1 |
Huang C.-W., Krueger D., Lacoste A., and Courville A, "Neural Autoregressive Flows", Proceedings of the 35th International Conference on Machine Learning, Vol. 80, pp. 2078-2087, 2018. DOI: 10.48550/arXiv.1804.00779
DOI
|
2 |
Wang L, Yang D, Han X, Wang T, Zhang D, Ma X. "Location Privacy-preserving Task Allocation for Mobile Crowdsensing with Differential Geo-obfuscation", Proceedings of the International Conference on World Wide Web, pp. 627-636, Perth, Australia, April 2017. DOI: 10.1145/3038912.3052696
DOI
|
3 |
Tong W, Hua J, Zhong S, "A jointly differentially private scheduling protocol for ridesharing services", IEEE Transaction on Information Forensics and Security, Vol. 12, No. 10, pp. 2444-2456, 2017. DOI: 10.1109/TIFS.2017.2707334
DOI
|
4 |
Xue M, Liu Y, Ross KW, Qian H, "I Know Where You Are: Thwarting Privacy Protection in Location-based Social Discovery Services" Proceedings of the IEEE Conference on Computer Communications Workshops, pp. 179-184, Hong Kong, China, 2015. DOI: 10.1109/infcomw.2015.7179381
DOI
|
5 |
D. Zibar, O. Winther, R. Borkowski, I. T. Monroy, L. Carvalho and J. Oliveira, "Applications of expectation maximization algorithm for coherent optical communication", 22nd European Signal Processing Conference, pp. 1890-1894, 2014
|
6 |
Pan X, Zhang J, Wang F, Yu PS, "DistSD: Distance-based Social Discovery with Personalized Posterior Screening", Proceedings of the IEEE International Conference on Big Data, p. 1110-1119. Washington, DC, USA, Dec. 2016. DOI: 10.1109/BigData.2016.7840714
DOI
|
7 |
Ng, S.K., Krishnan, T., McLachlan, G.J., "The EM Algorithm", Springer, Berlin, Heidelberg, Dec 2011. DOI: 10.1007/978-3-642-21551-3_6
DOI
|
8 |
T. K. Moon, "The expectation-maximization algorithm", in IEEE Signal Processing Magazine, Vol. 13, no. 6, pp. 47-60, Nov 1996. DOI: 10.1109/79.543975
DOI
|
9 |
Elad Tzoreff, Anthony J. Weiss, "Expectation-maximization algorithm for direct position determination", Signal Processing, Vol. 133, pp. 32-39, 2017. DOI: 10.1016/j.sigpro.2016.10.015
DOI
|
10 |
Bojan Jovanovic, "Internet of Things statistics for 2022 - Taking Things Apart", https://dataprot.net/statistics/iot-statistics/
|
11 |
Nam Jiyeon, Rha Jong Youn, "Location Privacy Concern and its impact on consumers' intention to use Location-Based Services", Consumer Policy And Education Review, Vol. 5, No. 2, pp. 81-102, June 2009.
|
12 |
Kido H, Yanagisawa Y, Satoh T, "Protection of Location Privacy Using Dummies for Location-based Services", Proceedings of the International Conference on Data Engineering Workshops, pp.1248-1248, Tokyo, Japan, April 2005. DOI: 10.1109/ICDE.2005.269.
