Results 71 to 80 of about 152,186 (174)
Interchange-Based Privacy Protection for Publishing Trajectories
Information extracted from trajectory data is very useful in many practical application scenarios. Before trajectories for data mining are published, they need to be processed to protect the privacy of the trajectories' bodies.
Shuai Wang +3 more
doaj +1 more source
A Trajectory Privacy Protection Scheme Based on the Replacement of Stay Points
Location-based services generate a large amount of location and trajectory data, which contain rich spatiotemporal and semantic information. Publishing these data without proper protection can seriously threaten users’ trajectory privacy.
Wanqing Wu, Delong Li
doaj +1 more source
Protecting privacy of semantic trajectory
The growing ubiquity of GPS-enabled devices in everyday life has made large-scale collection of trajectories feasible, providing ever-growing opportunities for human movement analysis. However, publishing this vulnerable data is accompanied by increasing concerns about individuals’ geoprivacy.
openaire +1 more source
CLM:differential privacy protection method for trajectory publishing
In order to solve the problem existing in differential privacy preserving publishing methods that the independent noise was easy to be filtered out,a differential privacy publishing method for trajectory data (CLM),was proposed.A correlated Laplace ...
Hao WANG +3 more
doaj +2 more sources
Survey of differentially private methods for trajectory data
With the rapid development of sensor and positioning technologies, vast amounts of trajectory data were generated, stored, and shared by users’ smart mobile devices.
SUN Xinyue +3 more
doaj
Towards Privacy-Preserving Semantic Mobility Analysis [PDF]
By analyzing data reflecting human mobility, one can derive patterns and knowledge that are tightly linked to the underlying geography and therefore cannot be applied to another territory or even compared with patterns obtained for another territory ...
Andrienko, G., Andrienko, N., Fuchs, G.
core
The spatiotemporal correlation was analyzed between neighboring locations and the trajectories similarity from the movement direction, the reachable time between neighboring locations and the movement distance, and a dummy trajectory privacy protection ...
Kai-yue LEI +5 more
doaj +2 more sources
Vehicle Trajectory Generation Based on Generation Adversarial Network
With the development of networked vehicles, location information-based transportation systems have proven to provide significant benefits. However, the exposure of vehicle location information also raises important privacy issues. Current typical methods
Zhonghe He, Renchi Shao, Sijia Xiang
doaj +1 more source
Efficient scheme for user's trajectory privacy
As one of the most important information in location-based services (LBS),the trajectory privacy for smart devices users has gained increasingly popularity over recent years.To address this problem,(k−1) dummy trajectories to achieve trajectory k-anonymity with comprehensively considering side information were generated,user's mobility pattern and the ...
Feng-hua LI +5 more
openaire +2 more sources
WorldMove, a global open data for human mobility. [PDF]
Yuan Y, Zhang Y, Ding J, Li Y.
europepmc +1 more source

