Results 241 to 250 of about 26,490 (295)
Inferring structure and parameters of stochastic reaction networks with logistic regression. [PDF]
Choi B, Kang HW, Rempala GA.
europepmc +1 more source
Characteristics of person-centred practice in the stroke patient trajectory: a scoping review. [PDF]
Sabri A, Aase K, Eikeland Husebø SI.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Privacy Preservation for Trajectory Publication Based on Differential Privacy
ACM Transactions on Intelligent Systems and Technology, 2022With the proliferation of location-aware devices, trajectory data have been used widely in real-life applications. However, trajectory data are often associated with sensitive labels, such as users’ purchase transactions and planned activities. As such, inappropriate sharing or publishing of these data could threaten users’ privacy, especially when an ...
Lin Yao +4 more
openaire +1 more source
Personalized semantic trajectory privacy preservation through trajectory reconstruction
World Wide Web, 2017Trajectory data gathered by mobile positioning techniques and location-aware devices contain plenty of sensitive spatial-temporal and semantic information, and can support many applications through data analysing and mining. However, attribute-linkage and re-identification attacks on such data may cause privacy leakage, and lead to unexpected serious ...
Yan Dai +4 more
openaire +1 more source
Privacy preserving vehicular trajectory prediction
2016 International Conference on Computing, Analytics and Security Trends (CAST), 2016Location based services (LBS) provide many valuable and important services for end users but reveal information about personal location to potentially untrustworthy service providers which could pose privacy concerns. The information about exact path followed by a person is highly personal and can be used to uniquely identify a person. Such information
Purwa Gaikwad +4 more
openaire +1 more source
A personalized trajectory privacy protection method
Computers & Security, 2021Abstract Trajectory data of sports or activities are usually collected and shared into social apps like Wechat moments, Sina weibo in public to provide health services and recommendation, while a large number of friends with weak ties in social circle will cause privacy leakage of users’ locations and life habits. To solve the problem, a personalized
Jiachun Li, Guoqian Chen
openaire +1 more source
Privacy-preserving trajectory stream publishing
Data & Knowledge Engineering, 2014Recent advancement in mobile computing and sensory technology has facilitated the possibility of continuously updating, monitoring, and detecting the latest location and status of moving individuals. Spatio-temporal data generated and collected on the fly are described as trajectory streams.
Al-Hussaeni, Khalil +2 more
openaire +2 more sources

