Never Walk Alone: Uncertainty for Anonymity in Moving Objects Databases, 2008 IEEE 24th International Conference on Data Engineering, pp.376-385, 2008. ,
DOI : 10.1109/ICDE.2008.4497446
URL : http://www-kdd.isti.cnr.it/NWA/NWA_ICDE08.pdf
Anonymization of moving objects databases by clustering and perturbation, Information Systems, vol.35, issue.8, pp.884-910, 2010. ,
DOI : 10.1016/j.is.2010.05.003
Wait 4 Me: Time-tolerant Anonymization of Moving Objects Databases ? Executable ,
Mobilitics: Analyzing Privacy Leaks in Smartphones, ERCIM News, issue.93, pp.2013-2013 ,
A case study, Proceedings of the 20th ACM SIGKDD international conference on Knowledge discovery and data mining, KDD '14, pp.1679-1688, 2014. ,
DOI : 10.1145/2623330.2623361
URL : https://hal.archives-ouvertes.fr/hal-01060070
User-side adaptive protection of location privacy in participatory sensing, GeoInformatica, vol.13, issue.6, pp.165-191, 2014. ,
DOI : 10.1007/978-3-642-22263-4_4
Social fMRI: Investigating and shaping social mechanisms in the real world, Pervasive and Mobile Computing, vol.7, issue.6, pp.643-659, 2011. ,
DOI : 10.1016/j.pmcj.2011.09.004
Kepler: an extensible system for design and execution of scientific workflows, Proceedings. 16th International Conference on Scientific and Statistical Database Management, 2004., p.423, 2004. ,
DOI : 10.1109/SSDM.2004.1311241
URL : http://www.sdsc.edu/~ludaesch/Paper/ssdbm04-kepler.pdf
Konstantinos Chatzikokolakis, and Catuscia Palamidessi. Geo-indistinguishability: Differential Privacy for Locationbased Systems, CCS, pp.901-914, 2013. ,
1,500 scientists lift the lid on reproducibility, Nature, vol.533, issue.7604, pp.452-454, 2016. ,
DOI : 10.1038/533452a
URL : http://www.nature.com:80/polopoly_fs/1.19970!/menu/main/topColumns/topLeftColumn/pdf/533452a.pdf
Supporting anonymous location queries in mobile environments with privacygrid, WWW, pp.237-246, 2008. ,
DOI : 10.1145/1367497.1367531
URL : http://www-static.cc.gatech.edu/~lingliu/papers/2008/WWW08-PrivacyGrid.pdf
Available online at http://www.nytimes. com, 2006. ,
Mix zones: user privacy in location-aware services, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second, p.127, 2004. ,
DOI : 10.1109/PERCOMW.2004.1276918
URL : http://www-lce.eng.cam.ac.uk/~arb33/papers/BeresfordStajano-MixZones-PerSec2004.pdf
Location privacy in pervasive computing. Pervasive Computing, IEEE, vol.2, issue.1, pp.46-55, 2003. ,
DOI : 10.1109/mprv.2003.1186725
State Machine Replication for the Masses with BFT-SMART, 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, pp.355-362, 2014. ,
DOI : 10.1109/DSN.2014.43
URL : http://www.di.fc.ul.pt/~bessani/publications/dsn14-bftsmart.pdf
Inferring social ties in academic networks using short-range wireless communications, Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society, WPES '13, pp.179-188, 2013. ,
DOI : 10.1145/2517840.2517842
URL : https://hal.archives-ouvertes.fr/hal-00853975
Synthesizing Plausible Privacy-Preserving Location Traces, 2016 IEEE Symposium on Security and Privacy (SP), 2016. ,
DOI : 10.1109/SP.2016.39
Uniqueness Assessment of Human Mobility on Multi-Sensor Datasets, LIRIS UMR CNRS 5205, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01381986
Secure outsourced garbled circuit evaluation for mobile devices, Proceedings of the 22nd USENIX Conference on Security, pp.289-304, 2013. ,
DOI : 10.1007/s00145-007-9015-5
URL : https://www.usenix.org/system/files/conference/usenixsecurity13/sec13-paper_carter.pdf
ipshield: A framework for enforcing context-aware privacy, Proceedings of the 11th USENIX Conference on Networked Systems Design and Implementation, NSDI'14, pp.143-156, 2014. ,
A Predictive Differentially-Private Mechanism for Mobility Traces, PETS, pp.21-41, 2014. ,
DOI : 10.1007/978-3-319-08506-7_2
