Results 11 to 20 of about 241,786 (281)

The K-Anonymous Dummy Location Selection Algorithm Based on Historical Query Probability [PDF]

open access: yesJisuanji gongcheng, 2022
The dummy-based location privacy mechanism using historical query probability suffers from low anonymity, small coverage area and imbalanced location distribution.To address the problem, a K-anonymous dummy-based locationselection algorithm is proposed ...
YANG Yang, HU Xiaohui, DU Yongwen
doaj   +1 more source

Double Dummy Location Selection Algorithm Based on Behavior Correlation [PDF]

open access: yesJisuanji kexue, 2023
At present,most of the dummy location privacy protection methods do not fully consider that the attacker may have the background knowledge about the information,which user requested from the service last time,so it cannot effectively resist the ...
TU Sipan, ZHANG Lin, LIU Xiping
doaj   +1 more source

Multi-attribute Decision-making Method for Secure Anonymous Set Construction [PDF]

open access: yesJisuanji gongcheng, 2023
The traditional privacy protection scheme for constructing anonymous sets using dummy location generation technology does not consider comprehensive factors. This results in low differentiation and poor rationality of the final generated dummy locations,
Zhanwei HOU, Xin YANG, Zihao SHEN, Hui WANG, Peiqian LIU
doaj   +1 more source

Efficient Dummy Generation for Protecting Location Privacy

open access: yesThe Journal of Korea Institute of Information Electronics and Communication Technology, 2016
Tian-Yuan Cai   +5 more
exaly   +3 more sources

Location Privacy-Preserving Scheme in IoBT Networks Using Deception-Based Techniques

open access: yesSensors, 2023
The Internet of Battlefield Things (IoBT) refers to interconnected battlefield equipment/sources for synchronized automated decision making. Due to difficulties unique to the battlefield, such as a lack of infrastructure, the heterogeneity of equipment ...
Basmh Alkanjr, Imad Mahgoub
doaj   +1 more source

How watching Pinocchio movies changes our subjective experience of extrapersonal space [PDF]

open access: yes, 2015
The way we experience the space around us is highly subjective. It has been shown that motion potentialities that are intrinsic to our body influence our space categorization.
Brass, Marcel   +4 more
core   +17 more sources

A Vehicle Trajectory Privacy Preservation Method Based on Caching and Dummy Locations in the Internet of Vehicles

open access: yesSensors, 2022
In the internet of vehicles (IoVs), vehicle users should provide location information continuously when they want to acquire continuous location-based services (LBS), which may disclose the vehicle trajectory privacy.
Qianyong Huang   +3 more
doaj   +1 more source

Constructing dummy query sequences to protect location privacy and query privacy in location-based services [PDF]

open access: yesWorld Wide Web, 2020
Location-based services (LBS) have become an important part of people’s daily life. However, while providing great convenience for mobile users, LBS result in a serious problem on personal privacy, i.e., location privacy and query privacy. However, existing privacy methods for LBS generally take into consideration only location privacy or query privacy,
Zongda Wu   +5 more
openaire   +1 more source

Multi-factor Dummy Location Selection Algorithm in Location-based Service [PDF]

open access: yesJisuanji kexue
In view of the existing dummy location selection methods in LBS snapshot location privacy protection,the background knowledge attack caused by the time factor of the location itself is ignored,and the sensitive locations are treated equally.Based on this,
LI Yongjun, ZHU Yuefei, WU Wei, BAI Lifang
doaj   +1 more source

RcDT: Privacy Preservation Based on R-Constrained Dummy Trajectory in Mobile Social Networks

open access: yesIEEE Access, 2019
The boom of mobile devices and location-based services (LBSs) greatly enriches the mobile social network (MSN) applications, which bring convenience to our daily life and, meanwhile, raise serious privacy concerns due to the potential disclosure risk of ...
Jinquan Zhang   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy