Results 11 to 20 of about 26,490 (295)
Protecting privacy of semantic trajectory
The growing ubiquity of GPS-enabled devices in everyday life has made large-scale collection of trajectories feasible, providing ever-growing opportunities for human movement analysis. However, publishing this vulnerable data is accompanied by increasing concerns about individuals’ geoprivacy.
Roya Shourouni
openalex +2 more sources
A Trajectory Privacy Protection Scheme Based on the Replacement of Stay Points [PDF]
Location-based services generate a large amount of location and trajectory data, which contain rich spatiotemporal and semantic information. Publishing these data without proper protection can seriously threaten users’ trajectory privacy.
Wanqing Wu, Delong Li
doaj +2 more sources
Privacy-preserving trajectory similarity computation method
To tackle privacy concerns on user information leakage in trajectory outsourcing services, a privacy-preserving trajectory similarity computation (pTSC) method was proposed.A trajectory outsourcing service provider was enabled to store encrypted ...
Haining YU +4 more
doaj +3 more sources
KSDP scheme for trajectory data publishing
For clustering applications in the field of trajectory privacy protection, the k-means algorithm is sensitive to initial values and the number of clusters may be somewhat arbitrary.
ZHANG Jun +4 more
doaj +1 more source
Real-world trajectory sharing with local differential privacy [PDF]
Sharing trajectories is beneficial for many real-world applications, such as managing disease spread through contact tracing and tailoring public services to a population's travel patterns. However, public concern over privacy and data protection has limited the extent to which this data is shared.
Cunningham, Teddy +3 more
openaire +3 more sources
Trajectory-Differential Privacy-Protection Method with Interest Region
Trajectory data privacy protection method is a hot topic in data privacy protection research field. Most of existing trajectory data privacy protection methods adopt the strategy of adding noise to all locations, which reduces the availability of data ...
LAN Wei, LIN Ying, BAO Lingyan, LI Tong, CHEN Mengrong, SHAN Jinzhao
doaj +1 more source
A trajectory data publishing algorithm satisfying local suppression
Suppressing the trajectory data to be released can effectively reduce the risk of user privacy leakage. However, the global suppression of the data set to meet the traditional privacy model method reduces the availability of trajectory data.
Xiaohui Li +3 more
doaj +1 more source
Privacy-Preserving Trajectory Data Publishing by Dynamic Anonymization with Bounded Distortion
Publication of trajectory data that contain rich information of vehicles in the dimensions of time and space (location) enables online monitoring and supervision of vehicles in motion and offline traffic analysis for various management tasks. However, it
Songyuan Li +3 more
doaj +1 more source
Preserving Trajectory Privacy in Driving Data Release
Real-time data transmissions from a vehicle enhance road safety and traffic efficiency by aggregating data in a central server for data analytics. When drivers share their instantaneous vehicular information for a service provider to perform a legitimate task, a curious service provider may also infer private information it has not been authorized for.
Xu, Yi +3 more
openaire +2 more sources
Risk-Aware Individual Trajectory Data Publishing With Differential Privacy
Large-scale spatiotemporal data mining has created valuable insights into managing key areas of society and the economy. It has encouraged data owners to release/publish trajectory datasets. However, the ill-informed publication of such valuable datasets
Jianzhe Zhao +4 more
doaj +1 more source

