Never Walk Alone: Uncertainty for Anonymity in Moving Objects Databases, Proceedings of the 24th International Conference on Data Engineering, pp.376-385, 2008. ,
Anonymization of moving objects databases by clustering and perturbation, Inf. Syst, vol.35, pp.884-910, 2010. ,
On the Privacy Implications of Location Semantics, PoPETs, vol.2016, pp.165-183, 2016. ,
Geo-indistinguishability: differential privacy for location-based systems, 2013 ACM SIGSAC Conference on Computer and Communications Security, CCS'13, pp.901-914, 2013. ,
Anonymizing mobility data using semantic cloaking, Pervasive and Mobile Computing, vol.28, pp.102-112, 2016. ,
Inferring social ties in academic networks using short-range wireless communications, Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society, pp.179-188, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-00853975
Predicting Users' Motivations behind Location Check-Ins and Utility Implications of Privacy Protection Mechanisms, 22nd Annual Network and Distributed System Security Symposium, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01076554
Uniqueness Assessment of Human Mobility on Multi-Sensor Datasets, Ph.D. Dissertation. LIRIS UMR CNRS, p.5205, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01381986
PULP: Achieving Privacy and Utility Trade-Off in User Mobility Data, 36th IEEE Symposium on Reliable Distributed Systems, SRDS 2017, pp.164-173, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01578635
Constructing elastic distinguishability metrics for location privacy, PoPETs, vol.2015, pp.156-170, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01270197
Identification via location-profiling in GSM networks, Proceedings of the 7th ACM workshop on Privacy in the electronic society, pp.23-32, 2008. ,
, Differential privacy. Encyclopedia of Cryptography and Security, pp.338-340, 2011.
A new metric for probability distributions, IEEE Transactions on Information theory, 2003. ,
Location Privacy Protection for Smartphone Users, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp.239-250, 2014. ,
Next place prediction using mobility markov chains, Proceedings of the First Workshop on Measurement, Privacy, and Mobility, p.3, 2012. ,
URL : https://hal.archives-ouvertes.fr/hal-00736947
De-anonymization attack on geolocated data, J. Comput. System Sci, vol.80, pp.1597-1614, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-01242268
An Exploration to Location Based Service and Its Privacy Preserving Techniques: A Survey, Wireless Personal Communications, vol.96, pp.1973-2007, 2017. ,
Search locations safely and accurately: A location privacy protection algorithm with accurate service, J. Network and Computer Applications, vol.103, pp.146-156, 2018. ,
The Mobile Data Challenge: Big Data for Mobile Computing Research, Pervasive Computing, 2012. ,
Privacy leakage of location sharing in mobile social networks: Attacks and defense, IEEE Transactions on Dependable and Secure Computing, vol.15, pp.646-660, 2018. ,
NoiseTube: Measuring and mapping noise pollution with mobile phones, Information Technologies in Environmental Engineering, Proceedings of the 4th International ICSC Symposium, pp.215-228, 2009. ,
AP-Attack: A Novel User Re-identification Attack On Mobility Datasets, Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, pp.48-57, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01785155
, Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, vol.2, pp.1-25, 2018.
Natasa Sarafijanovic-Djukic, and Matthias Grossglauser, 2009. ,
Adaptive Location Privacy with ALP, 35th IEEE Symposium on Reliable Distributed Systems, SRDS 2016, pp.269-278, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01370447
ACCIO: How to Make Location Privacy Experimentation Open and Easy, 38th IEEE International Conference on Distributed Computing Systems, ICDCS 2018, pp.896-906, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-01784557
Differentially private location privacy in practice, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-01148230
Time Distortion Anonymization for the Publication of Mobility Data with High Utility, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01170060
Far Out: Predicting Long-Term Human Mobility, Proceedings of the Twenty-Sixth AAAI Conference on Artificial Intelligence, 2012. ,
Privately querying location-based services with SybilQuery, UbiComp 2009: Ubiquitous Computing, 11th International Conference, pp.31-40, 2009. ,
k-anonymity: A model for protecting privacy, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol.10, pp.557-570, 2002. ,
Human mobility, social ties, and link prediction, Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining, pp.1100-1108, 2011. ,
A de-anonymization attack on geo-located data considering spatio-temporal influences, International Conference on Information and Communications Security, pp.478-484, 2015. ,
Geolife: A collaborative social networking service among user, location and trajectory, IEEE Data Eng. Bull, vol.33, pp.32-39, 2010. ,
Discovering personal gazetteers: an interactive clustering approach, Proceedings of the 12th annual ACM international workshop on Geographic information systems, pp.266-273, 2004. ,
Discovering personal gazetteers: an interactive clustering approach, 12th ACM International Workshop on Geographic Information Systems, ACM-GIS, pp.266-273, 2004. ,