An Adaptive Window Size Selection Method for Differentially Private Data Publishing over Infinite Trajectory Stream [PDF]
Recently, various services based on user's location are emerging since the development of wireless Internet and sensor technology. VANET (vehicular ad hoc network), in which a large number of vehicles communicate using wireless communication, is also ...
Geonhyoung Jo, Kangsoo Jung, Seog Park
doaj +2 more sources
Trajectory Data Publishing Scheme Based on Transformer Decoder and Differential Privacy [PDF]
The proliferation of Location-Based Services (LBSs) has generated vast trajectory datasets that offer immense analytical value but pose critical privacy risks. Achieving an optimal balance between data utility and privacy preservation remains a challenge,
Haiyong Wang, Wei Huang
doaj +2 more sources
Privacy-preserving trajectory data publishing by local suppression [PDF]
The pervasiveness of location-aware devices has spawned extensive research in trajectory data mining, resulting in many important real-life applications. Yet, the privacy issue in sharing trajectory data among different parties often creates an obstacle for effective data mining.
Chen, Rui +4 more
openaire +5 more sources
Secure Data Publishing of Private Trajectory in Edge Computing of IoT [PDF]
Secure data publishing of private trajectory is a typical application scene in the Internet of Things (IoT). Protecting users’ privacy while publishing data has always been a long-term challenge. In recent years, the mainstream method is to combine the Markov model and differential privacy (DP) mechanism to build a private trajectory generation model ...
Xinyao Liu +4 more
openalex +2 more sources
Privacy preserving semantic trajectory data publishing for mobile location-based services [PDF]
Abstract The development of wireless technologies and the popularity of mobile devices is responsible for generating large amounts of trajectory data for moving objects. Trajectory datasets have spatiotemporal features and are a rich information source.
Rong Tan +3 more
openalex +2 more sources
$k^{τ,ε}$-anonymity: Towards Privacy-Preserving Publishing of Spatiotemporal Trajectory Data [PDF]
Mobile network operators can track subscribers via passive or active monitoring of device locations. The recorded trajectories offer an unprecedented outlook on the activities of large user populations, which enables developing new networking solutions and services, and scaling up studies across research disciplines.
Marco Gramaglia +3 more
+5 more sources
Impact of prior knowledge on privacy leakage in trajectory data publishing
Abstract The rapid growth in the usage of location-based services has resulted in extensive research on users’ trajectory data publishing. But, a key concern here is a potential breach of user privacy through various linkage attacks by an efficient adversary.
D Hemkumar +2 more
openalex +2 more sources
An efficient method for privacy-preserving trajectory data publishing based on data partitioning
Since Osman Abul et al. first proposed the k-anonymity-based privacy protection for trajectory data, researchers have proposed a variety of trajectory privacy-preserving methods. These methods mainly adopt a static anonymity algorithm, which only focusing on the trajectories in a specific time span, directly anonymizes data and publishes them without ...
Songyuan Li +3 more
openalex +4 more sources
Differential-Privacy Preserving Trajectory Data Publishing for Road Networks [PDF]
Songyuan Li +3 more
openalex +2 more sources
A Survey and Experimental Study on Privacy-Preserving Trajectory Data Publishing [PDF]
Fengmei Jin +5 more
openalex +3 more sources

