TY - JOUR AU - Kouicem, D. E. AU - Bouabdallah, A. AU - Lakhlef, H. PY - 2018 DA - 2018// TI - Internet of things security: a top-down survey JO - Comput. Netw. VL - 141 UR - https://doi.org/10.1016/j.comnet.2018.03.012 DO - 10.1016/j.comnet.2018.03.012 ID - Kouicem2018 ER - TY - JOUR AU - Huo, Y. AU - Hu, C. AU - Qi, X. AU - Jing, T. PY - 2017 DA - 2017// TI - Lodpd: A location difference-based proximity detection protocol for fog computing JO - IEEE Internet Things J. VL - 4 UR - https://doi.org/10.1109/JIOT.2017.2670570 DO - 10.1109/JIOT.2017.2670570 ID - Huo2017 ER - TY - JOUR AU - Mao, J. AU - Chen, Y. AU - Shi, F. AU - Jia, Y. AU - Liang, Z. PY - 2017 DA - 2017// TI - Toward exposing timing-based probing attacks in web applications JO - Sensors VL - 17 UR - https://doi.org/10.3390/s17030464 DO - 10.3390/s17030464 ID - Mao2017 ER - TY - JOUR AU - Liang, Y. AU - Cai, Z. AU - Yu, J. AU - Han, Q. AU - Li, Y. PY - 2018 DA - 2018// TI - Deep learning based inference of private information using embedded sensors in smart devices JO - IEEE Netw. Mag. VL - 32 UR - https://doi.org/10.1109/MNET.2018.1700349 DO - 10.1109/MNET.2018.1700349 ID - Liang2018 ER - TY - JOUR AU - Cai, Z. AU - He, Z. AU - Guan, X. AU - Li, Y. PY - 2017 DA - 2017// TI - Collective data-sanitization for preventing sensitive information inference attacks in social networks JO - IEEE Trans. Dependable Secure Comput. VL - 15 ID - Cai2017 ER - TY - JOUR AU - Liang, Y. AU - Han, Q. AU - Li, Y. PY - 2017 DA - 2017// TI - Location privacy leakage through sensory data JO - Secur. Commun. Netw. VL - 2017 UR - https://doi.org/10.1155/2017/7576307 DO - 10.1155/2017/7576307 ID - Liang2017 ER - TY - JOUR AU - Ni, L. AU - Zhang, J. AU - Jiang, C. PY - 2017 DA - 2017// TI - Resource allocation strategy in fog computing based on priced timed petri nets JO - IEEE Internet Things J. VL - 4 UR - https://doi.org/10.1109/JIOT.2017.2709814 DO - 10.1109/JIOT.2017.2709814 ID - Ni2017 ER - TY - JOUR AU - Li, y. AU - Yiu, M. L. PY - 2015 DA - 2015// TI - Route-saver: leveraging route apis for accurate and efficient query processing at location-based services JO - IEEE Trans. Knowl. Data Eng. VL - 27 UR - https://doi.org/10.1109/TKDE.2014.2324597 DO - 10.1109/TKDE.2014.2324597 ID - Li2015 ER - TY - JOUR AU - Xin, M. AU - Lu, M. AU - Li, W. PY - 2015 DA - 2015// TI - An adaptive collaboration evaluation model and its algorithm oriented to multi-domain location-based services JO - Expert Syst. Appl. VL - 42 UR - https://doi.org/10.1016/j.eswa.2014.10.014 DO - 10.1016/j.eswa.2014.10.014 ID - Xin2015 ER - TY - JOUR AU - Al-Dhubhani, R. AU - Cazalas, J. M. PY - 2018 DA - 2018// TI - An adaptive geo-indistinguishability mechanism for continuous LBS queries JO - Wirel. Netw. VL - 24 UR - https://doi.org/10.1007/s11276-017-1534-x DO - 10.1007/s11276-017-1534-x ID - Al-Dhubhani2018 ER - TY - JOUR AU - Jing, Y. AU - Hu, L. AU - Ku, W. S. AU - Shahabi, C. PY - 2014 DA - 2014// TI - Authentication of k nearest neighbor query on road networks JO - IEEE Trans. Knowl. Data Eng. VL - 26 UR - https://doi.org/10.1109/TKDE.2013.174 DO - 10.1109/TKDE.2013.174 ID - Jing2014 ER - TY - STD TI - V. Bindschaedler, R. Shokri, in 2016 IEEE Symposium on Security and Privacy (SP). Synthesizing plausible privacy-preserving location traces (IEEE, 2016), pp. 546–563. ID - ref12 ER - TY - JOUR AU - Sun, Y. AU - Chen, M. AU - Hu, L. AU - Qian, Y. PY - 2017 DA - 2017// TI - ASA: Against statistical attacks