2020
DOI: 10.3390/math8020262
|View full text |Cite
|
Sign up to set email alerts
|

Mobile User Location Inference Attacks Fusing with Multiple Background Knowledge in Location-Based Social Networks

Abstract: Location-based social networks have been widely used. However, due to the lack of effective and safe data management, a large number of privacy disclosures commonly occur. Thus, academia and industry have needed to focus more on location privacy protection. This paper proposes a novel location attack method using multiple background options to infer the hidden locations of mobile users. In order to estimate the possibility of a hidden position being visited by a user, two hidden location attack models are prop… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 32 publications
0
3
0
Order By: Relevance
“… 49 Keeping data information and IM equipment safe can ensure the safety of personnel in all links. 50 Based on advanced technology and methods to effectively detect products, a reliable IM system is established. 51 It has established a perfect index system and mature evaluation standards and has a stable development implementation strategy.…”
Section: Results and Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“… 49 Keeping data information and IM equipment safe can ensure the safety of personnel in all links. 50 Based on advanced technology and methods to effectively detect products, a reliable IM system is established. 51 It has established a perfect index system and mature evaluation standards and has a stable development implementation strategy.…”
Section: Results and Discussionmentioning
confidence: 99%
“…Safety, reliability, and stability, as the basic elements of the development system of IM, are also the basis for evaluating the development level of IM of NEVs . Keeping data information and IM equipment safe can ensure the safety of personnel in all links . Based on advanced technology and methods to effectively detect products, a reliable IM system is established .…”
Section: Results and Discussionmentioning
confidence: 99%
“…(3) In the data publishing stage, attackers could infer the users' real information in different ways. The common methods include linkage attack [15,16] and background knowledge attack [15,17].…”
Section: Introductionmentioning
confidence: 99%