URL : https://hal.archives-ouvertes.fr/hal-01011260
Constructing elastic distinguishability metrics for location privacy, Proceedings on Privacy Enhancing Technologies, pp.156-170, 2015. ,
DOI : 10.1515/popets-2015-0023
URL : https://hal.archives-ouvertes.fr/hal-01270197
Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms, Communications of the ACM, vol.24, issue.2, pp.84-90, 1981. ,
Differentially private transit data publication, Proceedings of the 18th ACM SIGKDD international conference on Knowledge discovery and data mining, KDD '12, pp.213-221, 2012. ,
DOI : 10.1145/2339530.2339564
Friendship and mobility, Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining, KDD '11, pp.1082-1090, 2011. ,
DOI : 10.1145/2020408.2020579
Private Information Retrieval, FOCS, p.41, 1995. ,
A peer-to-peer spatial cloaking algorithm for anonymous location-based service, Proceedings of the 14th annual ACM international symposium on Advances in geographic information systems , GIS '06, pp.171-178, 2006. ,
DOI : 10.1145/1183471.1183500
City Domination website ,
Repeatability and benefaction in computer systems research, 2015. ,
On the LambertW function, Advances in Computational Mathematics, vol.1, issue.6, pp.329-359, 1996. ,
DOI : 10.5186/aasfm.1983.0805
How much is location privacy worth, Proceedings of the 4th Workshop on the Economics of Information Security, 2005. ,
Unique in the Crowd: The privacy bounds of human mobility, Scientific Reports, vol.23, issue.1, p.2013, 1376. ,
DOI : 10.1007/BF00344744
Pegasus, a workflow management system for science automation, Future Generation Computer Systems, vol.46, issue.C, pp.4617-4652, 2015. ,
DOI : 10.1016/j.future.2014.10.008
URL : https://manuscript.elsevier.com/S0167739X14002015/pdf/S0167739X14002015.pdf
Towards Measuring Anonymity, Proceedings of the 2Nd International Conference on Privacy Enhancing Technologies, PET'02, pp.54-68, 2003. ,
DOI : 10.1007/3-540-36467-6_5
Tor: The secondgeneration onion router, Proceedings of the 13th Conference on USENIX Security Symposium, pp.21-21, 2004. ,
DOI : 10.21236/ada465464
URL : http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA465464&Location=U2&doc=GetTRDoc.pdf
Differential Privacy, Automata, Languages and Programming, pp.1-12, 2006. ,
DOI : 10.1007/11787006_1
TaintDroid, OSDI, pp.1-6, 2010. ,
DOI : 10.1145/1629575.1629604
Location Privacy Protection for Smartphone Users, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, pp.239-250, 2014. ,
DOI : 10.1109/MWC.2012.6155874
Foursquare location intelligence for enterprise Available online at https ,
Available online at https ,
Redditor cracks anonymous data trove to pinpoint muslim cab drivers, 2015. ,
On the Optimal Placement of Mix Zones, PETS, pp.216-234, 2009. ,
DOI : 10.1007/978-3-642-03168-7_13
URL : http://infoscience.epfl.ch/record/138676/files/FreudigerSH09PETS.pdf?version=1
Next place prediction using mobility Markov chains, Proceedings of the First Workshop on Measurement, Privacy, and Mobility, MPM '12, pp.1-3 ,
DOI : 10.1145/2181196.2181199
URL : https://hal.archives-ouvertes.fr/hal-00736947
GEPETO: A GEoPrivacy-Enhancing TOolkit, 2010 IEEE 24th International Conference on Advanced Information Networking and Applications Workshops, pp.1071-1076, 2010. ,
DOI : 10.1109/WAINA.2010.170
URL : https://hal.archives-ouvertes.fr/inria-00556835
Show me how you move and I will tell you who you are, Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS, SPRINGL '10, pp.103-126, 2011. ,
DOI : 10.1145/1868470.1868479
URL : https://hal.archives-ouvertes.fr/hal-00660055
MapReducing GEPETO or Towards Conducting a Privacy Analysis on Millions of Mobility Traces, 2013 IEEE International Symposium on Parallel & Distributed Processing, Workshops and Phd Forum, pp.1937-1946, 2013. ,
DOI : 10.1109/IPDPSW.2013.180