for privacy-aware users in location based service JO - Futur. Gener. Comput. Syst. VL - 70 UR - https://doi.org/10.1016/j.future.2016.06.017 DO - 10.1016/j.future.2016.06.017 ID - Sun2017 ER - TY - STD TI - Z. Cai, X. Zheng, A private and efficient mechanism for data uploading in smart cyber-physical systems. IEEE Trans. Netw. Sci. Eng. (2018). https://doi.org/10.1109/TNSE.2018.2830307. ID - ref14 ER - TY - JOUR AU - Zheng, X. u. AU - Cai, Z. h. i. p. e. n. g. AU - Luo, G. u. a. n. g. c. h. u. n. AU - Tian, L. i. n. g. AU - Bai, X. i. a. o. PY - 2019 DA - 2019// TI - Privacy-preserved community discovery in online social networks JO - Future Generation Computer Systems VL - 93 UR - https://doi.org/10.1016/j.future.2018.04.020 DO - 10.1016/j.future.2018.04.020 ID - Zheng2019 ER - TY - JOUR AU - Ni, L. AU - Li, C. AU - Wang, X. AU - Jiang, H. PY - 2018 DA - 2018// TI - DP-MCDBSCAN: Differential privacy preserving multi-core DBSCAN clustering for network user data JO - IEEE Access. VL - 6 UR - https://doi.org/10.1109/ACCESS.2018.2824798 DO - 10.1109/ACCESS.2018.2824798 ID - Ni2018 ER - TY - STD TI - T. Xu, Y. Cai, in Proceedings of the 15th annual ACM international symposium on Advances in geographic information systems. Vol. 39. Location anonymity in continuous location-based services (ACM, 2007), pp. 300–307. ID - ref17 ER - TY - STD TI - C. Li, B. Palanisamy, in Proceedings of the 24th ACM International on Conference on Information and Knowledge Management. Reversecloak: protecting multi-level location privacy over road networks (ACM, 2015), pp. 673–682. ID - ref18 ER - TY - STD TI - J. Shao, R. Lu, X. Lin, in IEEE INFOCOM 2014-IEEE Conference on Computer Communications. FINE: a fine-grained privacy-preserving location-based service framework for mobile devices (IEEE, 2014), pp. 244–252. ID - ref19 ER - TY - JOUR AU - Li, X. AU - Miao, M. AU - Liu, H. AU - Ma, J. AU - Li, K. -. C. PY - 2017 DA - 2017// TI - An incentive mechanism for k-anonymity in LBA privacy protection based on credit mechanism JO - Soft Comput. VL - 21 UR - https://doi.org/10.1007/s00500-016-2040-2 DO - 10.1007/s00500-016-2040-2 ID - Li2017 ER - TY - STD TI - B. Ying, D. Makrakis, in 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS). Protecting location privacy with clustering anonymization in vehicular networks (IEEE, 2014), pp. 305–310. ID - ref21 ER - TY - JOUR AU - Zhang, J. AU - Yuan, Y. AU - Wang, X. PY - 2018 DA - 2018// TI - RPAR: location privacy preserving via repartitioning anonymous region in mobile social network JO - Secur. Commun. Netw. VL - 2018 ID - Zhang2018 ER - TY - JOUR AU - Hara, T. AU - Suzuki, A. AU - Iwata, M. PY - 2016 DA - 2016// TI - Dummy-based user location anonymization under real-world constraints JO - IEEE Access. VL - 4 UR - https://doi.org/10.1109/ACCESS.2016.2526060 DO - 10.1109/ACCESS.2016.2526060 ID - Hara2016 ER - TY - JOUR AU - Samet, H. PY - 1990 DA - 1990// TI - The design and analysis of spatial data structures JO - Off. Sci. Tech. Inf. Tech. Rep. VL - 50255 ID - Samet1990 ER - TY - JOUR AU - Wang, X. AU - Luo, Y. AU - Jiang, Y. AU - Wu, W. AU - Yu, Q. PY - 2018 DA - 2018// TI - Probabilistic optimal projection partition kd-tree k-anonymity for data publishing privacy protection JO - Intell. Data Anal. VL - 22 UR - https://doi.org/10.3233/IDA-173589 DO - 10.3233/IDA-173589 ID - Wang2018 ER - TY - JOUR AU - Hayashida, S. AU - Amagata, D. AU - Hara, T. AU - Xie, X. PY - 2018 DA - 2018// TI - Dummy