Results 71 to 80 of about 152,186 (174)

Interchange-Based Privacy Protection for Publishing Trajectories

open access: yesIEEE Access, 2019
Information extracted from trajectory data is very useful in many practical application scenarios. Before trajectories for data mining are published, they need to be processed to protect the privacy of the trajectories' bodies.
Shuai Wang   +3 more
doaj   +1 more source

A Trajectory Privacy Protection Scheme Based on the Replacement of Stay Points

open access: yesApplied Sciences
Location-based services generate a large amount of location and trajectory data, which contain rich spatiotemporal and semantic information. Publishing these data without proper protection can seriously threaten users’ trajectory privacy.
Wanqing Wu, Delong Li
doaj   +1 more source

Protecting privacy of semantic trajectory

open access: yes, 2021
The growing ubiquity of GPS-enabled devices in everyday life has made large-scale collection of trajectories feasible, providing ever-growing opportunities for human movement analysis. However, publishing this vulnerable data is accompanied by increasing concerns about individuals’ geoprivacy.
openaire   +1 more source

CLM:differential privacy protection method for trajectory publishing

open access: yesTongxin xuebao, 2017
In order to solve the problem existing in differential privacy preserving publishing methods that the independent noise was easy to be filtered out,a differential privacy publishing method for trajectory data (CLM),was proposed.A correlated Laplace ...
Hao WANG   +3 more
doaj   +2 more sources

Survey of differentially private methods for trajectory data

open access: yes网络与信息安全学报
With the rapid development of sensor and positioning technologies, vast amounts of trajectory data were generated, stored, and shared by users’ smart mobile devices.
SUN Xinyue   +3 more
doaj  

Towards Privacy-Preserving Semantic Mobility Analysis [PDF]

open access: yes
By analyzing data reflecting human mobility, one can derive patterns and knowledge that are tightly linked to the underlying geography and therefore cannot be applied to another territory or even compared with patterns obtained for another territory ...
Andrienko, G., Andrienko, N., Fuchs, G.
core  

Dummy trajectory privacy protection scheme for trajectory publishing based on the spatiotemporal correlation

open access: yesTongxin xuebao, 2016
The spatiotemporal correlation was analyzed between neighboring locations and the trajectories similarity from the movement direction, the reachable time between neighboring locations and the movement distance, and a dummy trajectory privacy protection ...
Kai-yue LEI   +5 more
doaj   +2 more sources

Vehicle Trajectory Generation Based on Generation Adversarial Network

open access: yesJournal of Highway and Transportation Research and Development
With the development of networked vehicles, location information-based transportation systems have proven to provide significant benefits. However, the exposure of vehicle location information also raises important privacy issues. Current typical methods
Zhonghe He, Renchi Shao, Sijia Xiang
doaj   +1 more source

Efficient scheme for user's trajectory privacy

open access: yesTongxin xuebao, 2015
As one of the most important information in location-based services (LBS),the trajectory privacy for smart devices users has gained increasingly popularity over recent years.To address this problem,(k−1) dummy trajectories to achieve trajectory k-anonymity with comprehensively considering side information were generated,user's mobility pattern and the ...
Feng-hua LI   +5 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy