Private queries in location based services: anonymizers are not necessary G Ghinita, P Kalnis, A Khoshgozaran, C Shahabi, KL Tan Proceedings of the 2008 ACM SIGMOD international conference on Management of …, 2008 | 1082 | 2008 |
Preventing location-based identity inference in anonymous spatial queries P Kalnis, G Ghinita, K Mouratidis, D Papadias IEEE transactions on knowledge and data engineering 19 (12), 1719-1733, 2007 | 938 | 2007 |
PRIVE: anonymous location-based queries in distributed mobile systems G Ghinita, P Kalnis, S Skiadopoulos Proceedings of the 16th international conference on World Wide Web, 371-380, 2007 | 590 | 2007 |
A framework for protecting worker location privacy in spatial crowdsourcing H To, G Ghinita, C Shahabi Proceedings of the VLDB Endowment 7 (10), 919-930, 2014 | 431 | 2014 |
Fast data anonymization with low information loss G Ghinita, P Karras, P Kalnis, N Mamoulis Proceedings of the 33rd international conference on Very large data bases …, 2007 | 428 | 2007 |
On the anonymization of sparse high-dimensional data G Ghinita, Y Tao, P Kalnis 2008 IEEE 24th International Conference on Data Engineering, 715-724, 2008 | 271 | 2008 |
MobiHide: A Mobilea Peer-to-Peer System for Anonymous Location-Based Queries G Ghinita, P Kalnis, S Skiadopoulos International Symposium on Spatial and Temporal Databases, 221-238, 2007 | 267 | 2007 |
Private record matching using differential privacy A Inan, M Kantarcioglu, G Ghinita, E Bertino Proceedings of the 13th International Conference on Extending Database …, 2010 | 217 | 2010 |
Preventing velocity-based linkage attacks in location-aware applications G Ghinita, ML Damiani, C Silvestri, E Bertino Proceedings of the 17th ACM SIGSPATIAL international conference on advances …, 2009 | 171 | 2009 |
Differentially private location protection for worker datasets in spatial crowdsourcing H To, G Ghinita, L Fan, C Shahabi IEEE Transactions on Mobile Computing 16 (4), 934-949, 2016 | 157 | 2016 |
Enabling search services on outsourced private spatial data ML Yiu, G Ghinita, CS Jensen, P Kalnis The VLDB Journal 19, 363-384, 2010 | 151 | 2010 |
Access control for databases: Concepts and systems E Bertino, G Ghinita, A Kamra Foundations and Trends® in Databases 3 (1–2), 1-148, 2011 | 134 | 2011 |
Anonymous publication of sensitive transactional data G Ghinita, P Kalnis, Y Tao IEEE Transactions on Knowledge and Data Engineering 23 (2), 161-174, 2010 | 134 | 2010 |
A framework for efficient data anonymization under privacy and accuracy constraints G Ghinita, P Karras, P Kalnis, N Mamoulis ACM Transactions on Database Systems (TODS) 34 (2), 1-47, 2009 | 127 | 2009 |
Large-scale frequent subgraph mining in mapreduce W Lin, X Xiao, G Ghinita 2014 IEEE 30th International Conference on Data Engineering, 844-855, 2014 | 123 | 2014 |
Privacy for location-based services G Ghinita Morgan & Claypool Publishers, 2013 | 110 | 2013 |
Secure knn query processing in untrusted cloud environments S Choi, G Ghinita, HS Lim, E Bertino IEEE Transactions on Knowledge and Data Engineering 26 (11), 2818-2831, 2014 | 107 | 2014 |
A reciprocal framework for spatial k-anonymity G Ghinita, K Zhao, D Papadias, P Kalnis Information Systems 35 (3), 299-314, 2010 | 106 | 2010 |
A lightweight secure scheme for detecting provenance forgery and packet dropattacks in wireless sensor networks S Sultana, G Ghinita, E Bertino, M Shehab IEEE transactions on dependable and secure computing 12 (3), 256-269, 2013 | 104 | 2013 |
A privacy-enhancing content-based publish/subscribe system using scalar product preserving transformations S Choi, G Ghinita, E Bertino Database and Expert Systems Applications: 21st International Conference …, 2010 | 91 | 2010 |