Data protection in AI services: A survey

C Meurisch, M Mühlhäuser - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Advances in artificial intelligence (AI) have shaped today's user services, enabling
enhanced personalization and better support. As such AI-based services inevitably require …

P2TA: Privacy-preserving task allocation for edge computing enhanced mobile crowdsensing

H Shen, G Bai, Y Hu, T Wang - Journal of Systems Architecture, 2019 - Elsevier
In conventional mobile crowdsensing (MCS) applications, the crowdsensing server (CS-
server) needs mobile users' precise locations for optimal task allocation, which raises …

Privacy-preserving AI services through data decentralization

C Meurisch, B Bayrak, M Mühlhäuser - Proceedings of The Web …, 2020 - dl.acm.org
User services increasingly base their actions on AI models, eg, to offer personalized and
proactive support. However, the underlying AI algorithms require a continuous stream of …

(So) Big Data and the transformation of the city

G Andrienko, N Andrienko, C Boldrini… - International Journal of …, 2021 - Springer
The exponential increase in the availability of large-scale mobility data has fueled the vision
of smart cities that will transform our lives. The truth is that we have just scratched the surface …

Aquilis: Using contextual integrity for privacy protection on mobile devices

A Kumar, T Braud, YD Kwon, P Hui - … of the ACM on Interactive, Mobile …, 2020 - dl.acm.org
Smartphones are nowadays the dominant end-user device. As a result, they have become
gateways to all users' communications, including sensitive personal data. In this paper, we …

The crowd wisdom for location privacy of crowdsensing photos: Spear or shield?

T Zhou, Z Cai, F Liu - Proceedings of the ACM on Interactive, Mobile …, 2021 - dl.acm.org
The incorporation of the mobile crowd in visual sensing provides a significant opportunity to
explore and understand uncharted physical places. We investigate the gains and losses of …

Leakdoctor: Toward automatically diagnosing privacy leaks in mobile applications

X Wang, A Continella, Y Yang, Y He… - Proceedings of the ACM on …, 2019 - dl.acm.org
With the enormous popularity of smartphones, millions of mobile apps are developed to
provide rich functionalities for users by accessing certain personal data, leading to great …

Privatebus: Privacy identification and protection in large-scale bus WiFi systems

Z Fang, B Fu, Z Qin, F Zhang, D Zhang - Proceedings of the ACM on …, 2020 - dl.acm.org
Recently, the ubiquity of mobile devices leads to an increasing demand of public network
services, eg, WiFi hot spots. As a part of this trend, modern transportation systems are …

Role of group cohesiveness in targeted mobile promotions

R Gupta, S Mukherjee, K Jayarajah - Journal of Business Research, 2021 - Elsevier
While past research has explored the effects of different targeted promotion strategies (eg,
temporal, geographical, crowdedness-based), it is yet to take into account the effect of social …

PGAN framework for synthesizing sensor data privately

S Menasria, M Lu, A Dahou - Journal of Information Security and …, 2022 - Elsevier
Some credible third parties collect and share mobile sensor data with users to enhance
scientific innovation. However, since the sensor data contains sensitive attributes, it may …