© 2014 IEEE. The rapid proliferation of smart mobile devices has significantly enhanced the popularization of the cyber-physical social network, where users actively publish data with sensitive information. Adversaries can easily obtain these data and launch continuous attacks to breach privacy. However, existing works only focus on either location privacy or identity privacy with a static adversary. This results in privacy leakage and possible further damage. Motivated by this, we propose a hybrid privacy-preserving scheme, which considers both location and identity privacy against a dynamic adversary. We study the privacy protection problem as the tradeoff between the users aiming at maximizing data utility with high-level privacy protect...
Privacy-preserving data mining has been an active research area in recent years due to privacy conce...
With the rapid development of sensor acquisition technology, more and more data are collected, analy...
Abstract. Privacy-preserving data mining has been an active research area in recent years due to pri...
© 2019, Springer Science+Business Media, LLC & Science Press, China. Due to dramatically increasing ...
© 2018 IEEE. Due to dramatically increasing information published in social networks, privacy issues...
IEEE Privacy leakage becomes increasingly serious because massive volumes of data are constantly sha...
In mobile networks, authentication is a required primitive for most security protocols. Unfortunatel...
The current culture that encourages online dating, and interaction makes large-scale social network ...
This paper proposes a user-centered location privacy game mechanism,which is aimed to generate corre...
The popularity of context-aware services is improving the quality of life, while raising serious pri...
In a context sensing system in which a sensor-equipped mobile phone runs an unreliable context-aware...
With the rapid growth of network of devices with embedded technology, mobile crowdsensing (MCS) has ...
An increasing number of people are using the Internet in their daily life. Indeed, more than 40% of ...
In mobile networks, authentication is a required primitive for the majority of security protocols. H...
One of the approaches to the problem of data-privacy protection is given by the application of obfus...
Privacy-preserving data mining has been an active research area in recent years due to privacy conce...
With the rapid development of sensor acquisition technology, more and more data are collected, analy...
Abstract. Privacy-preserving data mining has been an active research area in recent years due to pri...
© 2019, Springer Science+Business Media, LLC & Science Press, China. Due to dramatically increasing ...
© 2018 IEEE. Due to dramatically increasing information published in social networks, privacy issues...
IEEE Privacy leakage becomes increasingly serious because massive volumes of data are constantly sha...
In mobile networks, authentication is a required primitive for most security protocols. Unfortunatel...
The current culture that encourages online dating, and interaction makes large-scale social network ...
This paper proposes a user-centered location privacy game mechanism,which is aimed to generate corre...
The popularity of context-aware services is improving the quality of life, while raising serious pri...
In a context sensing system in which a sensor-equipped mobile phone runs an unreliable context-aware...
With the rapid growth of network of devices with embedded technology, mobile crowdsensing (MCS) has ...
An increasing number of people are using the Internet in their daily life. Indeed, more than 40% of ...
In mobile networks, authentication is a required primitive for the majority of security protocols. H...
One of the approaches to the problem of data-privacy protection is given by the application of obfus...
Privacy-preserving data mining has been an active research area in recent years due to privacy conce...
With the rapid development of sensor acquisition technology, more and more data are collected, analy...
Abstract. Privacy-preserving data mining has been an active research area in recent years due to pri...