Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
location-based services
biblio
A Privacy-Preserving Pedestrian Dead Reckoning Framework Based on Differential Privacy
Submitted by grigby1 on Tue, 04/26/2022 - 10:38am
Accelerometers
composability
Dead reckoning
differential privacy
Filtering
Human behavior
location-based services
Pedestrian dead-reckoning
privacy
pubcrawl
Publishing
resilience
Resiliency
Robustness
Scalability
trajectory privacy
biblio
A Distributed Location Trusted Service Achieving k-Anonymity against the Global Adversary
Submitted by aekwall on Mon, 12/20/2021 - 11:29am
Computational modeling
privacy
computer architecture
social networking (online)
Conferences
pubcrawl
Scalability
Metrics
Resiliency
Human behavior
Resistance
Companies
Urban areas
Location k-anonymity
location-based services
Adversary Models
biblio
Fast and Secure kNN Query Processing in Cloud Computing
Submitted by aekwall on Mon, 02/22/2021 - 12:44pm
RBF
untrusted cloud
tracking technology
secure range query protocol
secure location-based query
secure index
random Bloom filter
process location-based queries
LSPs
geospatial data storage
FSkNN
fast location-based query
fast and secure kNN query processing
data structure
commercial public clouds
Geospatial analysis
Cloud Computing
nearest neighbor search
location based services
location-based services
Predictive Metrics
Indexes
Measurement
data structures
query processing
pubcrawl
nearest neighbour methods
Protocols
data privacy
encrypted data
Cryptography
biblio
A Semantic k-Anonymity Privacy Protection Method for Publishing Sparse Location Data
Submitted by grigby1 on Thu, 08/13/2020 - 4:35pm
semantic k-anonymity privacy protection method
privacy disclosure
privacy leaks
privacy protection
pubcrawl
Publishing
resilience
Resiliency
semantic attacks
nonsensitive data
semantic privacy protection
semantic translation
Semantics
sensors
sparse location data
Trajectory
user sensitive information
k-anonymity
anonymous set
attacker
composability
compressed sensing
data privacy
diversity reception
Human behavior
information science
anonymity
location based services
location information
location technology
location-based services
Metrics
missing location data
multiuser compressing sensing method
biblio
Trajectory Protection Scheme Based on Fog Computing and K-anonymity in IoT
Submitted by grigby1 on Thu, 08/13/2020 - 4:33pm
maximum entropy methods
probability
anonymity
Trajectory
k-anonymity
cloud computing technology
k-anonymity-based dummy generation algorithms
location based services
location-based services
maximum entropy
Metrics
offline trajectory data protection
offline trajectory protection
online trajectory protection
real-time trajectory privacy protection
time-dependent query probability
trajectory protection
trajectory protection scheme
trajectory publication
transition probability
Cloud Computing
security of data
Servers
IoT
pubcrawl
Human behavior
resilience
Resiliency
security
privacy
Internet of Things
Computational modeling
Entropy
composability
mobile computing
edge computing
Fog computing
Data protection
Security analysis
biblio
An Efficient Location Privacy Preserving Model based on Geohash
Submitted by aekwall on Mon, 04/20/2020 - 9:31am
Geohash geographic information
privacy models and measurement
user privacy security
Privacy protection model
Location-based service
location-aware mobile devices
LBS privacy protection model
k-anonymity
great hidden trouble
great convenience
data privacy
Geohash coding
efficient location privacy preserving model
location based services
location-based services
query processing
Metrics
pubcrawl
mobile computing
biblio
Edge-Based Shortest Path Caching for Location-Based Services
Submitted by grigby1 on Tue, 02/18/2020 - 10:54am
location-based services
Web Caching
tree data structures
shortest route
shortest path queries
Scalability
road network topology
Resiliency
resilience
R-tree-based cache lookup algorithm
querying origin
query processing
path caching services
path caches
path cache
Metrics
pubcrawl
location based-services
location based services
large-scale path query processing
large-scale
historical path results
greedy-based cache construction algorithm
greedy algorithms
graph theory
Google Maps
edge-based shortest path caching
edge-based shortest path cache
edge-based path cache structure
caching services
cache storage
biblio
Cloud: privacy For Locations Based-services' through Access Control with dynamic multi-level policy
Submitted by aekwall on Mon, 01/20/2020 - 11:14am
location-based services
zero trust
user privacy in the cloud
user location data
third-party application
supplementary servers
Scalability
Resiliency
pubcrawl
policy-based governance
mobile computing
Metrics
Access Control
location information
LBSs
Human Factors
dynamic multilevel policy
data privacy protection
data privacy
data partitioning
cloud-based locations
cloud service
Cloud Computing
authorisation
biblio
Techu: Open and Privacy-Preserving Crowdsourced GPS for the Masses
Submitted by grigby1 on Wed, 11/28/2018 - 12:59pm
anonymous messaging
ble tags
crowd gps
location privacy
location-based services
privacy-preserving protocol
pubcrawl
resilience
Resiliency
Scalability
user tracking
biblio
Limits of location privacy under anonymization and obfuscation
Submitted by grigby1 on Wed, 09/05/2018 - 9:38am
markov chain
Time series analysis
statistical analysis
Scalability
Resiliency
resilience
pubcrawl
privacy
obfuscation
mobile devices
mobile computing
Measurement
Markov processes
anonymization
location-based services
Location Privacy Protecting Mechanism (LPPM)
location privacy
Location Based Service (LBS)
information theory
Information Theoretic Privacy
human factor
Human behavior
general Markov Chain model
data privacy
Computing Theory
anonymization-based LBS systems
1
2
next ›
last »