URL : https://hal.archives-ouvertes.fr/hal-00911238
De-anonymization attack on geolocated data, Journal of Computer and System Sciences, vol.80, issue.8, pp.1597-1614, 2014. ,
DOI : 10.1016/j.jcss.2014.04.024
URL : https://hal.archives-ouvertes.fr/hal-01242268
Location Privacy in Mobile Systems: A Personalized Anonymization Model, 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05), pp.620-629, 2005. ,
DOI : 10.1109/ICDCS.2005.48
URL : http://www-static.cc.gatech.edu/~lingliu/papers/2005/2005-kanom.pdf
Private queries in location based services, Proceedings of the 2008 ACM SIGMOD international conference on Management of data , SIGMOD '08, 2008. ,
DOI : 10.1145/1376616.1376631
PRIVE, Proceedings of the 16th international conference on World Wide Web , WWW '07, pp.371-380, 2007. ,
DOI : 10.1145/1242572.1242623
Aircloak website Available online at https ,
On the Anonymity of Home/Work Location Pairs, PerCom, pp.390-397, 2009. ,
DOI : 10.1142/S0218488502001648
URL : http://crypto.stanford.edu/~pgolle/papers/commute.pdf
Google Vizier, Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining , KDD '17, pp.1487-1495, 2017. ,
DOI : 10.1109/JPROC.2015.2494218
URL : http://dl.acm.org/ft_gateway.cfm?id=3098043&type=pdf
Google maps geolocation api Available online at https://developers. google.com/maps ,
Google Maps website Available online at https://maps.google. com ,
Hiding mobile traffic fingerprints with GLOVE, Proceedings of the 11th ACM Conference on Emerging Networking Experiments and Technologies, CoNEXT '15, pp.1-26, 2015. ,
DOI : 10.1016/j.ins.2012.04.015
URL : https://hal.archives-ouvertes.fr/hal-01237032
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking, Proceedings of the 1st international conference on Mobile systems, applications and services, MobiSys '03, pp.31-42, 2003. ,
DOI : 10.1145/1066116.1189037
URL : http://systems.cs.colorado.edu/Papers/Generated/2003anonymousLbs.ps
Koi: A Location- Privacy Platform for Smartphone Apps, NSDI, pp.183-196 ,
Towards a practical deployment of privacy-preserving crowd-sensing tasks, Proceedings of the Posters & Demos Session on, Middleware Posters and Demos '14, pp.43-44, 2014. ,
DOI : 10.1145/2678508.2678530
URL : https://hal.archives-ouvertes.fr/hal-01095787
Dynamic Deployment of Sensing Experiments in the Wild Using Smartphones, 13th International IFIP Conference on Distributed Applications and Interoperable Systems, volume LNCS-7891 of DAIS '14, pp.43-56, 2013. ,
DOI : 10.1007/978-3-642-38541-4_4
URL : https://hal.archives-ouvertes.fr/hal-00804114
Project Lachesis: Parsing and Modeling Location Histories, Geographic Information Science, pp.106-124, 2004. ,
DOI : 10.1007/978-3-540-30231-5_8
URL : http://www.ics.uci.edu/~rharihar/publications/hariharan-giscience2004.pdf
Geospatial Services: A $1.6 Trillion Growth Engine for the U.S. Economy, 2012. ,
Mesos: A platform for finegrained resource sharing in the data center, Proceedings of the 8th USENIX Conference on Networked Systems Design and Implementation, NSDI'11, pp.295-308, 2011. ,
Protecting location privacy through path confusion, SECURECOMM, pp.194-205, 2005. ,
Preserving privacy in gps traces via uncertainty-aware path cloaking, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, pp.161-171, 2007. ,
DOI : 10.1145/1315245.1315266
Differential Privacy: An Economic Method for Choosing Epsilon, 2014 IEEE 27th Computer Security Foundations Symposium, pp.398-410, 2014. ,
DOI : 10.1109/CSF.2014.35
URL : http://ieeexplore.ieee.org:80/stamp/stamp.jsp?tp=&arnumber=6957125
Bubble rap, Proceedings of the 9th ACM international symposium on Mobile ad hoc networking and computing , MobiHoc '08, pp.241-250, 2008. ,
DOI : 10.1145/1374618.1374652
