2023
DOI: 10.1016/j.conengprac.2023.105456
|View full text |Cite
|
Sign up to set email alerts
|

Privacy protection control for mobile apps users

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 49 publications
(69 reference statements)
0
2
0
Order By: Relevance
“…Proposition 2: Given l * N as in (10) and denoting by S the solution set of ( 9), the following claim holds: i) If l N = l * N , i.e, if the actual location at time t is equal to the centroid of the previous N − 1 transmitted locations, then the solution set of ( 9) is…”
Section: B Optimal Obfuscated Locationmentioning
confidence: 99%
See 1 more Smart Citation
“…Proposition 2: Given l * N as in (10) and denoting by S the solution set of ( 9), the following claim holds: i) If l N = l * N , i.e, if the actual location at time t is equal to the centroid of the previous N − 1 transmitted locations, then the solution set of ( 9) is…”
Section: B Optimal Obfuscated Locationmentioning
confidence: 99%
“…This work tackles the privacy protection challenge with a dynamic system's perspective. Privacy control with a reactive PI controller [10] allows for protection with negligible computing overhead; however, with limited precision and slow reaction. Model Predictive Control significantly improves privacy performances [11], but requires the knowledge of future locations and has a high computing cost.…”
Section: Introductionmentioning
confidence: 99%
“…In the process of campus informatization, information is silently spreading to all aspects of students' learning and life, and everyone is active in the information campus as information data [9][10]. At the same time, students who rely on information data in performing any activity put a large amount of their information data in the information campus [11][12]. There is not only subtle chatting information and social software information in study and life, but even students' personal identity information, personal property information, personal health information and other personal privacy information [13][14].…”
Section: Introductionmentioning
confidence: 99%