Geo-indistinguishability: Differential Privacy for Locationbased Systems, CCS, pp.901-914, 2013. ,
, Academic Networks Using Short-Range Wireless Communications. Wpes, pp.179-188, 2013.
PULP: Achieving Privacy and Utility Trade-Off in User Mobility Data, 2017 IEEE 36th Symposium on Reliable Distributed Systems (SRDS), pp.164-173, 2017. ,
DOI : 10.1109/SRDS.2017.25
URL : https://hal.archives-ouvertes.fr/hal-01578635
Complete Bipartite Anonymity: Confusing Anonymous Mobility Traces for Location Privacy, 2012 IEEE 18th International Conference on Parallel and Distributed Systems, pp.205-212, 2012. ,
DOI : 10.1109/ICPADS.2012.37
Differential Privacy, Automata, Languages and Programming, pp.1-12, 2006. ,
DOI : 10.1007/11787006_1
Redditor cracks anonymous data trove to pinpoint muslim cab drivers, 2015. ,
De-anonymization Attack on Geolocated Data, 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp.789-797, 2013. ,
DOI : 10.1109/trustcom.2013.96
URL : https://hal.archives-ouvertes.fr/hal-01242268
Show me how you move and I will tell you who you are, Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS, SPRINGL '10, pp.103-126, 2011. ,
DOI : 10.1145/1868470.1868479
URL : https://hal.archives-ouvertes.fr/inria-00556833
Next place prediction using mobility Markov chains, Proceedings of the First Workshop on Measurement, Privacy, and Mobility, MPM '12, p.3, 2012. ,
DOI : 10.1145/2181196.2181199
URL : https://hal.archives-ouvertes.fr/hal-00736947
A customizable k-anonymity model for protecting location privacy, 2004. ,
t-Closeness: Privacy Beyond k-Anonymity and l-Diversity, 2007 IEEE 23rd International Conference on Data Engineering, pp.106-115, 2007. ,
DOI : 10.1109/ICDE.2007.367856
URL : http://www.cs.purdue.edu/homes/ninghui/papers/t_closeness_icde07.pdf
-diversity, Data Engineering, 2006. ICDE'06. Proceedings of the 22nd International Conference on, pp.24-24, 2006. ,
DOI : 10.1145/1217299.1217302
AP-Attack: A Novel User Re-identification Attack On Mobility Datasets, Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, 2017. ,
DOI : 10.4108/eai.7-11-2017.2273573
URL : https://hal.archives-ouvertes.fr/hal-01785155
An empirical study oflocation truncation on android, 2013. ,
The new casper: Queryprocessing for location services without compromising privacy, Proceedings of the 32nd international conference on Very large data bases, pp.763-774, 2006. ,
You'll never walk alone: Modeling social behavior for multi-target tracking, 2009 IEEE 12th International Conference on Computer Vision, pp.261-268, 2009. ,
DOI : 10.1109/ICCV.2009.5459260
URL : http://vision.cse.psu.edu/courses/Tracking/vlpr12/PellegriniNeverWalkAlone.pdf
Differentially Private Location Privacy in Practice, MoST'14, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-01148230
Timedistortion anonymization for the publication of mobility data with high utility, TrustCom, pp.539-546, 2015. ,
k-ANONYMITY: A MODEL FOR PROTECTING PRIVACY, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol.2, issue.3, pp.557-570, 2002. ,
DOI : 10.1109/RISP.1993.287632
A classificationof location privacy attacks and approaches. Personal and ubiquitous computing, pp.163-175, 2014. ,
DOI : 10.1007/s00779-012-0633-z
Ensuringprivacy in location-based services: An approach based on opacity enforcement, IFAC Proceedings Volumes, pp.33-38, 2014. ,
DOI : 10.3182/20140514-3-fr-4046.00008
A data mining approach for location prediction in mobile environments, Data & Knowledge Engineering, vol.54, issue.2, pp.121-146, 2005. ,
DOI : 10.1016/j.datak.2004.09.004