Zookeeper: Wait-free coordination for internet-scale systems, Proceedings of the 2010 USENIX Conference on USENIX Annual Technical Conference, USENIX- ATC'10, pp.1-14, 2010. ,
Trust no one, Proceedings of the second ACM SIGCOMM workshop on Networking, systems, and applications on mobile handhelds, MobiHeld '10, 2010. ,
DOI : 10.1145/1851322.1851336
Publishing trajectories with differential privacy guarantees, Proceedings of the 25th International Conference on Scientific and Statistical Database Management, SSDBM, pp.1-1212, 2013. ,
DOI : 10.1145/2484838.2484846
A dummy-based anonymization method based on user trajectory with pauses, Proceedings of the 20th International Conference on Advances in Geographic Information Systems, SIGSPATIAL '12, pp.249-258, 2012. ,
DOI : 10.1145/2424321.2424354
Protection of Location Privacy using Dummies for Location-based Services, 21st International Conference on Data Engineering Workshops (ICDEW'05), p.1248, 2005. ,
DOI : 10.1109/ICDE.2005.269
Optimization by Simulated Annealing, Science, vol.220, issue.4598, pp.671-680, 1983. ,
DOI : 10.1126/science.220.4598.671
URL : http://www.cs.virginia.edu/cs432/documents/sa-1983.pdf
Towards rich mobile phone datasets: Lausanne data collection campaign, ICPS, 2010. ,
Density-based clustering, Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, vol.28, issue.3, pp.231-240, 2011. ,
DOI : 10.1093/comjnl/28.1.82
Inference Attacks on Location Tracks, Proceedings of the 5th International Conference on Pervasive Computing, PERVASIVE'07, pp.127-143, 2007. ,
DOI : 10.1007/978-3-540-72037-9_8
URL : http://research.microsoft.com/en-us/um/people/jckrumm/publications 2007/inference attack refined distribute.pdf
A Survey of Computational Location Privacy. Personal and Ubiquitous Computing, pp.391-399, 2009. ,
DOI : 10.1007/s00779-008-0212-5
URL : http://www.research.microsoft.com/~jckrumm/Publications%202008/computational%20location%20privacy%20preprint.pdf
Realistic Driving Trips For Location Privacy, PerCom, pp.25-41, 2009. ,
DOI : 10.1080/01621459.1993.10476408
URL : http://www.research.microsoft.com/~jckrumm/Publications%202009/simtrip%20camera%20ready.pdf
Placer, Proceedings of the 2013 ACM international joint conference on Pervasive and ubiquitous computing, UbiComp '13, pp.163-172, 2013. ,
DOI : 10.1145/2493432.2493504
From big smartphone data to worldwide research: The mobile data challenge, Pervasive Mob. Comput, vol.9, issue.6, pp.752-771, 2013. ,
Splay: Distributed systems evaluation made simple (or how to turn ideas into live systems in a breeze), Proceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation, NSDI'09, pp.185-198, 2009. ,
SNAP Datasets: Stanford large network dataset collection Available online at http://snap, 2014. ,
DPSynthesizer, Proceeding of the VLDB Endowment, pp.1677-1680, 2014. ,
DOI : 10.14778/2733004.2733059
URL : http://europepmc.org/articles/pmc4496798?pdf=render
Differentially private grids for geospatial data, Proceedings of the 2013 IEEE International Conference on Data Engineering (ICDE 2013), ICDE '13, pp.757-768, 2013. ,
A Survey of Data-Intensive Scientific Workflow Management, Journal of Grid Computing, vol.1, issue.Webserver-Issue, pp.457-493, 2015. ,
DOI : 10.1109/SERVICES-1.2008.79
URL : https://hal.archives-ouvertes.fr/lirmm-01144760
Xiaolin Li, and Yuguang Fang. Trafficaware multiple mix zone placement for protecting location privacy, INFOCOM, pp.972-980, 2012. ,
Generating private synthetic databases for untrusted system evaluation, 2014 IEEE 30th International Conference on Data Engineering, pp.652-663, 2014. ,
DOI : 10.1109/ICDE.2014.6816689
Johannes Gehrke, and Muthuramakrishnan Venkitasubramaniam. l-diversity: Privacy Beyond k-anonymity, ACM Transactions on Knowledge Discovery from Data, vol.1, issue.1, 2007. ,
