2018
DOI: 10.1109/access.2018.2805464
|View full text |Cite
|
Sign up to set email alerts
|

Cognitive Approach for Location Privacy Protection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
25
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
6
4

Relationship

2
8

Authors

Journals

citations
Cited by 34 publications
(25 citation statements)
references
References 45 publications
0
25
0
Order By: Relevance
“…Nowadays, large shopping malls, supermarkets, and small retail stores offer a wide variety of goods for consumers to choose, which brings rich and convenient shopping experience to people and greatly stimulates and promotes the speed of social development. At present, the operation mode often adopted in the retail market is storekeeper self-operation, consumer self-selection, single duty, and long hours business, and convenience stores can bring convenient and timely shopping experience to consumers and improve the efficiency of life services [ 1 ]. At the beginning, barcode technology was mainly used to identify commodities.…”
Section: Introductionmentioning
confidence: 99%
“…Nowadays, large shopping malls, supermarkets, and small retail stores offer a wide variety of goods for consumers to choose, which brings rich and convenient shopping experience to people and greatly stimulates and promotes the speed of social development. At present, the operation mode often adopted in the retail market is storekeeper self-operation, consumer self-selection, single duty, and long hours business, and convenience stores can bring convenient and timely shopping experience to consumers and improve the efficiency of life services [ 1 ]. At the beginning, barcode technology was mainly used to identify commodities.…”
Section: Introductionmentioning
confidence: 99%
“…If that condition holds, the mobile user will change his/her identity with that user's identity and vice versa. Another method to protect personal identity in social distancing scenarios is individual information privacy protection through indirect-or proxy-request as proposed in [143]. In particular, instead of directly submitting a request to the server, a mobile user can have his/her social friends through the available social network resources, i.e., trusted social media, to distribute his/her request anonymously to the server.…”
Section: ) Personal Identity Protectionmentioning
confidence: 99%
“…Most recently, considering the data from both the cyber-physical world and online social networks, Refs. [35][36][37] proposed methods to provide a comprehensive solution to the problem of influence maximization.…”
Section: Influence Maximization Problemmentioning
confidence: 99%