Results 121 to 130 of about 152,186 (174)
Some of the next articles are maybe not open access.
In-Network Trajectory Privacy Preservation
ACM Computing Surveys, 2015Recent advances in mobile device, wireless networking, and positional technologies have helped location-aware applications become pervasive. However, location trajectory privacy concerns hinder the adoptability of such applications. In this article, we survey existing trajectory privacy work in the context of wireless sensor networks, location-based ...
Mingming Guo +5 more
openaire +3 more sources
TCPP: Achieving Privacy-Preserving Trajectory Correlation With Differential Privacy
IEEE Transactions on Information Forensics and Security, 2023Lei Wu +4 more
openaire +3 more sources
Privacy Preservation for Trajectory Publication Based on Differential Privacy
ACM Transactions on Intelligent Systems and Technology, 2022With the proliferation of location-aware devices, trajectory data have been used widely in real-life applications. However, trajectory data are often associated with sensitive labels, such as users’ purchase transactions and planned activities. As such, inappropriate sharing or publishing of these data could threaten users’ privacy, especially when an ...
Lin Yao +4 more
openaire +1 more source
Personalized semantic trajectory privacy preservation through trajectory reconstruction
World Wide Web, 2017Trajectory data gathered by mobile positioning techniques and location-aware devices contain plenty of sensitive spatial-temporal and semantic information, and can support many applications through data analysing and mining. However, attribute-linkage and re-identification attacks on such data may cause privacy leakage, and lead to unexpected serious ...
Yan Dai +4 more
openaire +1 more source

