Results 21 to 30 of about 26,490 (295)

Differential privacy protection method based on published trajectory cross-correlation constraint.

open access: yesPLoS ONE, 2020
Aiming to solve the problem of low data utilization and privacy protection, a personalized differential privacy protection method based on cross-correlation constraints is proposed.
Zhaowei Hu, Jing Yang
doaj   +1 more source

Trajectory privacy data publishing scheme based on local optimisation and R-tree

open access: yesConnection Science, 2023
The proliferation of location-based service applications has led to a substantial surge in the amount of life trajectory data produced by mobile devices. And these data frequently contain confidential personal details.
Peiqian Liu   +3 more
doaj   +1 more source

Privacy Preservation in the Publication of Trajectories [PDF]

open access: yesThe Ninth International Conference on Mobile Data Management (mdm 2008), 2008
We study the problem of protecting privacy in the publication of location sequences. Consider a database of trajectories, corresponding to movements of people, captured by their transactions when they use credit or RFID debit cards. We show that, if such trajectories are published exactly (by only hiding the identities of persons that followed them ...
Mamoulis, N, Terrovitis, M
openaire   +2 more sources

IFTS: A Location Privacy Protection Method Based on Initial and Final Trajectory Segments

open access: yesIEEE Access, 2021
Privacy protection problem is one of the most concerning issues related to Location-Based Services (LBS) in our daily life. Privacy protection of LBS often requires anonymizing customer's trajectory data.
Jiuyun Xu   +5 more
doaj   +1 more source

Trajectory data privacy protection based on differential privacy mechanism

open access: yesIOP Conference Series: Materials Science and Engineering, 2018
In this paper, we propose a trajectory data privacy protection scheme based on differential privacy mechanism. In the proposed scheme, the algorithm first selects the protected points from the user's trajectory data; secondly, the algorithm forms the polygon according to the protected points and the adjacent and high frequent accessed points that are ...
Ke Gu, Lihao Yang, Yongzhi Liu, Bo Yin
openaire   +2 more sources

Trajectory privacy protection mechanism of obfuscating paths based on vehicles cooperation

open access: yes网络与信息安全学报, 2019
Vehicles sent location information to third parties to obtain location-based services in the Internet of vehicles,which may lead to vehicle trajectory privacy leakage.To address the privacy problem,trajectory privacy protection mechanism of obfuscating ...
Ziwen ZHAO   +3 more
doaj   +3 more sources

A Privacy-Preserving Trajectory Publishing Method Based on Multi-Dimensional Sub-Trajectory Similarities

open access: yesSensors, 2023
With the popularity of location services and the widespread use of trajectory data, trajectory privacy protection has become a popular research area. k-anonymity technology is a common method for achieving privacy-preserved trajectory publishing.
Hua Shen, Yu Wang, Mingwu Zhang
doaj   +1 more source

PPTPF: Privacy-Preserving Trajectory Publication Framework for CDR Mobile Trajectories [PDF]

open access: yesISPRS International Journal of Geo-Information, 2021
As mobile phone technology evolves quickly, people could use mobile phones to conduct business, watch entertainment shows, order food, and many more. These location-based services (LBS) require users’ mobility data (trajectories) in order to provide many useful services.
Jianxi Yang, Manoranjan Dash, Sin G. Teo
openaire   +2 more sources

Trajectory differential privacy protection mechanism based on prediction and sliding window

open access: yesTongxin xuebao, 2020
To address the issues of privacy budget and quality of service in trajectory differential privacy protection,a trajectory differential privacy mechanism integrating prediction disturbance was proposed.Firstly,Markov chain and exponential perturbation ...
Ayong YE   +4 more
doaj   +2 more sources

Differentially private count queries over personalized-location trajectory databases

open access: yesData in Brief, 2018
Differential privacy is a technique for releasing statistical information about a database without revealing information about its individual data records.
Fatemeh Deldar, Mahdi Abadi
doaj   +1 more source

Home - About - Disclaimer - Privacy