Some methods for classification and analysis of multivariate observations, Proceedings of the Fifth Berkeley Symposium on Mathematical Statistics and Probability, pp.281-297, 1967. ,
Privacy in geo-social networks: proximity notification with untrusted service providers and curious buddies, The VLDB Journal, vol.29, issue.2, pp.541-566, 2011. ,
DOI : 10.1145/335191.335427
URL : http://arxiv.org/pdf/1007.0408
How simulated annealing works Available online at https://fr. mathworks.com/help/gads/how-simulated-annealing-works ,
Available online at https ,
Mechanism Design via Differential Privacy, 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07), pp.94-103, 2007. ,
DOI : 10.1109/FOCS.2007.66
Privacy integrated queries: An extensible platform for privacy-preserving data analysis, Proceedings of the 2009 ACM SIGMOD International Conference on Management of Data, SIGMOD '09, pp.19-30, 2009. ,
An Empirical Study of Location Truncation on Android, MOST, pp.1-10, 2013. ,
DP-WHERE: Differentially private modeling of human mobility, Proceedings of the 2013 IEEE International Conference on Big Data, BigData '13, pp.580-588, 2013. ,
Nericell: Rich monitoring of road and traffic conditions using mobile smartphones, Proceedings of the 6th ACM Conference on Embedded Network Sensor Systems, SenSys '08, pp.323-336, 2008. ,
The New Casper: Query Processing for Location Services Without Compromising Privacy, VLDB, pp.763-774, 2006. ,
PeerSim: A scalable P2P simulator, 2009 IEEE Ninth International Conference on Peer-to-Peer Computing, pp.99-100, 2009. ,
DOI : 10.1109/P2P.2009.5284506
URL : http://www.inf.u-szeged.hu/~jelasity/cikkek/p2p09.pdf
Trust management and reputation systems in mobile participatory sensing applications: A survey, Computer Networks, vol.90, issue.C, pp.9049-73, 2015. ,
DOI : 10.1016/j.comnet.2015.07.011
URL : https://hal.archives-ouvertes.fr/hal-01265403
PEIR, the personal environmental impact report, as a platform for participatory sensing systems research, Proceedings of the 7th international conference on Mobile systems, applications, and services, Mobisys '09, pp.55-68, 2009. ,
DOI : 10.1145/1555816.1555823
URL : http://research.cens.ucla.edu/people/estrin/resources/conferences/2009-jun-Mun-Sheddy-PEIR.pdf
Robust De-anonymization of Large Sparse Datasets, 2008 IEEE Symposium on Security and Privacy (sp 2008), pp.111-125, 2008. ,
DOI : 10.1109/SP.2008.33
Towards trajectory anonymization: A generalization-based approach, SIGSPATIAL Workshops, pp.52-61, 2008. ,
Location Privacy via Differential Private Perturbation of Cloaking Area, 2015 IEEE 28th Computer Security Foundations Symposium, pp.63-74, 2015. ,
DOI : 10.1109/CSF.2015.12
Mining User Mobility Features for Next Place Prediction in Location-Based Services, 2012 IEEE 12th International Conference on Data Mining, pp.1038-1043, 2012. ,
DOI : 10.1109/ICDM.2012.113
URL : http://www.cl.cam.ac.uk/~cm542/papers/icdm2012.pdf
Available online at https ,
MobiMix: Protecting location privacy with mix-zones over road networks, 2011 IEEE 27th International Conference on Data Engineering, pp.494-505, 2011. ,
DOI : 10.1109/ICDE.2011.5767898
URL : http://www-static.cc.gatech.edu/%7Elingliu/papers/2011/MobiMix-icde2011.pdf
On the Limitations of Query Obfuscation Techniques for Location Privacy, UbiComp, pp.187-196, 2011. ,
Aris Gkoulalas-Divanis, Marios Vodas, Despina Kopanaki, and Yannis Theodoridis. Privacy-aware Querying over Sensitive Trajectory Data, CIKM, pp.895-904, 2011. ,
PEAS: Private, Efficient and Accurate Web Search, 2015 IEEE Trustcom/BigDataSE/ISPA, pp.571-580, 2015. ,
DOI : 10.1109/Trustcom.2015.421
URL : https://hal.archives-ouvertes.fr/hal-01159179
Zerosquare: A Privacy-Friendly Location Hub for Geosocial Applications, MOST, 2013. ,
CAP: A Context-Aware Privacy Protection System for Location-Based Services, 2009 29th IEEE International Conference on Distributed Computing Systems, pp.49-57, 2009. ,
