Connected and autonomous vehicles (CAVs) are one of the main representatives of cyber-physical systems (CPS), where the digital data generated in several forms, such as geolocation, distance, and camera data, are used for the physical functionality of the vehicles. The utility of these data, especially camera data for computer vision projects, has contributed to the advancement of high-performance cyber-physical applications. However, location inference attacks, which involve extracting knowledge from camera data to track and estimate user locations are potential privacy threats to AV-generated camera data. In this paper, we propose LIFT (Location InFerence aTtack), a robust geo-localisation technique to exploit subjects' location privacy i...
Cloaking-based location privacy preserving mechanisms have been widely adopted to protect users' loc...
Location-based services have brought significant convenience to people in their daily lives. Service...
International audienceDue to the emergence of geolocated applications, more and more mobility traces...
Autonomous Vehicles (AVs) are equipped with several sensors which produce various forms of data, suc...
Autonomous Vehicles (AVs) are equipped with several sensors which produce various forms of data, suc...
Autonomous Vehicles (AVs) generate several forms of tracking data, such as geolocation, distance, an...
Visual localization is the task of estimating the camera pose from which a given image was taken and...
Connected and Autonomous Vehicles (CAV) depend on satellite systems, such as the Global Positioning ...
With the development of mobile devices and GPS, plenty of Location-based Services (LBSs) have emerge...
Attacks on the GPS receiver of Connected and Autonomous Vehicles (CAV) and specifically GPS location...
Autonomous vehicles (AVs) have become close to our life. Many modules are included in AVs such as lo...
The mobile and wireless community has brought a significant growth of location-aware devices includi...
Abstract. Although the privacy threats and countermeasures associated with location data are well kn...
5G networks, as the up-to-date communication platforms, are experiencing fast booming. Meanwhile, in...
We present the design, implementation and evaluation of a system, called MATRIX, developed to protec...
Cloaking-based location privacy preserving mechanisms have been widely adopted to protect users' loc...
Location-based services have brought significant convenience to people in their daily lives. Service...
International audienceDue to the emergence of geolocated applications, more and more mobility traces...
Autonomous Vehicles (AVs) are equipped with several sensors which produce various forms of data, suc...
Autonomous Vehicles (AVs) are equipped with several sensors which produce various forms of data, suc...
Autonomous Vehicles (AVs) generate several forms of tracking data, such as geolocation, distance, an...
Visual localization is the task of estimating the camera pose from which a given image was taken and...
Connected and Autonomous Vehicles (CAV) depend on satellite systems, such as the Global Positioning ...
With the development of mobile devices and GPS, plenty of Location-based Services (LBSs) have emerge...
Attacks on the GPS receiver of Connected and Autonomous Vehicles (CAV) and specifically GPS location...
Autonomous vehicles (AVs) have become close to our life. Many modules are included in AVs such as lo...
The mobile and wireless community has brought a significant growth of location-aware devices includi...
Abstract. Although the privacy threats and countermeasures associated with location data are well kn...
5G networks, as the up-to-date communication platforms, are experiencing fast booming. Meanwhile, in...
We present the design, implementation and evaluation of a system, called MATRIX, developed to protec...
Cloaking-based location privacy preserving mechanisms have been widely adopted to protect users' loc...
Location-based services have brought significant convenience to people in their daily lives. Service...
International audienceDue to the emergence of geolocated applications, more and more mobility traces...