×
2012/08/01 · Our results quantify the loss of victim nodes' privacy as a function of the nodal mobility, the inference strategies of adversaries, and any ...
Although the published traces are often made anonymous in that the true identities of nodes are replaced by random identifiers, the privacy concern remains.
Abstract—Mobility traces of people and vehicles have been col- lected and published to assist the design and evaluation of mobile.
This paper investigates how an adversary, when equipped with a small amount of the snapshot information termed as side information, can infer an extended ...
Although the published traces are often made anonymous in that the true identities of nodes are replaced by random identifiers, the privacy concern remains.
2013/06/01 · Our results quantify the loss of victim nodes' privacy as a function of the nodal mobility, the inference strategies of adversaries, and any ...
2010/09/20 · ABSTRACT. Mobility traces of people and vehicles have been collected and published to assist the design and evaluation of mo-.
Although the published traces are often made anonymous in that the true identities of nodes are replaced by random identifiers, the privacy concern remains.
2010/01/01 · Faculty Publications ; Title. Privacy vulnerability of published anonymous mobility traces ; Authors. C.Y.T. Ma · D.K.Y. Yau · N.K. Yip · N.S.V. ...
In this paper, we quantitatively measure the risk of privacy disclosure in mobility trace data set caused by re-identification attacks based on the concept of ...