A trajectory privacy-preserving scheme based on transition matrix and caching for IIoT

S Zhang, B Hu, W Liang, KC Li… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
With the increasing integration of location-based services (LBSs) into various societal
domains, location privacy preservation has emerged as a pivotal concern. In most …

Achieving privacy-preserving trajectory query in geospatial information systems with outsourced cloud

Q Kong, S Zhang, R Lu, H Bao… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Geographic information system (GIS) enables operations for capturing, manipulating,
analyzing, and displaying the spatial characteristics of objects on Earth's surface. As the …

Achieving efficient and privacy-preserving location-based task recommendation in spatial crowdsourcing

F Song, J Liang, C Zhang, Z Fu, Z Qin… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
In spatial crowdsourcing, location-based task recommendation schemes are widely used to
match appropriate workers in desired geographic areas with relevant tasks from data …

Towards efficient privacy-preserving top-k trajectory similarity query

K Yi, Y Chen, Y Su, X Li, H Liu, H Dai… - 2023 IEEE 20th …, 2023 - ieeexplore.ieee.org
Similarity search for trajectories, especially the top-k similarity query, has been widely used
in different fields, such as personalized travel route recommendation, car pooling, etc …

Efficient and Privacy-Preserving Encode-Based Range Query over Encrypted Cloud Data

Y Liang, J Ma, Y Miao, Y Su… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Privacy-preserving range query, which allows the server to implement secure and efficient
range query on encrypted data, has been widely studied in recent years. Existing privacy …

Towards Secure Trajectory Similarity Range Query under Multi-User Setting

N Cui, X Sun, L Pei, M Wang, D Wang… - IEEE Internet of …, 2025 - ieeexplore.ieee.org
The widespread availability of similarity queries over trajectory data has led to numerous
real-world applications, such as traffic management and path planning. With the proliferation …

Efficient and privacy-preserving spatial-feature-based reverse kNN query

Y Zheng, R Lu, Y Guan, S Zhang, J Shao… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
Reverse k nearest neighbor (RkNN) query has been widely applied in the targeted push of
information. Many schemes for the RkNN query on encrypted data have been proposed for …

Privacy Protection Framework against Unauthorized Sensing in the 5.8 GHz ISM Band

Z Fang, B Han, HD Schotten - arxiv preprint arxiv:2411.05320, 2024 - arxiv.org
Unauthorized sensing activities pose an increasing threat to individual privacy, particularly
in the industrial, scientific, and medical (ISM) band where regulatory frameworks remain …

Efficient Privacy-Preserving Multi-Location Task Allocation in Fog-Assisted Vehicular Crowdsourcing

Y Yu, Y Guan, X Xue, J Ma… - ICC 2024-IEEE …, 2024 - ieeexplore.ieee.org
Multi-location task allocation is one of the most crucial issues in vehicular crowdsourcing
(VCS). To ensure service quality, the VCS service provider prefers to assign multi-location …