Results 1 to 10 of about 152,186 (174)

Successive Trajectory Privacy Protection with Semantics Prediction Differential Privacy [PDF]

open access: yesEntropy, 2022
The publication of trajectory data provides critical information for various location-based services, and it is critical to publish trajectory data safely while ensuring its availability.
Jing Zhang   +4 more
doaj   +4 more sources

A Vehicle Trajectory Privacy Preservation Method Based on Caching and Dummy Locations in the Internet of Vehicles [PDF]

open access: yesSensors, 2022
In the internet of vehicles (IoVs), vehicle users should provide location information continuously when they want to acquire continuous location-based services (LBS), which may disclose the vehicle trajectory privacy.
Qianyong Huang   +3 more
doaj   +2 more sources

Spatiotemporal Mobility Based Trajectory Privacy-Preserving Algorithm in Location-Based Services [PDF]

open access: yesSensors, 2021
Recent years have seen the wide application of Location-Based Services (LBSs) in our daily life. Although users can enjoy many conveniences from the LBSs, they may lose their trajectory privacy when their location data are collected.
Zhiping Xu   +4 more
doaj   +2 more sources

A Trajectory Privacy Preserving Scheme in the CANNQ Service for IoT [PDF]

open access: yesSensors, 2019
Nowadays, anyone carrying a mobile device can enjoy the various location-based services provided by the Internet of Things (IoT). ‘Aggregate nearest neighbor query’ is a new type of location-based query which asks the question, ‘what is
Lin Zhang   +4 more
doaj   +2 more sources

KSDP scheme for trajectory data publishing

open access: yesShenzhen Daxue xuebao. Ligong ban, 2023
For clustering applications in the field of trajectory privacy protection, the k-means algorithm is sensitive to initial values and the number of clusters may be somewhat arbitrary.
ZHANG Jun   +4 more
doaj   +1 more source

Trajectory-Differential Privacy-Protection Method with Interest Region

open access: yesJisuanji kexue yu tansuo, 2020
Trajectory data privacy protection method is a hot topic in data privacy protection research field. Most of existing trajectory data privacy protection methods adopt the strategy of adding noise to all locations, which reduces the availability of data ...
LAN Wei, LIN Ying, BAO Lingyan, LI Tong, CHEN Mengrong, SHAN Jinzhao
doaj   +1 more source

A trajectory data publishing algorithm satisfying local suppression

open access: yesInternational Journal of Distributed Sensor Networks, 2021
Suppressing the trajectory data to be released can effectively reduce the risk of user privacy leakage. However, the global suppression of the data set to meet the traditional privacy model method reduces the availability of trajectory data.
Xiaohui Li   +3 more
doaj   +1 more source

Privacy-Preserving Trajectory Data Publishing by Dynamic Anonymization with Bounded Distortion

open access: yesISPRS International Journal of Geo-Information, 2021
Publication of trajectory data that contain rich information of vehicles in the dimensions of time and space (location) enables online monitoring and supervision of vehicles in motion and offline traffic analysis for various management tasks. However, it
Songyuan Li   +3 more
doaj   +1 more source

Towards trajectory anonymization: a generalization-based approach [PDF]

open access: yes, 2009
Trajectory datasets are becoming popular due to the massive usage of GPS and locationbased services. In this paper, we address privacy issues regarding the identification of individuals in static trajectory datasets.
Atzori, Maurizio   +5 more
core   +2 more sources

Maintaining trajectory privacy in mobile wireless sensor networks [PDF]

open access: yes, 2013
Mobile wireless sensor networks (MWSN) is a subdomain of wireless sensor networks in which sensors and/or sinks are mobile. In this study, we propose a scheme for providing trajectory privacy of mobile sink nodes.
Kiraz, Osman, Levi, Albert
core   +2 more sources

Home - About - Disclaimer - Privacy