A federated pedestrian trajectory prediction model with data privacy protection
Pedestrian trajectory prediction is essential for self-driving vehicles, social robots, and intelligent monitoring applications. Diverse trajectory data is critical for high-accuracy trajectory prediction.
Rongrong Ni +4 more
doaj +1 more source
Robust Fingerprint of Location Trajectories Under Differential Privacy
Directly releasing those data raises privacy and liability (e.g., due to unauthorized distribution of such datasets) concerns since location data contain users' sensitive information, e.g., regular moving patterns and favorite spots. To address this, we propose a novel fingerprinting scheme that simultaneously identifies unauthorized redistribution of ...
Jiang, Yuzhou +2 more
openaire +3 more sources
TrPLS: Preserving Privacy in Trajectory Data Publishing by Personalized Local Suppression
Trajectory data are becoming more popular due to the rapid development of mobile devices and the widespread use of location-based services. They often provide useful information that can be used for data mining tasks.
Elahe Ghasemi Komishani, Mahdi Abadi
doaj
Lclean: A Plausible Approach to Individual Trajectory Data Sanitization
In recent years, with the continuous development of significant data industrialization, trajectory data have more and more critical analytical value for urban construction and environmental monitoring.
Qilong Han +4 more
doaj +1 more source
SUDM-SP: A method for discovering trajectory similar users based on semantic privacy
With intelligent terminal devices’ widespread adoption and global positioning systems’ advancement, Location-based Social Networking Services (LbSNs) have gained considerable attention.
Weiqi Zhang, Guisheng Yin, Bingyi Xie
doaj +1 more source
PATH: Person Authentication using Trace Histories
In this paper, a solution to the problem of Active Authentication using trace histories is addressed. Specifically, the task is to perform user verification on mobile devices using historical location traces of the user as a function of time. Considering
Chellappa, Rama, Mahbub, Upal
core +1 more source
Privacy-Preserving Indoor Trajectory Matching with IoT Devices
With the rapid development of the Internet of Things (IoT) technology, Wi-Fi signals have been widely used for trajectory signal acquisition. Indoor trajectory matching aims to achieve the monitoring of the encounters between people and trajectory analysis in indoor environments.
Bingxian Lu +3 more
openaire +3 more sources
Approximately Truthful Multi-Agent Optimization Using Cloud-Enforced Joint Differential Privacy [PDF]
Multi-agent coordination problems often require agents to exchange state information in order to reach some collective goal, such as agreement on a final state value.
Egerstedt, M., Hale, M. T.
core
Routing-Verification-as-a-Service (RVaaS): Trustworthy Routing Despite Insecure Providers
Computer networks today typically do not provide any mechanisms to the users to learn, in a reliable manner, which paths have (and have not) been taken by their packets.
Schiff, Liron +2 more
core +1 more source
Privacy and Utility Preserving Trajectory Data Publishing for Intelligent Transportation Systems
Nowadays, the extensive collection and storage of massive personal GPS data in intelligent transportation systems every day provide great convenience for trajectory data analysis and mining research, thus bringing valuable information for real-life ...
Xiangwen Liu, Yuquan Zhu
doaj +1 more source

