ACM SIGMOD international conference on Management of data},
pages = {689--700},
year = {2007},
organization = {ACM}
}
@inproceedings{xiao2015protecting,
title = {Protecting locations with differential privacy under temporal correlations},
author = {Xiao, Yonghui and Xiong, Li},
booktitle = {Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security},
pages = {1298--1309},
year = {2015},
organization = {ACM}
}
@article{xiao2017loclok,
title = {LocLok: location cloaking with differential privacy via hidden markov model},
author = {Xiao, Yonghui and Xiong, Li and Zhang, Si and Cao, Yang},
journal = {Proceedings of the VLDB Endowment},
volume = {10},
number = {12},
pages = {1901--1904},
year = {2017},
publisher = {VLDB Endowment}
}
@online{xssfopes2020tweet,
title = {{@xssfopes: ``can anyone spot the issue with the algo? red is original data point, 400 ``anonymized'' data points calculated''}},
url = {https://twitter.com/xssfox/status/1251116087116042241},
year = {Accessed on October 11, 2021}
}
@inproceedings{yang2015bayesian,
title = {Bayesian differential privacy on correlated data},
author = {Yang, Bin and Sato, Issei and Nakagawa, Hiroshi},
booktitle = {Proceedings of the 2015 ACM SIGMOD international conference on Management of Data},
pages = {747--762},
year = {2015},
organization = {ACM}
}
@inproceedings{ye2012meca,
title = {Meca: mobile edge capture and analysis middleware for social sensing applications},
author = {Ye, Fan and Ganti, Raghu and Dimaghani, Raheleh and Grueneberg, Keith and Calo, Seraphin},
booktitle = {Proceedings of the 21st International Conference on World Wide Web},
pages = {699--702},
year = {2012},
organization = {ACM}
}
@inproceedings{ye2017trajectory,
title = {A trajectory privacy-preserving algorithm based on road networks in continuous location-based services},
author = {Ye, Ayong and Li, Yacheng and Xu, Li and Li, Qing and Lin, Hui},
booktitle = {2017 IEEE Trustcom/BigDataSE/ICESS},
pages = {510--516},
year = {2017},
organization = {IEEE}
}
@inproceedings{ye2019preserving,
title = {Preserving ON-OFF privacy for past and future requests},
author = {Ye, Fangwei and Naim, Carolina and El Rouayheb, Salim},
booktitle = {2019 IEEE Information Theory Workshop (ITW)},
pages = {1--5},
year = {2019},
organization = {IEEE}
}
@article{ye2020off,
title = {ON-OFF Privacy in the Presence of Correlation},
author = {Ye, Fangwei and Naim, Carolina and Rouayheb, Salim El},
journal = {arXiv preprint arXiv:2004.04186},
year = {2020}
}
@article{ye2021off,
title = {ON-OFF Privacy Against Correlation Over Time},
author = {Ye, Fangwei and Naim, Carolina and El Rouayheb, Salim},
journal = {IEEE Transactions on Information Forensics and Security},
volume = {16},
pages = {2104--2117},
year = {2021},
publisher = {IEEE}
}
@inproceedings{yuan2010t,
title = {T-drive: driving directions based on taxi trajectories},
author = {Yuan, Jing and Zheng, Yu and Zhang, Chengyang and Xie, Wenlei and Xie, Xing and Sun, Guangzhong and Huang, Yan},
booktitle = {Proceedings of the 18th SIGSPATIAL International conference on advances in geographic information systems},
pages = {99--108},
year = {2010}
}
@inproceedings{yuan2011find,
title = {Where to find my next passenger},
author = {Yuan, Jing and Zheng, Yu and Zhang, Liuhang and Xie, XIng and Sun, Guangzhong},
booktitle = {Proceedings of the 13th international conference on Ubiquitous computing},
pages = {109--118},
year = {2011}
}
@article{zhang2017privbayes,
title = {Privbayes: Private data release via bayesian networks},
author = {Zhang, Jun and Cormode, Graham and Procopiuc, Cecilia M and Srivastava, Divesh and Xiao, Xiaokui},
journal = {ACM Transactions on Database Systems (TODS)},
volume = {42},
number = {4},
pages = {25},
year = {2017},
publisher = {ACM}
}
@inproceedings{zhao2017dependent,
title = {Dependent Differential Privacy for Correlated Data},
author = {Zhao, Jun and Zhang, Junshan and Poor, H Vincent},
booktitle = {Globecom Workshops (GC Wkshps), 2017 IEEE},
pages = {1--7},
year = {2017},
organization = {IEEE}
}
@inproceedings{zheng2008learning,
title = {Learning transportation mode from raw gps data for geographic applications on the web},
author = {Zheng, Yu and Liu, Like and Wang, Longhao and Xie, Xing},
booktitle = {Proceedings of the 17th international conference on World Wide Web},
pages = {247--256},
year = {2008}
}
@article{zheng2010geolife,
title = {Geolife: A collaborative social networking service among user, location and trajectory.},
author = {Zheng, Yu and Xie, Xing and Ma, Wei-Ying and others},
journal = {IEEE Data Eng. Bull.},
volume = {33},
number = {2},
pages = {32--39},
year = {2010},
publisher = {Citeseer}
}
@article{zheng2015trajectory,
title = {Trajectory data mining: an overview},
author = {Zheng, Yu},
journal = {ACM Transactions on Intelligent Systems and Technology (TIST)},
volume = {6},
number = {3},
pages = {1--41},
year = {2015},
publisher = {ACM New York, NY, USA}
}
@inproceedings{zhou2004discovering,
title = {Discovering personal gazetteers: an interactive clustering approach},
author = {Zhou, Changqing and Frankowski, Dan and Ludford, Pamela and Shekhar, Shashi and Terveen, Loren},
booktitle = {Proceedings of the 12th annual ACM international workshop on Geographic information systems},
pages = {266--273},
year = {2004}
}
@article{zhou2008brief,
title = {A brief survey on anonymization techniques for privacy preserving publishing of social network data},
author = {Zhou, Bin and Pei, Jian and Luk, WoShun},
journal = {ACM Sigkdd Explorations Newsletter},
volume = {10},
number = {2},
pages = {12--22},
year = {2008},
publisher = {ACM}
}
@inproceedings{zhou2009continuous,
title = {Continuous privacy preserving publishing of data streams},
author = {Zhou, Bin and Han, Yi and Pei, Jian and Jiang, Bin and Tao, Yufei and Jia, Yan},
booktitle = {Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology},
pages = {648--659},
year = {2009},
organization = {ACM}
}
@article{zhu2015correlated,
title = {Correlated differential privacy: hiding information in non-IID data set},
author = {Zhu, Tianqing and Xiong, Ping and Li, Gang and Zhou, Wanlei},
journal = {IEEE Transactions on Information Forensics and Security},
volume = {10},
number = {2},
pages = {229--242},
year = {2015},
publisher = {IEEE}
}
@article{zhu2017answering,
title = {Answering differentially private queries for continual data sets release},
author = {Zhu, Tianqing and Li, Gang and Xiong, Ping and Zhou, Wanlei},
journal = {Future Generation Computer Systems},
year = {2017},
publisher = {Elsevier}
}