2022
DOI: 10.1016/j.comnet.2022.109340
|View full text |Cite
|
Sign up to set email alerts
|

Area coverage-based worker recruitment under geo-indistinguishability

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 31 publications
0
4
0
Order By: Relevance
“…Geo-I has gained significant attention in various LBS applications due to its ability to protect location privacy. In mobile crowdsourcing, where workers must share their locations with mobile crowdsourcing servers to allocate sensing tasks to the nearest workers, Geo-I is employed to obfuscate workers' true locations, thereby protecting their location privacy [26][27][28][29]. Location-based social networking platforms assist people in connecting with each other, but they also pose a threat to location privacy.…”
Section: Geo-indistinguishability and Its Applicationsmentioning
confidence: 99%
See 3 more Smart Citations
“…Geo-I has gained significant attention in various LBS applications due to its ability to protect location privacy. In mobile crowdsourcing, where workers must share their locations with mobile crowdsourcing servers to allocate sensing tasks to the nearest workers, Geo-I is employed to obfuscate workers' true locations, thereby protecting their location privacy [26][27][28][29]. Location-based social networking platforms assist people in connecting with each other, but they also pose a threat to location privacy.…”
Section: Geo-indistinguishability and Its Applicationsmentioning
confidence: 99%
“…In this paper, we introduce a novel perturbation mechanism to achieve -Geo-I that can be efficiently applied to vectors represented in a high-dimensional space. The proposed method is inspired by the perturbation mechanism in [29]. However, unlike the mechanism in [29], which does not use prior data distribution, our approach utilizes a prior data distribution to generate perturbed data with higher utility, similar to the optimization mechanism.…”
Section: Computation Of Obfuscation Matrixmentioning
confidence: 99%
See 2 more Smart Citations