SCIE, EI, Scopus, INSPEC, DBLP, CSCD, etc.
Citation: | Wei-Wei Ni, Jin-Wang Zheng, Zhi-Hong Chong. HilAnchor: Location Privacy Protection in the Presence of Users' Preferences[J]. Journal of Computer Science and Technology, 2012, (2): 413-427. DOI: 10.1007/s11390-012-1231-2 |
[1] |
Gruteser M, Schelle G, Jain A, Han R, Grunwald D. Privacy-aware location sensor networks. In Proc. the 9th Workshopon Hot Topics in Operating Systems (HotOS 2003), Hawaii,USA, May 18-21, 2003, pp.163-167.
|
[2] |
Beresford A R, Stajano F. Location privacy in pervasive com-puting. IEEE Pervasive Computing, 2003, 2(1): 46-55.
|
[3] |
Ronssopoulos Nick R, Kelley S, Vincent F. Nearest neighborqueries. In Proc. the ACM SIGMOD International Confe-rence on Management of Data (SIGMOD 1995), San Jose,California, USA, May 22-25, 1995, pp.71-79.
|
[4] |
Xiao Z, Meng X F, Xu J L. Quality aware privacy protec-tion for location-based services. In Proc. the 12th Inter-national Conference on Database Systems for Advanced Ap-plications (DASFAA 2007), Bangkok, Thailand, April 9-12,2007, pp.434-446.
|
[5] |
Bettini C, Wang X S, Jajodia S. Protecting privacy againstlocation-based personal identification. In Proc. the 2ndVLDB Workshop on Secure Data Management (SDM 2005),Trondheim, Norway, September 2-3, 2005, pp.185-199.
|
[6] |
Mokbel M F, Chow C Y, Aref W G. The new Casper: Queryprocessing for location services without compromising pri-vacy. In Proc. the 32nd International Conference on VeryLarge Data Bases (VLDB 2006), Seoul, Korea, September12-15, 2006, pp.763-774.
|
[7] |
Li P Y, Peng W C, Wang T W, Ku W S, Xu J, Hamilton J A.A cloaking algorithm based on spatial networks for locationprivacy. In Proc. IEEE International Conference on SensorNetworks, Ubiquitous, and Trustworthy Computing (SUTC2008), Taichung, Taiwan, China, June 11-13, 2008, pp.90-97.
|
[8] |
Duckham M, Kulik L. A formal model of obfuscation and ne-gotiation for location privacy. In Proc. the 3th InternationalConference on Pervasive Computing (Pervasive 2005), Mu-nich, Germany, May 8-13, 2005, pp.152-170.
|
[9] |
Kalnis P, Ghinita G, Mouratidis K, Papadias D. Prevent-ing location-based identity inference in anonymous spatialqueries. IEEE Trans. Knowl. Data Eng., 2007, 19(12): 1719-1733.
|
[10] |
Ghinita G, Kalnis P, Skiadopoulos S. PRIVE: Anonymouslocation-based queries in distributed mobile systems. InProc. the 16th International Conference on World WideWeb (WWW 2007), Banff, Alberta, Canada, May 8-12, 2007,pp.371-380.
|
[11] |
Indyk P, Woodruff D P. Polylogarithmic private approxima-tions and efficient matching. In Proc. the 3rd Theory ofCryptography Conference (TCC 2006), New York, NY, USA,March 4-7, 2006, pp.245-264.
|
[12] |
Khoshgozaran A, Shahabi C. Blind evaluation of nearestneighbor queries using space transformation to preserve lo-cation privacy. In Proc. the 10th International Conferenceon Advances in Spatio and Temporal Databases (SSTD 2007),Boston, MA, USA, July 16-18, 2007, pp.239-257.
|
[13] |
Yiu M L, Jensen C S, Huang X G, Lu H. SpaceTwist: Manag-ing the trade-offs among location privacy, query performance,and query accuracy in mobile services. In Proc. the 24th In-ternational Conference on Data Engineering (ICDE 2008),Canc?un, México, April 7-12, 2008, pp.366-375.
|
[14] |
Gong Z Q, Sun G Z, Xie X. Protecting privacy in location-based services using k-anonymity without cloaked region. InProc. the 11th International Conference on Mobile DataManagement (MDM 2010), Kanas City, Missouri, USA, May23-26, 2010, pp.366-371.
|
[15] |
Ghinita G, Kalnis P, Khoshgozaran A, Shahabi C, Tan K L.Private queries in location based services: Anonymizers arenot necessary. In Proc. the ACM SIGMOD InternationalConference on Management of Data (SIGMOD 2008), Van-couver, BC, Canada, June 9-12, 2008, pp.121-132.
|
[16] |
Cheng R, Zhang Y, Bertino E, Prabhakar S. Preserving userlocation privacy in mobile data management infrastructures.In Proc. the 6th Workshop on Privacy Enhancing Technolo-gies (PET 2006), Cambridge, UK, June 28-30, 2006, pp.393-412.
|
[17] |
Pan X, Xu J L, Meng X F. Protecting location privacyagainst location-dependent attacks in mobile services. IEEETransactions on Knowledge and Data Engineering, 2011,http://doi.ieeecomputersociety.org/10.1109/TKDE.2011.105.
|
[18] |
Xu J L, Tang X Y, Hu H B, Du J. Privacy-conscious location-based queries in mobile environments. IEEE Trans. ParallelDistrib. Syst., 2010, 21(3): 313-326.
|
[19] |
Papadopoulos S, Bakiras S, Papadias D. Nearest neighborsearch with strong location privacy. PVLDB, 2010, 3(1): 619-629.
|
[20] |
Moon B, Jagadish H V, Faloutsos C, Saltz J H. Analysis of theclustering properties of the Hilbert space-filling curve. IEEETrans. Knowl. Data Eng., 2001, 13(1): 124-141.
|
1. | Chitra Sabapathy Ranganathan, Rajeshkumar Sampathrajan, P L Kishan Kumar Reddy, et al. Big Data Infrastructures Using Apache Storm for Real-Time Data Processing. 2025 International Conference on Intelligent Control, Computing and Communications (IC3), DOI:10.1109/IC363308.2025.10956412 |