Mush: Multi-stimuli hawkes process based sybil attacker detector for user-review social networks

Z Qu, C Lyu, CH Chi - IEEE Transactions on Network and …, 2022 - ieeexplore.ieee.org
User-Review Social Networks (URSNs) now become the targets of Sybil attacks, where fake
reviews are posted by attackers to raise the reputation of listed services or products. Unlike …

A comprehensive survey on trajectory-based location prediction

V Koolwal, KK Mohbey - Iran Journal of Computer Science, 2020 - Springer
Recent explorative growth in telecommunication and telepathy technology has flooded the
market with location-based data, which paves the way for location-aware prediction …

Utility-aware and privacy-preserving trajectory synthesis model that resists social relationship privacy attacks

Z Zheng, Z Li, J Li, H Jiang, T Li, B Guo - ACM Transactions on Intelligent …, 2022 - dl.acm.org
For academic research and business intelligence, trajectory data has been widely collected
and analyzed. Releasing trajectory data to a third party may lead to serious privacy leakage …

To disclose or to protect? Predicting social media users' behavioral intention toward privacy

M Chen, X Huang, X Qi - Industrial Management & Data Systems, 2024 - emerald.com
Purpose In the paradox of personalized services and privacy risks, what factors influence
users' decisions is considered an interesting issue worth exploring. The current study aims …

[HTML][HTML] Impact of prior knowledge on privacy leakage in trajectory data publishing

D Hemkumar, S Ravichandra, D Somayajulu - Engineering Science and …, 2020 - Elsevier
The rapid growth in the usage of location-based services has resulted in extensive research
on users' trajectory data publishing. But, a key concern here is a potential breach of user …

Breadcrumbs: a rich mobility dataset with point-of-interest annotations

A Moro, V Kulkarni, PA Ghiringhelli, B Chapuis… - Proceedings of the 27th …, 2019 - dl.acm.org
Rich human mobility datasets are fundamental for evaluating algorithms pertaining to
geographic information systems. Unfortunately, existing mobility datasets--that are available …

K-Implicit Tracking Data Publishing Scheme Against Geo-Matching Attacks.

K Niu, C Peng, Y Tian, W Tan - Journal of Information …, 2022 - search.ebscohost.com
The dynamic queries by wireless mobile network users, will generate the social data with
location tags and tracking data sequences, which enable the adversary can infer privacy …

Releasing Differential Private Trajectory Datasets Without Revealing Trajectory Correlations

H Zhu, Y Yu, M **e - Security and Communication Networks, 2022 - Wiley Online Library
With the prevailing use of smartphones and location‐based services, vast amounts of
trajectory data are collected and used for many applications. When trajectory data are sent …

Experiments and analyses of anonymization mechanisms for trajectory data publishing

S Sun, S Ma, JH Song, WH Yue, XL Lin… - Journal of Computer …, 2022 - Springer
With the advancing of location-detection technologies and the increasing popularity of
mobile phones and other location-aware devices, trajectory data is continuously growing …

[PDF][PDF] Modeling, Predicting and Capturing Human Mobility

V Kulkarni - 2019 - serval.unil.ch
Realistic models of human mobility are critical for modern day applications, specifically for
recommendation systems, resource planning and process optimization domains. Given the …