The K-Anonymous Dummy Location Selection Algorithm Based on Historical Query Probability [PDF]
The dummy-based location privacy mechanism using historical query probability suffers from low anonymity, small coverage area and imbalanced location distribution.To address the problem, a K-anonymous dummy-based locationselection algorithm is proposed ...
YANG Yang, HU Xiaohui, DU Yongwen
doaj +1 more source
Double Dummy Location Selection Algorithm Based on Behavior Correlation [PDF]
At present,most of the dummy location privacy protection methods do not fully consider that the attacker may have the background knowledge about the information,which user requested from the service last time,so it cannot effectively resist the ...
TU Sipan, ZHANG Lin, LIU Xiping
doaj +1 more source
Multi-attribute Decision-making Method for Secure Anonymous Set Construction [PDF]
The traditional privacy protection scheme for constructing anonymous sets using dummy location generation technology does not consider comprehensive factors. This results in low differentiation and poor rationality of the final generated dummy locations,
Zhanwei HOU, Xin YANG, Zihao SHEN, Hui WANG, Peiqian LIU
doaj +1 more source
Efficient Dummy Generation for Protecting Location Privacy
Tian-Yuan Cai +5 more
exaly +3 more sources
Location Privacy-Preserving Scheme in IoBT Networks Using Deception-Based Techniques
The Internet of Battlefield Things (IoBT) refers to interconnected battlefield equipment/sources for synchronized automated decision making. Due to difficulties unique to the battlefield, such as a lack of infrastructure, the heterogeneity of equipment ...
Basmh Alkanjr, Imad Mahgoub
doaj +1 more source
How watching Pinocchio movies changes our subjective experience of extrapersonal space [PDF]
The way we experience the space around us is highly subjective. It has been shown that motion potentialities that are intrinsic to our body influence our space categorization.
Brass, Marcel +4 more
core +17 more sources
In the internet of vehicles (IoVs), vehicle users should provide location information continuously when they want to acquire continuous location-based services (LBS), which may disclose the vehicle trajectory privacy.
Qianyong Huang +3 more
doaj +1 more source
Constructing dummy query sequences to protect location privacy and query privacy in location-based services [PDF]
Location-based services (LBS) have become an important part of people’s daily life. However, while providing great convenience for mobile users, LBS result in a serious problem on personal privacy, i.e., location privacy and query privacy. However, existing privacy methods for LBS generally take into consideration only location privacy or query privacy,
Zongda Wu +5 more
openaire +1 more source
Multi-factor Dummy Location Selection Algorithm in Location-based Service [PDF]
In view of the existing dummy location selection methods in LBS snapshot location privacy protection,the background knowledge attack caused by the time factor of the location itself is ignored,and the sensitive locations are treated equally.Based on this,
LI Yongjun, ZHU Yuefei, WU Wei, BAI Lifang
doaj +1 more source
RcDT: Privacy Preservation Based on R-Constrained Dummy Trajectory in Mobile Social Networks
The boom of mobile devices and location-based services (LBSs) greatly enriches the mobile social network (MSN) applications, which bring convenience to our daily life and, meanwhile, raise serious privacy concerns due to the potential disclosure risk of ...
Jinquan Zhang +3 more
doaj +1 more source

