Results 61 to 70 of about 152,186 (174)

SCTP: Achieving Semantic Correlation Trajectory Privacy-Preserving With Differential Privacy

open access: yesIEEE Transactions on Vehicular Technology
With the rapid proliferation of vehicular technology, location-based services (LBS) have become a crucial component of Internet of Vehicles (IoV) applications, such as map navigation and health tracking. These applications rely on users' location information to provide services, enabling users to effectively share their locations, access information ...
Haojie Yuan   +6 more
openaire   +2 more sources

Privacy in trajectory micro-data publishing : a survey

open access: yes, 2019
We survey the literature on the privacy of trajectory micro-data, i.e., spatiotemporal information about the mobility of individuals, whose collection is becoming increasingly simple and frequent thanks to emerging information and communication technologies.
Fiore, Marco   +9 more
openaire   +5 more sources

Location Privacy in Spatial Crowdsourcing

open access: yes, 2017
Spatial crowdsourcing (SC) is a new platform that engages individuals in collecting and analyzing environmental, social and other spatiotemporal information.
A Liu   +9 more
core   +1 more source

The highD Dataset: A Drone Dataset of Naturalistic Vehicle Trajectories on German Highways for Validation of Highly Automated Driving Systems

open access: yes, 2018
Scenario-based testing for the safety validation of highly automated vehicles is a promising approach that is being examined in research and industry.
Bock, Julian   +3 more
core   +1 more source

Trajectory mining, representation and privacy protection [PDF]

open access: yesProceedings of the 2nd ACM SIGSPATIAL PhD Workshop, 2015
The maturing of mobile devices and systems provides an unprecedented opportunity to collect a large amount of real world human motion data at all scales. The rich knowledge contained in these data sets is valuable. In this analysis, we first study information dissemination through the physical contacts learnt from the data sets.
openaire   +1 more source

Mobility-Aware Caching for Content-Centric Wireless Networks: Modeling and Methodology

open access: yes, 2016
As mobile services are shifting from "connection-centric" communications to "content-centric" communications, content-centric wireless networking emerges as a promising paradigm to evolve the current network architecture.
Letaief, K. B.   +3 more
core   +1 more source

Trajectory and Policy Aware Sender Anonymity in Location Based Services

open access: yes, 2012
We consider Location-based Service (LBS) settings, where a LBS provider logs the requests sent by mobile device users over a period of time and later wants to publish/share these logs.
Deutsch, Alin   +3 more
core   +1 more source

Privacy-Preserving of Check-in Services in MSNS Based on a Bit Matrix

open access: yesCybernetics and Information Technologies, 2015
Check-in service, being one of the most popular services in Mobile Social Network Services (MSNS), has serious personal privacy leakage threats. In this paper check-in sequences of pseudonym users were buffered, and a bit matrix for buffered check-in ...
Wen Chen
doaj   +1 more source

Personalized trajectory perturbation method based on fuzzy sensitivity quantification in MEC

open access: yesTongxin xuebao
To address the limitations of existing trajectory privacy protection methods, which generally neglect users’ personalized privacy requirements and suffer from utility degradation under traditional noise-injection mechanisms, a personalized dynamic ...
Jiang Zhongyuan   +4 more
doaj  

Home - About - Disclaimer - Privacy