Results 1 to 10 of about 26,490 (295)

Successive Trajectory Privacy Protection with Semantics Prediction Differential Privacy [PDF]

open access: yesEntropy, 2022
The publication of trajectory data provides critical information for various location-based services, and it is critical to publish trajectory data safely while ensuring its availability.
Jing Zhang   +4 more
doaj   +4 more sources

A Trajectory Privacy Preserving Scheme in the CANNQ Service for IoT [PDF]

open access: goldSensors, 2019
Nowadays, anyone carrying a mobile device can enjoy the various location-based services provided by the Internet of Things (IoT). ‘Aggregate nearest neighbor query’ is a new type of location-based query which asks the question, ‘what is
Lin Zhang   +4 more
doaj   +4 more sources

A Vehicle Trajectory Privacy Preservation Method Based on Caching and Dummy Locations in the Internet of Vehicles [PDF]

open access: yesSensors, 2022
In the internet of vehicles (IoVs), vehicle users should provide location information continuously when they want to acquire continuous location-based services (LBS), which may disclose the vehicle trajectory privacy.
Qianyong Huang   +3 more
doaj   +2 more sources

Spatiotemporal Mobility Based Trajectory Privacy-Preserving Algorithm in Location-Based Services [PDF]

open access: yesSensors, 2021
Recent years have seen the wide application of Location-Based Services (LBSs) in our daily life. Although users can enjoy many conveniences from the LBSs, they may lose their trajectory privacy when their location data are collected.
Zhiping Xu   +4 more
doaj   +2 more sources

RcDT: Privacy Preservation Based on R-Constrained Dummy Trajectory in Mobile Social Networks [PDF]

open access: goldIEEE Access, 2019
The boom of mobile devices and location-based services (LBSs) greatly enriches the mobile social network (MSN) applications, which bring convenience to our daily life and, meanwhile, raise serious privacy concerns due to the potential disclosure risk of ...
Jinquan Zhang   +3 more
doaj   +2 more sources

A Consistent Differential Privacy Dynamic Trajectory Flow Prediction Method [PDF]

open access: goldEngineering Reports
Ensuring privacy while maintaining accuracy in trajectory prediction is a crucial challenge in privacy‐sensitive applications such as smart transportation and mobility analytics.
Hongzhi Pan
doaj   +2 more sources

A Trajectory Privacy Protection Method Based on Random Sampling Differential Privacy [PDF]

open access: goldISPRS International Journal of Geo-Information, 2021
With the popularity of location-aware devices (e.g., smart phones), a large number of trajectory data were collected. The trajectory dataset can be used in many fields including traffic monitoring, market analysis, city management, etc.
Tinghuai Ma, Fagen Song
doaj   +2 more sources

LBS user location privacy protection scheme based on trajectory similarity [PDF]

open access: goldScientific Reports, 2022
During the data set input or output, or the data set itself adds noise to enable data distortion to effectively reduce the risk of user privacy leakage.
Kun Qian, Xiaohui Li
doaj   +2 more sources

Trajectory privacy protection scheme based on differential privacy

open access: yesTongxin xuebao, 2021
To solve the problem that the current sampling mechanism and data obfuscation method may raise insufficient data availability and privacy protection, a trajectory privacy protection scheme based on differential privacy was proposed.A new efficient ...
Si CHEN   +3 more
doaj   +3 more sources

DPTP-LICD: A differential privacy trajectory protection method based on latent interest community detection

open access: goldHigh-Confidence Computing, 2023
With the rapid development of high-speed mobile network technology and high-precision positioning technology, the trajectory information of mobile users has received extensive attention from academia and industry in the field of Location-based Social ...
Weiqi Zhang   +4 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy