Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Location privacy-preserving mechanisms in location-based services: A comprehensive survey
Location-based services (LBSs) provide enhanced functionality and convenience of
ubiquitous computing, but they open up new vulnerabilities that can be utilized to violate the …
ubiquitous computing, but they open up new vulnerabilities that can be utilized to violate the …
Technical privacy metrics: a systematic survey
The goal of privacy metrics is to measure the degree of privacy enjoyed by users in a system
and the amount of protection offered by privacy-enhancing technologies. In this way, privacy …
and the amount of protection offered by privacy-enhancing technologies. In this way, privacy …
Security and privacy in device-to-device (D2D) communication: A review
Device-to-device (D2D) communication presents a new paradigm in mobile networking to
facilitate data exchange between physically proximate devices. The development of D2D is …
facilitate data exchange between physically proximate devices. The development of D2D is …
[PDF][PDF] Using social media to enhance emergency situation awareness
Enabling situation awareness in a given environment thus relies on being able to identify an
appropriate set of perception elements, coupled with higher-level comprehension patterns …
appropriate set of perception elements, coupled with higher-level comprehension patterns …
The long road to computational location privacy: A survey
The widespread adoption of continuously connected smartphones and tablets developed
the usage of mobile applications, among which many use location to provide geolocated …
the usage of mobile applications, among which many use location to provide geolocated …
Protecting location privacy: optimal strategy against localization attacks
The mainstream approach to protecting the location-privacy of mobile users in location-
based services (LBSs) is to alter the users' actual locations in order to reduce the location …
based services (LBSs) is to alter the users' actual locations in order to reduce the location …
Synthesizing plausible privacy-preserving location traces
Camouflaging user's actual location with fakes is a prevalent obfuscation technique for
protecting location privacy. We show that the protection mechanisms based on the existing …
protecting location privacy. We show that the protection mechanisms based on the existing …
Vtrack: accurate, energy-aware road traffic delay estimation using mobile phones
A Thiagarajan, L Ravindranath, K LaCurts… - Proceedings of the 7th …, 2009 - dl.acm.org
Traffic delays and congestion are a major source of inefficiency, wasted fuel, and commuter
frustration. Measuring and localizing these delays, and routing users around them, is an …
frustration. Measuring and localizing these delays, and routing users around them, is an …
Optimal geo-indistinguishable mechanisms for location privacy
We consider the geo-indistinguishability approach to location privacy, and the trade-off with
respect to utility. We show that, given a desired degree ofgeo-indistinguishability, it is …
respect to utility. We show that, given a desired degree ofgeo-indistinguishability, it is …
ACPN: A novel authentication framework with conditional privacy-preservation and non-repudiation for VANETs
In Vehicular Ad hoc NETworks (VANETs), authentication is a crucial security service for both
inter-vehicle and vehicle-roadside communications. On the other hand, vehicles have to be …
inter-vehicle and vehicle-roadside communications. On the other hand, vehicles have to be …