DOI
|
13 |
Pozi, M.S.M. and Mohd. Hasbullah Omar, "A Kernel Density Estimation Method to Generate Synthetic Shifted Datasets in Privacy-Preserving Task", Journal of Internet Services and Information Security, 10(4), pp. 70-89, Nov. 2020. DOI:10.22667/JISIS.2020.11.30.070
DOI
|
14 |
Gruteser MO, Grunwald D., "Anonymous Usage of Location-based Services through Spatial and Temporal Cloaking", Proceedings of the International Conference on Mobile Systems, Applications and Services pp. 31-42. San Francisco, CA, USA, 2003. DOI: 10.1145/1066116.1189037
DOI
|
15 |
C. Dwork, F. McSherry, K. Nissim, and A. Smith, "Calibrating noise to sensitivity in private data analysis", Proceedings of the Third conference on Theory of Cryptography, pp. 265-284, New York, NY 2006. DOI: 10.1007/11681878_14
DOI
|
16 |
Kujawinska, A., M. Rogalewicz, and M. Diering. "Application of expectation maximization metod for purchase decision-making support in welding branch, Management and Production Engineering Review", Vol. 7, No. 2, pp. 29-33, 2016. DOI: 10.1515/mper-2016-0014
DOI
|
17 |
Kingma D. P., Salimans T., Jozefowicz R., Chen X., Sutskever I., and Welling M, "Improved Variational Inference with Inverse Autoregressive Flow", Advances in Neural Information Processing Systems, Vol. 29, pp. 4743-4751, 2016. DOI: 10.48550/arXiv.1606.04934
DOI
|
18 |
Oliva J., Dubey A., Zaheer M., Poczos B., Salakhutdinov R., Xing E., and Schneider J, "Transformation Autoregressive Networks", Proceedings of the 35th International Conference on Machine Learning, Vol. 80, pp. 3898-3907, 2018. DOI: 10.48550/arXiv.1801.09819
DOI
|
19 |
Ma C, Chen CW, "Nearby friend discovery with geo-indistinguishability to stalkers", Procedia Computer Science, Vol. 34, pp. 352-359, 2014. DOI: 10.1016/j.procs.2014.07.036
DOI
|
20 |
Huang C, Lu R, Zhu H, Shao J, Alamer A, Lin X. "EPPD: Efficient and Privacy-preserving Proximity Testing with Differential Privacy Techniques", Proceedings of the IEEE International Conference on Communications, pp. 1-6, Kuala Lumpur, Malaysia, 2016. DOI: 10.1109/ICC.2016.7511194
DOI
|
21 |
Papamakarios G., Pavlakou T., and Murray I, "Masked Autoregressive Flow for Density Estimation", Advances in Neural Information Processing Systems, Vol. 30, pp. 2338-2347, May 2017. DOI: 10.48550/arXiv.1705.07057
DOI
|
22 |
M. E. Andres, N. E. Bordenabe, K. Chatzikokolakis, and C. Palamidessi. "Geo-indistinguishability: Differential privacy for location-based systems", Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, pp. 901-914, Berlin, Germany, Nov. 2013. DOI: 10.1145/2508859.2516735
DOI
|
23 |
N. E. Bordenabe, K. Chatzikokolakis, and C. Palamidess, "Optimal geo-indistinguishable mechanisms for location privacy", Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, pp. 251-262, New York, NY, USA, Nov. 2014. DOI: 10.1145/2660267.2660345
DOI
|
24 |
K. Chatzikokolakis, E. ElSalamouny, and C. Palamidessi, "Efficient utility improvement for location privacy", Proceedings on Privacy Enhancing Technologies, pp. 210-231, Minneapolis, USA, July 2017. DOI: 10.1515/popets-2017-0035
DOI
|
25 |
Fakoor R., Chaudhari P., Mueller J., and Smola A. J, "TradE: Transformers for Density Estimation". ArXiv preprint, April 2020. DOI: 10.48550/arXiv.2004.02441
DOI
|
26 |
U. Erlingsson, V. Pihur, and A. Korolova, "RAPPOR: Randomized aggregatable privacy-preserving ordinal response", Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, pp. 1054-1067, Scottsdale, AZ, USA, Nov. 2014. DOI: 10.48550/arXiv.1407.6981
DOI
|
27 |
J. W. Kim and B. Jang. "Workload-aware indoor positioning data collection via local differential privacy", IEEE Communications Letters, Vol. 23, No. 8, pp. 1352-1356, August 2019. DOI: 10.1109/LCOMM.2019.2922963
DOI
|
28 |
Yu Zheng, T-Drive trajectory data sample, https://www.microsoft.com/en-us/research/publication/t-drive-trajectory-data-sample
|
29 |
Matt Kapko, AT&T, T-Mobile, Sprint seek to make amends over location breach, https://www.fiercewireless.com/wireless/u-s-carriers-caught-selling-customers-location-data-to-third-parties-again
|
30 |
C. Dwork. "Differential privacy", Proceedings of the International Colloquium on Automata, Languages, pp. 1-12, Venice, Italy, 2006. DOI: 10.1007/11787006_1
DOI
|
31 |
R. Ahuja, G. Ghinita, and C. Shahabi, "A utility-preserving and scalable technique for protecting location data with geo-indistinguishability", Proceedings of the International Conference on Extending Database Technology, pp. 210-231, Lisbon, Portuga, April 2019.
|
32 |
Chawla S., Dwork C., McSherry F., and Talwar K, "On the Utility of Privacy-Preserving Histograms", Proceedings of the Conference on Uncertainty in Artificial Intelligence, UAI, July 2005. DOI: 10.48550/arXiv.1207.1371
DOI
|
33 |
J. W. Kim, J. H. Lim, S. M. Moon, and B. Jang, "Collecting health lifelog data from smartwatch users in a privacy-preserving manner", IEEE Transactions on Consumer Electronics, Vol. 65, No. 3, pp. 369-378, Aug. 2019. DOI: 10.1109/TCE.2019.2924466
DOI
|