generation based on user-movement estimation for location privacy protection JO - IEEE Access. VL - 6 UR - https://doi.org/10.1109/ACCESS.2018.2829898 DO - 10.1109/ACCESS.2018.2829898 ID - Hayashida2018 ER - TY - STD TI - B. Niu, Q. Li, X. Zhu, et al., in 2015 IEEE conference on computer communications (INFOCOM). Enhancing privacy through caching in location-based services (IEEE, 2015), pp. 1017–1025. ID - ref27 ER - TY - STD TI - Opnet. https://www.opnet.com/. Accessed 25 Jul 2018. UR - https://www.opnet.com/ ID - ref28 ER - TY - JOUR AU - Sun, G. AU - Liao, D. AU - Li, H. AU - Yu, H. AU - Chang, V. I. PY - 2017 DA - 2017// TI - L2P2: A location-label based approach for privacy preserving in LBS JO - Future Gener. Comput. Syst. VL - 74 UR - https://doi.org/10.1016/j.future.2016.08.023 DO - 10.1016/j.future.2016.08.023 ID - Sun2017 ER - TY - STD TI - M. Gruteser, D. Grunwald, in Proceedings of the 1st international conference on Mobile systems, applications and services. Anonymous usage of location-based services through spatial and temporal cloaking (ACM, 2003), pp. 31–42. ID - ref30 ER - TY - STD TI - O. Abul, F. Bonchi, M. Nanni, in 2008 IEEE 24th International Conference on Data Engineering (ICDE ’08), IEEE Computer Society,. Never Walk Alone: Uncertainty for Anonymity in Moving Objects Databases, (2008), pp. 376–385. ID - ref31 ER - TY - STD TI - M. F. Mokbel, C. -Y. Chow, W. G. Aref, in Proceedings of the 32nd International Conference on Very Large Data Bases. The new casper: Query processing for location services without compromising privacy (VLDB Endowment, 2006), pp. 763–774. ID - ref32 ER - TY - STD TI - B. Niu, Q. Li, X. Zhu, G. Cao, H. Li, in IEEE INFOCOM 2014-IEEE Conference on Computer Communications. Achieving k-anonymity in privacy-aware location-based services (IEEE, 2014), pp. 754–762. ID - ref33 ER - TY - STD TI - D. Wu, Y. Zhang, Y. Liu, in 2017 IEEE Trustcom/BigDataSE/ICESS. IEEE. Dummy Location Selection Scheme for K-Anonymity in Location Based Services (IEEE, 2017), pp. 441–448. ID - ref34 ER - TY - STD TI - D. Liao, X. Huang, V. Anand, et al., in 2016 IEEE International Conference on Communications (ICC). k-DLCA: an efficient approach for location privacy preservation in location-based services (IEEE, 2016), pp. 1–6. ID - ref35 ER - TY - JOUR AU - JiangM, R. AU - Lu, R. AU - Choo, K. -. K. R. PY - 2018 DA - 2018// TI - Achieving high performance and privacy-preserving query over encrypted multidimensional big metering data JO - Future Gener. Comput. Syst. VL - 78 UR - https://doi.org/10.1016/j.future.2016.05.005 DO - 10.1016/j.future.2016.05.005 ID - JiangM2018 ER - TY - STD TI - Z. Xu, Z. Cai, J. Li, G. Hong, in IEEE INFOCOM 2017-IEEE Conference on Computer Communications. Location-privacy-aware review publication mechanism for local business service systems (IEEE, 2017), pp. 1–9. ID - ref37 ER - TY - JOUR AU - Zheng, X. u. AU - Cai, Z. h. i. p. e. n. g. AU - Li, Y. i. n. g. s. h. u. PY - 2018 DA - 2018// TI - Data Linkage in Smart Internet of Things Systems: A Consideration from a Privacy Perspective JO - IEEE Communications Magazine VL - 56 UR - https://doi.org/10.1109/MCOM.2018.1701245 DO - 10.1109/MCOM.2018.1701245 ID - Zheng2018 ER - TY - JOUR AU - Sweeney, L. PY - 2002 DA - 2002// TI - k-anonymity: a model for protecting privacy JO - Int. J. Uncertain. Fuzziness Knowl.-Based Syst. VL - 10 UR - https://doi.org/10.1142/S0218488502001648 DO - 10.1142/S0218488502001648 ID - Sweeney2002 ER -