Sciweavers

GIS
2009
ACM
13 years 9 months ago
Distortion-based anonymity for continuous queries in location-based mobile services
Privacy preservation has recently received considerable attention for location-based mobile services. Various location cloaking approaches have been proposed to protect the locati...
Xiao Pan, Xiaofeng Meng, Jianliang Xu
WISEC
2010
ACM
13 years 9 months ago
Preventing multi-query attack in location-based services
Despite increasing popularity, Location-based Services (LBS) (e.g., searching nearby points-of-interest on map) on mobile handheld devices have been subject to major privacy conce...
Nilothpal Talukder, Sheikh Iqbal Ahamed
TPDS
2010
256views more  TPDS 2010»
13 years 9 months ago
Privacy-Conscious Location-Based Queries in Mobile Environments
— In location-based services, users with location-aware mobile devices are able to make queries about their surroundings anywhere and at any time. While this ubiquitous computing...
Jianliang Xu, Xueyan Tang, Haibo Hu, Jing Du
SIAMAM
2010
120views more  SIAMAM 2010»
13 years 9 months ago
On Acoustic Cloaking Devices by Transformation Media and Their Simulation
By transformation optics, we construct and investigate three-dimensional acoustic cloaking devices for which the device itself and the cloaked region can be mapped into two nested ...
Ulrich Hetmaniuk, Hongyu Liu
AIRWEB
2005
Springer
14 years 5 months ago
Cloaking and Redirection: A Preliminary Study
Cloaking and redirection are two possible search engine spamming techniques. In order to understand cloaking and redirection on the Web, we downloaded two sets of Web pages while ...
Baoning Wu, Brian D. Davison
DASFAA
2007
IEEE
195views Database» more  DASFAA 2007»
14 years 5 months ago
Quality Aware Privacy Protection for Location-Based Services
Protection of users’ privacy has been a central issue for location-based services (LBSs). In this paper, we classify two kinds of privacy protection requirements in LBS: location...
Zhen Xiao, Xiaofeng Meng, Jianliang Xu