Privacy-Preserving Trajectory Data Publishing by Dynamic Anonymization with Bounded Distortion [PDF]
Publication of trajectory data that contain rich information of vehicles in the dimensions of time and space (location) enables online monitoring and supervision of vehicles in motion and offline traffic analysis for various management tasks. However, it
Songyuan Li +3 more
doaj +7 more sources
A trajectory data publishing algorithm satisfying local suppression [PDF]
Suppressing the trajectory data to be released can effectively reduce the risk of user privacy leakage. However, the global suppression of the data set to meet the traditional privacy model method reduces the availability of trajectory data.
Xiaohui Li +3 more
doaj +3 more sources
KSDP scheme for trajectory data publishing [PDF]
For clustering applications in the field of trajectory privacy protection, the k-means algorithm is sensitive to initial values and the number of clusters may be somewhat arbitrary.
ZHANG Jun +4 more
doaj +3 more sources
Experiments and Analyses of Anonymization Mechanisms for Trajectory Data Publishing. [PDF]
With the advancing of location-detection technologies and the increasing popularity of mobile phones and other location-aware devices, trajectory data is continuously growing. While large-scale trajectories provide opportunities for various applications, the locations in trajectories pose a threat to individual privacy.
Sun S +5 more
europepmc +7 more sources
Risk-Aware Individual Trajectory Data Publishing With Differential Privacy [PDF]
Large-scale spatiotemporal data mining has created valuable insights into managing key areas of society and the economy. It has encouraged data owners to release/publish trajectory datasets. However, the ill-informed publication of such valuable datasets
Jianzhe Zhao +4 more
doaj +3 more sources
Sensitive attribute privacy preservation of trajectory data publishing based on l-diversity. [PDF]
The widely application of positioning technology has made collecting the movement of people feasible for knowledge-based decision. Data in its original form often contain sensitive attributes and publishing such data will leak individuals' privacy. Especially, a privacy threat occurs when an attacker can link a record to a specific individual based on ...
Yao L, Chen Z, Hu H, Wu G, Wu B.
europepmc +6 more sources
Privacy and Utility Preserving Trajectory Data Publishing for Intelligent Transportation Systems [PDF]
Nowadays, the extensive collection and storage of massive personal GPS data in intelligent transportation systems every day provide great convenience for trajectory data analysis and mining research, thus bringing valuable information for real-life ...
Xiangwen Liu, Yuquan Zhu
doaj +3 more sources
Privacy risks in trajectory data publishing: reconstructing private trajectories from continuous properties [PDF]
Location and time information about individuals can be captured through GPS devices, GSM phones, RFID tag readers, and by other similar means. Such data can be pre-processed to obtain trajectories which are sequences of spatio-temporal data points ...
Kaplan, Emre +5 more
core +4 more sources
Trajectory privacy data publishing scheme based on local optimisation and R-tree [PDF]
The proliferation of location-based service applications has led to a substantial surge in the amount of life trajectory data produced by mobile devices. And these data frequently contain confidential personal details.
Peiqian Liu +3 more
doaj +2 more sources
A Survey and Experimental Study on Privacy-Preserving Trajectory Data Publishing [PDF]
<div>Trajectory data has become ubiquitous nowadays, which can benefit various real-world applications such as traffic management and location-based services. However, trajectories may disclose highly sensitive information of an individual including mobility patterns, personal profiles and gazetteers, social relationships, etc, making it ...
Fengmei Jin +5 more
+6 more sources

