Location privacy-preserving mechanisms in location-based services: A comprehensive survey H Jiang, J Li, P Zhao, F Zeng, Z Xiao, A Iyengar ACM Computing Surveys (CSUR) 54 (1), 1-36, 2021 | 300 | 2021 |
A utility-aware general framework with quantifiable privacy preservation for destination prediction in LBSs H Jiang, M Wang, P Zhao, Z Xiao, S Dustdar Ieee/Acm Transactions on Networking 29 (5), 2228-2241, 2021 | 161 | 2021 |
ILLIA: Enabling -Anonymity-Based Privacy Preserving Against Location Injection Attacks in Continuous LBS Queries P Zhao, J Li, F Zeng, F Xiao, C Wang, H Jiang IEEE Internet of Things Journal 5 (2), 1033-1042, 2018 | 133 | 2018 |
P3-LOC: A Privacy-Preserving Paradigm-Driven Framework for Indoor Localization P Zhao, H Jiang, JCS Lui, C Wang, F Zeng, F Xiao, Z Li IEEE/ACM Transactions on Networking 26 (6), 2856-2869, 2018 | 71 | 2018 |
RobLoP: Towards robust privacy preserving against location dependent attacks in continuous LBS queries H Jiang, P Zhao, C Wang IEEE/ACM Transactions on Networking 26 (2), 1018-1032, 2018 | 65 | 2018 |
Preserving privacy in WiFi localization with plausible dummy locations P Zhao, W Liu, G Zhang, Z Li, L Wang IEEE Transactions on Vehicular Technology 69 (10), 11909-11925, 2020 | 53 | 2020 |
P3: Privacy-Preserving Scheme Against Poisoning Attacks in Mobile-Edge Computing P Zhao, H Huang, X Zhao, D Huang IEEE Transactions on Computational Social Systems 7 (3), 818-826, 2020 | 52 | 2020 |
Learning-based joint optimization of energy delay and privacy in multiple-user edge-cloud collaboration MEC systems G Zhang, S Ni, P Zhao IEEE Internet of Things Journal 9 (2), 1491-1502, 2021 | 51 | 2021 |
Synthesizing privacy preserving traces: Enhancing plausibility with social networks P Zhao, H Jiang, J Li, F Zeng, X Zhu, K Xie, G Zhang IEEE/ACM Transactions on Networking 27 (6), 2391-2404, 2019 | 41 | 2019 |
On the Performance of -Anonymity Against Inference Attacks With Background Information P Zhao, H Jiang, C Wang, H Huang, G Liu, Y Yang IEEE Internet of Things Journal 6 (1), 808-819, 2018 | 35 | 2018 |
Deep reinforcement learning-based joint optimization of delay and privacy in multiple-user MEC systems P Zhao, J Tao, K Lui, G Zhang, F Gao IEEE Transactions on Cloud Computing 11 (2), 1487-1499, 2022 | 32 | 2022 |
Lightweight privacy-preserving scheme in Wi-Fi fingerprint-based indoor localization G Zhang, A Zhang, P Zhao, J Sun IEEE Systems Journal 14 (3), 4638-4647, 2020 | 28 | 2020 |
Locmia: Membership inference attacks against aggregated location data G Zhang, A Zhang, P Zhao IEEE Internet of Things Journal 7 (12), 11778-11788, 2020 | 24 | 2020 |
Garbage in, garbage out: Poisoning attacks disguised with plausible mobility in data aggregation P Zhao, H Jiang, J Li, Z Xiao, D Liu, J Ren, D Guo IEEE Transactions on Network Science and Engineering 8 (3), 2679-2693, 2021 | 23 | 2021 |
Enhancing privacy preservation in speech data publishing G Zhang, S Ni, P Zhao IEEE Internet of Things Journal 7 (8), 7357-7367, 2020 | 10 | 2020 |
DAML: Practical secure protocol for data aggregation based on machine learning P Zhao, J Sun, G Zhang ACM Transactions on Sensor Networks (TOSN) 16 (4), 1-18, 2020 | 7 | 2020 |
RobLoP: Towards Robust Privacy Preserving Against Location Dependent Attacks in Continuous LBS Queries [J] J Hongbo, Z Ping, W Chen, CSL John IEEE/ACM Transactions on Networking 26 (2), 1018-1032, 2018 | 3 | 2018 |
Non-asymptotic bound on the performance of k-anonymity against inference attacks P Zhao, H Jiang, C Wang, H Huang 2018 IEEE 20th International Conference on High Performance Computing and …, 2018 | 2 | 2018 |
P3S2 practical secure protocol for speech data publishing P Zhao, J Sun, A Zhang, S Ni, G Zhang Proceedings of the ACM Turing Celebration Conference-China, 1-5, 2019 | | 2019 |