Mush: Multi-stimuli hawkes process based sybil attacker detector for user-review social networks
User-Review Social Networks (URSNs) now become the targets of Sybil attacks, where fake
reviews are posted by attackers to raise the reputation of listed services or products. Unlike …
reviews are posted by attackers to raise the reputation of listed services or products. Unlike …
A comprehensive survey on trajectory-based location prediction
V Koolwal, KK Mohbey - Iran Journal of Computer Science, 2020 - Springer
Recent explorative growth in telecommunication and telepathy technology has flooded the
market with location-based data, which paves the way for location-aware prediction …
market with location-based data, which paves the way for location-aware prediction …
Utility-aware and privacy-preserving trajectory synthesis model that resists social relationship privacy attacks
For academic research and business intelligence, trajectory data has been widely collected
and analyzed. Releasing trajectory data to a third party may lead to serious privacy leakage …
and analyzed. Releasing trajectory data to a third party may lead to serious privacy leakage …
To disclose or to protect? Predicting social media users' behavioral intention toward privacy
M Chen, X Huang, X Qi - Industrial Management & Data Systems, 2024 - emerald.com
Purpose In the paradox of personalized services and privacy risks, what factors influence
users' decisions is considered an interesting issue worth exploring. The current study aims …
users' decisions is considered an interesting issue worth exploring. The current study aims …
[HTML][HTML] Impact of prior knowledge on privacy leakage in trajectory data publishing
The rapid growth in the usage of location-based services has resulted in extensive research
on users' trajectory data publishing. But, a key concern here is a potential breach of user …
on users' trajectory data publishing. But, a key concern here is a potential breach of user …
Breadcrumbs: a rich mobility dataset with point-of-interest annotations
Rich human mobility datasets are fundamental for evaluating algorithms pertaining to
geographic information systems. Unfortunately, existing mobility datasets--that are available …
geographic information systems. Unfortunately, existing mobility datasets--that are available …
K-Implicit Tracking Data Publishing Scheme Against Geo-Matching Attacks.
The dynamic queries by wireless mobile network users, will generate the social data with
location tags and tracking data sequences, which enable the adversary can infer privacy …
location tags and tracking data sequences, which enable the adversary can infer privacy …
Releasing Differential Private Trajectory Datasets Without Revealing Trajectory Correlations
H Zhu, Y Yu, M **e - Security and Communication Networks, 2022 - Wiley Online Library
With the prevailing use of smartphones and location‐based services, vast amounts of
trajectory data are collected and used for many applications. When trajectory data are sent …
trajectory data are collected and used for many applications. When trajectory data are sent …
Experiments and analyses of anonymization mechanisms for trajectory data publishing
With the advancing of location-detection technologies and the increasing popularity of
mobile phones and other location-aware devices, trajectory data is continuously growing …
mobile phones and other location-aware devices, trajectory data is continuously growing …
[PDF][PDF] Modeling, Predicting and Capturing Human Mobility
V Kulkarni - 2019 - serval.unil.ch
Realistic models of human mobility are critical for modern day applications, specifically for
recommendation systems, resource planning and process optimization domains. Given the …
recommendation systems, resource planning and process optimization domains. Given the …