Your Location has been Shared 5,398 Times!, Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, CHI '15, pp.787-796, 2015. ,
DOI : 10.1145/2556288.2557413
Inference Attacks on Location Tracks, " in PERVASIVE, pp.127-143, 2007. ,
DOI : 10.1007/978-3-540-72037-9_8
URL : http://research.microsoft.com/en-us/um/people/jckrumm/publications 2007/inference attack refined distribute.pdf
Show me how you move and I will tell you who you are, Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS, SPRINGL '10, pp.103-126, 2011. ,
DOI : 10.1145/1868470.1868479
URL : https://hal.archives-ouvertes.fr/hal-00660055
Redditor cracks anonymous data trove to pinpoint muslim cab drivers Available online at http://mashable, 2015. ,
Hiding mobile traffic fingerprints with GLOVE, Proceedings of the 11th ACM Conference on Emerging Networking Experiments and Technologies, CoNEXT '15, 2015. ,
DOI : 10.1016/j.ins.2012.04.015
URL : https://hal.archives-ouvertes.fr/hal-01237032
Geo-indistinguishability, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13, pp.901-914, 2013. ,
DOI : 10.1145/2508859.2516735
Differentially private grids for geospatial data, 2013 IEEE 29th International Conference on Data Engineering (ICDE), pp.757-768, 2013. ,
DOI : 10.1109/ICDE.2013.6544872
URL : http://arxiv.org/pdf/1209.1322
LocLok, Proc. VLDB Endow, pp.1901-1904, 2017. ,
DOI : 10.14778/3137765.3137804
Achieving k-anonymity in privacy-aware location-based services, IEEE INFOCOM 2014, IEEE Conference on Computer Communications, pp.754-762, 2014. ,
DOI : 10.1109/INFOCOM.2014.6848002
URL : http://mcn.cse.psu.edu/paper/other/infocom-ben-niu14.pdf
k-ANONYMITY: A MODEL FOR PROTECTING PRIVACY, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol.2, issue.3, pp.557-570, 2002. ,
DOI : 10.1109/RISP.1993.287632
Differential Privacy Languages and Programming , ser. Lecture Notes in Computer Science, pp.1-12, 2006. ,
CRAW- DAD data set epfl/mobility (v. 2009-02-24), 2009. ,
Towards rich mobile phone datasets: Lausanne data collection campaign, ICPS, 2010. ,
Mining interesting locations and travel sequences from GPS trajectories, Proceedings of the 18th international conference on World wide web, WWW '09, pp.791-800, 2009. ,
DOI : 10.1145/1526709.1526816
URL : http://www2009.eprints.org/80/1/p791.pdf
D4D-Senegal: The Second Mobile Phone Data for Development Challenge, p.4885, 1407. ,
SNAP Datasets: Stanford large network dataset collection, 2014. ,
Never Walk Alone: Uncertainty for Anonymity in Moving Objects Databases, 2008 IEEE 24th International Conference on Data Engineering, pp.376-385, 2008. ,
DOI : 10.1109/ICDE.2008.4497446
URL : http://www-kdd.isti.cnr.it/NWA/NWA_ICDE08.pdf
Publishing trajectories with differential privacy guarantees, Proceedings of the 25th International Conference on Scientific and Statistical Database Management, SSDBM, pp.1-1212, 2013. ,
DOI : 10.1145/2484838.2484846
Protecting location privacy through path confusion, SECURECOMM, pp.194-205, 2005. ,
Time Distortion Anonymization for the Publication of Mobility Data with High Utility, 2015 IEEE Trustcom/BigDataSE/ISPA, pp.539-546, 2015. ,
DOI : 10.1109/Trustcom.2015.417
URL : https://hal.archives-ouvertes.fr/hal-01170060
Synthesizing Plausible Privacy-Preserving Location Traces, 2016 IEEE Symposium on Security and Privacy (SP), 2016. ,
DOI : 10.1109/SP.2016.39
Quantifying Location Privacy, 2011 IEEE Symposium on Security and Privacy, pp.247-262, 2011. ,
DOI : 10.1109/SP.2011.18
URL : https://hal.archives-ouvertes.fr/hal-01266229
GEPETO: A GEoPrivacy-Enhancing TOolkit, 2010 IEEE 24th International Conference on Advanced Information Networking and Applications Workshops, pp.1071-1076, 2010. ,
DOI : 10.1109/WAINA.2010.170
URL : https://hal.archives-ouvertes.fr/inria-00556835
A classification of location privacy attacks and approaches, Personal and Ubiquitous Computing, vol.13, issue.2, pp.163-175, 2014. ,
DOI : 10.1007/s10707-008-0047-2
Differentially Private Location Privacy in Practice, MOST, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-01148230
Location-privacy meter tool ,
MapReducing GEPETO or Towards Conducting a Privacy Analysis on Millions of Mobility Traces, 2013 IEEE International Symposium on Parallel & Distributed Processing, Workshops and Phd Forum, pp.1937-1946, 2013. ,
DOI : 10.1109/IPDPSW.2013.180
URL : https://hal.archives-ouvertes.fr/hal-00911238
Pegasus, a workflow management system for science automation, Future Generation Computer Systems, vol.46, issue.C, pp.17-35, 2015. ,
DOI : 10.1016/j.future.2014.10.008
Swift: A language for distributed parallel scripting, Parallel Computing, vol.37, issue.9, pp.633-652, 2011. ,
DOI : 10.1016/j.parco.2011.05.005
URL : http://www.mcs.anl.gov/uploads/cels/papers/P1818.pdf
Kepler: an extensible system for design and execution of scientific workflows, Proceedings. 16th International Conference on Scientific and Statistical Database Management, 2004., p.423, 2004. ,
DOI : 10.1109/SSDM.2004.1311241
A Survey of Data- Intensive Scientific Workflow Management Accio documentation Available online at https, Journal of Grid Computing, vol.1335, issue.4, pp.457-493, 2015. ,
Thrift: Scalable Cross- Language Services Implementation Available online at https, 2007. ,
Mesos: A platform for fine-grained resource sharing in the data center, NSDI, pp.295-308, 2011. ,
Distributed computing in practice: the Condor experience, Concurrency -Practice and Experience, pp.323-356, 2005. ,
DOI : 10.1002/cpe.938
Wait 4 Me: Time-tolerant Anonymization of Moving Objects Databases ? Executable ,