Articles with "user location" as a keyword



Photo by dtopkin1 from unsplash

T-SR: A Location Privacy Protection Algorithm Based on POI Query

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Access"

DOI: 10.1109/access.2019.2913547

Abstract: With the popularity of location-based services in the field of mobile network applications, users enjoy the convenience on one side, they may face the risk of privacy disclosure on the other side. Attackers can easily… read more here.

Keywords: location privacy; privacy protection; location; user location ... See more keywords
Photo by m_simpsan from unsplash

Hall of Mirrors: A novel strategy to address locality in geocoded-based PoI private queries

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3180046

Abstract: Location privacy techniques try to protect user’s information by altering, aggregating or generalizing it. Geographical codification techniques, like Geohash, can be used to protect individual locations altering the precision of the location so it represents… read more here.

Keywords: location; locality; hall mirrors; user location ... See more keywords
Photo by sarahdorweiler from unsplash

How Well Can a User’s Location Privacy Preferences be Determined Without Using GPS Location Data?

Sign Up to like & get
recommendations!
Published in 2017 at "IEEE Transactions on Emerging Topics in Computing"

DOI: 10.1109/tetc.2014.2335537

Abstract: The recent proliferation of GPS-enabled mobile phones has allowed people to share their current locations with others. Because disclosing one’s location can be valuable but risky, many services and studies employ a user’s GPS coordinates… read more here.

Keywords: location; well user; privacy preferences; privacy ... See more keywords