Mizera, Andrzej ; University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC)
Pang, Jun ; University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC) ; University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT)
External co-authors :
yes
Language :
English
Title :
Activity tracking: A new attack on location privacy
Publication date :
2015
Event name :
3rd IEEE Conference on Communications and Network Security
Event date :
2015
Audience :
International
Main work title :
Proceedings of the 3rd IEEE Conference on Communications and Network Security (CNS'15)
B. Hoh, M. Gruteser, H. Xiong, and A. Alrabady, "Enhancing security and privacy in traffic-monitoring systems, " IEEE Pervasive Computing, vol. 5, no. 4, pp. 38-46, 2006.
M. Decker, "Location privacy-an overview, " in Proc. 7th International Conference on Mobile Business (ICMB). IEEE CS, 2008, pp. 221-230.
B. Lee, J. Oh, H. Yu, and J. Kim, "Protecting location privacy using location semantics, " in Proc. 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD). ACM, 2011, pp. 1289-1297.
Y. Wang, D. Xu, X. He, C. Zhang, F. Li, and B. Xu, "L2p2: Locationaware location privacy protection for location-based services, " in Proc. 31st Annual IEEE International Conference on Computer Communications (INFOCOM). IEEE CS, 2012, pp. 1996-2004.
S. Mascetti, L. Bertolaja, and C. Bettini, "A practical location privacy attack in proximity services, " in Proc. 14th IEEE International Conference on Mobile Data Management (MDM). IEEE CS, 2013, pp. 87-96.
R. Shokri, G. Theodorakopoulos, J.-Y. L. Boudec, and J.-P. Hubaux, "Quantifying location privacy, " in Proc. 32nd IEEE Symposium on Security and Privacy (S&P). IEEE CS, 2011.
X. Xiao, Y. Zheng, Q. Luo, and X. Xie, "Finding similar users using category-based location history, " in Proc. 18th SIGSPATIAL International Conference on Advances in Geographic Information Systems (GIS). ACM, 2010, pp. 442-445.
X. Chen, J. Pang, and R. Xue, "Constructing and comparing user mobility profiles for location-based services, " in Proc. ACM Symposium on Applied Computing (SAC). ACM, 2013, pp. 264-269.
-, "Constructing and comparing user mobility profiles, " ACM Transactions on the Web, vol. 8, no. 4, p. 21, 2014.
X. Chen, R. Lv, X. Ma, and J. Pang, "Measuring user similarity with trajectory patterns: Principles and new metrics, " in Proc. 16th Asia-Pacific Web Conference (APWeb), ser. LNCS, vol. 8709. Springer, 2014, pp. 437-448.
M. Ye, D. Shou, W.-C. Lee, P. Yin, and K. Janowicz, "On the semantic annotation of places in location-based social networks, " in Proc. 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD). ACM, 2011, pp. 520-528.
A. Khoshgozaran, C. Shahabi, and H. Shirani-Mehr, "Location privacy: going beyond K-anonymity, cloaking and anonymizers, " Knowledge and Information Systems, vol. 26, no. 3, pp. 435-465, 2011.
J. T. Meyerowitz and R. R. Choudhury, "Hiding stars with fireworks: location privacy through camouflage, " in Proc. 15th Annual International Conference on Mobile Computing and Networking (MOBICOM). ACM, 2009, pp. 345-356.
P. Golle and K. Partridge, "On the anonymity of home/work location pairs, " in Proc. 7th International Conference on Pervasive Computing (Pervasive), ser. LNCS, vol. 5538. Springer, 2009, pp. 390-397.
Y. D. Mulder, G. Danezis, L. Batina, and B. Preneel, "Identification via location-profiling in GSM networks, " in Proc. 7th ACM Workshop on Privacy in the Electronic Society (WPES). ACM, 2008, pp. 23-32.
R. Shokri, G. Theodorakopoulos, G. Danezis, J.-P. Hubaux, and J.-Y. L. Boudec, "Quantifying location privacy: The case of sporadic location exposure, " in Proc. 11th International Symposium on Privacy Enhancing Technologies (PETS), ser. LNCS, vol. 6794. Springer, 2011, pp. 57-76.
G. Acar, M. Juarez, N. Nikiforakis, C. Diaz, S. Grses, F. Piessens, and B. Preneel, "Optimal sporadic location privacy preserving systems in presence of bandwidth constraints, " in Proc. 12th ACM Workshop on Privacy in the Electronic Society (WPES). ACM, 2013, pp. 167-178.
R. Shokri, G. Theodorakopoulos, C. Troncoso, J.-P. Hubaux, and J.-Y. L. Boudec, "Protecting location privacy: Optimal strategy against localization attacks, " in Proc. 19th ACM Conference on Computer and Communications Security (CCS). ACM, 2012, pp. 617-627.
Y. Zheng, L. Wang, R. Zhang, X. Xie, and W.-Y. Ma, "GeoLife: Managing and understanding your past life over maps, " in Proc. 9th International Conference on Mobile Data Management (MDM). IEEE CS, 2008, pp. 211-212.
X. Chen, P. Kordy, R. Lv, and J. Pang, "MinUS: Mining user similarity with trajectory patterns, " in Proc. 7th European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML/PKDD), ser. LNCS, vol. 8726. Springer, 2014, pp. 436-439.
F. Chierichetti, R. Kumar, P. Raghavan, and T. Sarlós, "Are web users really Markovian" in Proc. 21st World Wide Web Conference (WWW). ACM, 2012, pp. 609-618.
X. Chen, A. Mizera, and J. Pang, "Quantifying location privacy revisited: Preliminary report, " University of Luxembourg, Tech. Rep., 2014, available at http://satoss. uni. lu/jun/papers/locpriv. pdf.