DOI : 10.1109/ICDCS.2009.62
URL : https://uta-ir.tdl.org/uta-ir/bitstream/10106/1045/1/umi-uta-2150.pdf
CRAWDAD data set epfl/mobility (v. 2009-02-24) Downloaded from http ,
Available online at http://pleaserobme ,
Privacy and accountability for location-based aggregate statistics, Proceedings of the 18th ACM conference on Computer and communications security, CCS '11, pp.653-666, 2011. ,
DOI : 10.1145/2046707.2046781
URL : http://dspace.mit.edu/bitstream/1721.1/73157/1/Balakrishnan-Privacy%20and%20accountability.pdf
Accio: A location privacy framework ? Source code Available online at https://github ,
Adaptive Location Privacy with ALP ? Source code Available online at https://github ,
DOI : 10.1109/srds.2016.044
URL : http://arxiv.org/pdf/1609.07349
Privacy-Preserving Publication of Mobility Data with High Utility, 2015 IEEE 35th International Conference on Distributed Computing Systems, pp.802-803, 2015. ,
DOI : 10.1109/ICDCS.2015.117
URL : https://hal.archives-ouvertes.fr/hal-01159291
Differentially Private Location Privacy in Practice, Proceedings of the 3rd Workshop on Mobile Security Technologies, p.14, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-01148230
Time Distortion Anonymization for the Publication of Mobility Data with High Utility, 2015 IEEE Trustcom/BigDataSE/ISPA, pp.539-546, 2015. ,
DOI : 10.1109/Trustcom.2015.417
URL : https://hal.archives-ouvertes.fr/hal-01170060
Adaptive Location Privacy with ALP, 2016 IEEE 35th Symposium on Reliable Distributed Systems (SRDS), pp.269-278, 2016. ,
DOI : 10.1109/SRDS.2016.044
URL : https://hal.archives-ouvertes.fr/hal-01370447
Priva'Mov project's website ,
SpotME If You Can: Randomized Responses for Location Obfuscation on Mobile Phones, 2011 31st International Conference on Distributed Computing Systems, pp.363-372, 2011. ,
DOI : 10.1109/ICDCS.2011.79
URL : http://www.cl.cam.ac.uk/%7Ecm542/papers/icdcs2011.pdf
Differentially-private release of check-in data for venue recommendation, 2014 IEEE International Conference on Pervasive Computing and Communications (PerCom), pp.190-198, 2014. ,
DOI : 10.1109/PerCom.2014.6813960
URL : http://homes.di.unimi.it/~riboni/14-percom.pdf
Far out: Predicting long-term human mobility, Proceedings of the Twenty-Sixth AAAI Conference on Artificial Intelligence, AAAI'12, pp.814-820, 2012. ,
Privately querying location-based services with SybilQuery, Proceedings of the 11th international conference on Ubiquitous computing, Ubicomp '09, pp.31-40, 2009. ,
DOI : 10.1145/1620545.1620550
URL : http://www.cs.rutgers.edu/~vinodg/papers/ubicomp2009/ubicomp2009.pdf
An Automated Social Graph De-anonymization Technique, Proceedings of the 13th Workshop on Privacy in the Electronic Society, WPES '14, pp.47-58, 2014. ,
DOI : 10.1145/2068816.2068825
URL : http://arxiv.org/pdf/1408.1276
Privacy protection for users of location-based services, IEEE Wireless Communications, vol.19, issue.1, pp.30-39, 2012. ,
A distortion-based metric for location privacy, Proceedings of the 8th ACM workshop on Privacy in the electronic society, WPES '09, pp.21-30, 2009. ,
DOI : 10.1145/1655188.1655192
URL : http://infoscience.epfl.ch/record/140461/files/wpes021-shokri.pdf
Quantifying Location Privacy, 2011 IEEE Symposium on Security and Privacy, pp.247-262, 2011. ,
DOI : 10.1109/SP.2011.18
URL : https://hal.archives-ouvertes.fr/hal-01266229
Practical bayesian optimization of machine learning algorithms, Proceedings of the 25th International Conference on Neural Information Processing Systems, NIPS'12, pp.2951-2959 ,
Practical Mathematical Optimization: An Introduction to Basic Optimization Theory and Classical and New Gradient-Ba sed Algorithms Applied Optimization, 2005. ,
DOI : 10.1007/978-3-319-77586-9
