Results 21 to 30 of about 152,186 (174)

Trajectory privacy data publishing scheme based on local optimisation and R-tree

open access: yesConnection Science, 2023
The proliferation of location-based service applications has led to a substantial surge in the amount of life trajectory data produced by mobile devices. And these data frequently contain confidential personal details.
Peiqian Liu   +3 more
doaj   +1 more source

Spatio-Temporal Techniques for User Identification by means of GPS Mobility Data [PDF]

open access: yes, 2015
One of the greatest concerns related to the popularity of GPS-enabled devices and applications is the increasing availability of the personal location information generated by them and shared with application and service providers.
Musolesi, Mirco   +2 more
core   +4 more sources

IFTS: A Location Privacy Protection Method Based on Initial and Final Trajectory Segments

open access: yesIEEE Access, 2021
Privacy protection problem is one of the most concerning issues related to Location-Based Services (LBS) in our daily life. Privacy protection of LBS often requires anonymizing customer's trajectory data.
Jiuyun Xu   +5 more
doaj   +1 more source

Privacy preserving spatio-temporal clustering on horizontally partitioned data [PDF]

open access: yes, 2006
Time-stamped location information is regarded as spatio-temporal data and, by its nature, such data is highly sensitive from the perspective of privacy.
İnan, Ali   +3 more
core   +1 more source

Trajectory data privacy protection based on differential privacy mechanism

open access: yesIOP Conference Series: Materials Science and Engineering, 2018
In this paper, we propose a trajectory data privacy protection scheme based on differential privacy mechanism. In the proposed scheme, the algorithm first selects the protected points from the user's trajectory data; secondly, the algorithm forms the polygon according to the protected points and the adjacent and high frequent accessed points that are ...
Ke Gu, Lihao Yang, Yongzhi Liu, Bo Yin
openaire   +2 more sources

RcDT: Privacy Preservation Based on R-Constrained Dummy Trajectory in Mobile Social Networks

open access: yesIEEE Access, 2019
The boom of mobile devices and location-based services (LBSs) greatly enriches the mobile social network (MSN) applications, which bring convenience to our daily life and, meanwhile, raise serious privacy concerns due to the potential disclosure risk of ...
Jinquan Zhang   +3 more
doaj   +1 more source

DPTP-LICD: A differential privacy trajectory protection method based on latent interest community detection

open access: yesHigh-Confidence Computing, 2023
With the rapid development of high-speed mobile network technology and high-precision positioning technology, the trajectory information of mobile users has received extensive attention from academia and industry in the field of Location-based Social ...
Weiqi Zhang   +4 more
doaj   +1 more source

Trajectory privacy protection mechanism of obfuscating paths based on vehicles cooperation

open access: yes网络与信息安全学报, 2019
Vehicles sent location information to third parties to obtain location-based services in the Internet of vehicles,which may lead to vehicle trajectory privacy leakage.To address the privacy problem,trajectory privacy protection mechanism of obfuscating ...
Ziwen ZHAO   +3 more
doaj   +3 more sources

PPTPF: Privacy-Preserving Trajectory Publication Framework for CDR Mobile Trajectories [PDF]

open access: yesISPRS International Journal of Geo-Information, 2021
As mobile phone technology evolves quickly, people could use mobile phones to conduct business, watch entertainment shows, order food, and many more. These location-based services (LBS) require users’ mobility data (trajectories) in order to provide many useful services.
Jianxi Yang, Manoranjan Dash, Sin G. Teo
openaire   +2 more sources

A Privacy-Preserving Trajectory Publishing Method Based on Multi-Dimensional Sub-Trajectory Similarities

open access: yesSensors, 2023
With the popularity of location services and the widespread use of trajectory data, trajectory privacy protection has become a popular research area. k-anonymity technology is a common method for achieving privacy-preserved trajectory publishing.
Hua Shen, Yu Wang, Mingwu Zhang
doaj   +1 more source

Home - About - Disclaimer - Privacy