An adaptive geo-indistinguishability mechanism for continuous LBS queries

R Al-Dhubhani, JM Cazalas - Wireless Networks, 2018 - Springer
The popularity of mobile devices with positioning capability and Internet accessibility in
recent years has led to a revolution in the Location-based services (LBSs) market …

Privacy protection in mobile crowd sensing: a survey

Y Wang, Z Yan, W Feng, S Liu - World Wide Web, 2020 - Springer
The unprecedented proliferation of mobile smart devices has propelled a promising
computing paradigm, Mobile Crowd Sensing (MCS), where people share surrounding …

Privacy preserving and data publication for vehicular trajectories with differential privacy

M Arif, J Chen, G Wang, O Geman, VE Balas - Measurement, 2021 - Elsevier
Abstract In the Vehicular Ad-hoc Networks, an enormous number of Location-based
Services could be given to clients as per their development characteristics. Then, protection …

The privacy preserving method for dynamic trajectory releasing based on adaptive clustering

Y **n, ZQ **e, J Yang - Information Sciences, 2017 - Elsevier
The traditional trajectory privacy preserving methods are static releasing methods, only
focusing on the trajectories in a specific time span. Therefore, the traditional methods need …

A particle swarm optimization clustering-based attribute generalization privacy protection scheme

L Zhang, S Yang, J Li, L Yu - Journal of Circuits, Systems and …, 2018 - World Scientific
Continuous query in location-based services may reveal the attribute information of the user
obliviously, and an adversary may utilize the attribute as background knowledge to correlate …

RcDT: Privacy preservation based on R-constrained dummy trajectory in mobile social networks

J Zhang, X Wang, Y Yuan, L Ni - IEEE Access, 2019 - ieeexplore.ieee.org
The boom of mobile devices and location-based services (LBSs) greatly enriches the mobile
social network (MSN) applications, which bring convenience to our daily life and …

A semantic-based approach for privacy-preserving in trajectory publishing

A Ye, Q Zhang, Y Diao, J Zhang, H Deng… - IEEE Access, 2020 - ieeexplore.ieee.org
The increasing abundance of data in the trajectories of personal movement opens up new
opportunities for analyzing and mining human mobility. But the inherent personal …

Differential privacy‐guaranteed trajectory community identification over vehicle ad‐hoc networks

Z Zhou, Y Qiao, L Zhu, J Guan, Y Liu… - Internet Technology …, 2018 - Wiley Online Library
In vehicle ad‐hoc networks (VANETs), a large number of location‐based services can be
provided for users according to their movement features. Meanwhile, privacy may be leaked …

ClusterRep: A cluster-based reputation framework for balancing privacy and trust in vehicular participatory sensing

J Wang, Y Wang, X Gu, L Chen… - International Journal of …, 2018 - journals.sagepub.com
In vehicular participatory sensing, vehicles may provide false data or low-quality data.
Building trust in vehicular ad hoc networks is an efficient way to deal with this issue. On one …

Probability indistinguishable: a query and location correlation attack resistance scheme

Z Lei, M Chunguang, Y Songtao… - Wireless Personal …, 2017 - Springer
As location-based services (LBSs) require users to report their location to obtain services,
many people are starting to realize the exposed to high privacy threats. In order to preserve …