Transportation mode detection using mobile phones and GIS information, Proceedings of the 19th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, GIS '11, pp.54-63, 2011. ,
DOI : 10.1145/2093973.2093982
URL : http://cs.uic.edu/%7Eboxu/mp2p/acmgis11-mode-detection.pdf
Mobile systems location privacy: “MobiPriv” a robust k anonymous system, 2010 IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications, pp.54-63, 2010. ,
DOI : 10.1109/WIMOB.2010.5645011
k-ANONYMITY: A MODEL FOR PROTECTING PRIVACY, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol.2, issue.3, pp.557-570, 2002. ,
DOI : 10.1109/RISP.1993.287632
Privacy preservation in the dissemination of location data, ACM SIGKDD Explorations Newsletter, vol.13, issue.1, pp.6-18, 2011. ,
DOI : 10.1145/2031331.2031334
Distributed computing in practice: the condor experience. Concurrency -Practice and Experience, pp.323-356, 2005. ,
DOI : 10.1002/cpe.938
URL : http://www.cs.wisc.edu/~thain/library/condor-practice.pdf
Riding with the stars: Passenger privacy in the nyc taxicab dataset. https://research.neustar.biz/2014/09/15/ riding-with-the-stars-passenger-privacy-in-the-nyc-taxicab-dataset, 2014. ,
EUR-Lex ? directive 95/46/ec Available online at http: //eur-lex.europa, pp.31995-32041, 1995. ,
Waze website Available online at https ,
A classification of location privacy attacks and approaches, Personal and Ubiquitous Computing, vol.13, issue.2, pp.163-175, 2014. ,
DOI : 10.1007/s10707-008-0047-2
Swift: A language for distributed parallel scripting, Parallel Computing, vol.37, issue.9, pp.633-652, 2011. ,
DOI : 10.1016/j.parco.2011.05.005
URL : http://www.mcs.anl.gov/uploads/cels/papers/P1818.pdf
Protecting Locations with Differential Privacy under Temporal Correlations, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS '15, pp.1298-1309, 2015. ,
DOI : 10.1126/science.1177170
URL : http://arxiv.org/pdf/1410.5919
Available online at https://mobile. yahoo.com/weather ,
Protocols for secure computations, Proceedings of the 23rd Annual Symposium on Foundations of Computer Science, SFCS '82, pp.160-164, 1982. ,
Yelp website Available online at https ,
Protecting moving trajectories with dummies, Proceedings of the 2007 International Conference on Mobile Data Management, MDM '07, pp.278-282, 2007. ,
Driving with knowledge from the physical world, Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining, KDD '11, pp.316-324, 2011. ,
DOI : 10.1145/2020408.2020462
URL : http://research.microsoft.com/pubs/148894/Driving with Knowledge from the Physical World-kdd11.pdf
T-drive, Proceedings of the 18th SIGSPATIAL International Conference on Advances in Geographic Information Systems, GIS '10, pp.99-108, 2010. ,
DOI : 10.1145/1869790.1869807
Anonymization of location data does not work, Proceedings of the 17th annual international conference on Mobile computing and networking, MobiCom '11, pp.145-156, 2011. ,
DOI : 10.1145/2030613.2030630
Learning transportation mode from raw gps data for geographic applications on the web, Proceeding of the 17th international conference on World Wide Web , WWW '08, pp.247-256, 2008. ,
DOI : 10.1145/1367497.1367532
URL : http://www.ra.ethz.ch/CDstore/www2008/www2008.org/papers/pdf/p247-zhengA.pdf
Mining interesting locations and travel sequences from GPS trajectories, Proceedings of the 18th international conference on World wide web, WWW '09, pp.791-800, 2009. ,
DOI : 10.1145/1526709.1526816
URL : http://www2009.eprints.org/80/1/p791.pdf
Three Protocols for Location Privacy, Proceedings of the 7th International Conference on Privacy Enhancing Technologies, PET'07, pp.62-76, 2007. ,
Discovering personal gazetteers, Proceedings of the 12th annual ACM international workshop on Geographic information systems , GIS '04, pp.266-273, 2004. ,
DOI : 10.1145/1032222.1032261