Results 1 to 10 of about 89,030 (269)
Successive Trajectory Privacy Protection with Semantics Prediction Differential Privacy [PDF]
The publication of trajectory data provides critical information for various location-based services, and it is critical to publish trajectory data safely while ensuring its availability.
Jing Zhang +4 more
doaj +6 more sources
Trajectory-Differential Privacy-Protection Method with Interest Region
Trajectory data privacy protection method is a hot topic in data privacy protection research field. Most of existing trajectory data privacy protection methods adopt the strategy of adding noise to all locations, which reduces the availability of data ...
LAN Wei, LIN Ying, BAO Lingyan, LI Tong, CHEN Mengrong, SHAN Jinzhao
doaj +2 more sources
LBS user location privacy protection scheme based on trajectory similarity
During the data set input or output, or the data set itself adds noise to enable data distortion to effectively reduce the risk of user privacy leakage.
Kun Qian, Xiaohui Li
doaj +3 more sources
A location semantic privacy protection model based on spatial influence [PDF]
The utilization of numerous location-based intelligent services yields massive traffic trajectory data. Mining such data unveils internal and external user features, offering significant application value across various domains.
Linghong Kuang +4 more
doaj +2 more sources
KSDP scheme for trajectory data publishing
For clustering applications in the field of trajectory privacy protection, the k-means algorithm is sensitive to initial values and the number of clusters may be somewhat arbitrary.
ZHANG Jun +4 more
doaj +1 more source
A trajectory data publishing algorithm satisfying local suppression
Suppressing the trajectory data to be released can effectively reduce the risk of user privacy leakage. However, the global suppression of the data set to meet the traditional privacy model method reduces the availability of trajectory data.
Xiaohui Li +3 more
doaj +1 more source
With the popularity of location services and the widespread use of trajectory data, trajectory privacy protection has become a popular research area. k-anonymity technology is a common method for achieving privacy-preserved trajectory publishing.
Hua Shen, Yu Wang, Mingwu Zhang
doaj +1 more source
IFTS: A Location Privacy Protection Method Based on Initial and Final Trajectory Segments
Privacy protection problem is one of the most concerning issues related to Location-Based Services (LBS) in our daily life. Privacy protection of LBS often requires anonymizing customer's trajectory data.
Jiuyun Xu +5 more
doaj +1 more source
With the rapid development of high-speed mobile network technology and high-precision positioning technology, the trajectory information of mobile users has received extensive attention from academia and industry in the field of Location-based Social ...
Weiqi Zhang +4 more
doaj +1 more source
Privacy Protection Algorithm Based on Optimized Local Suppression for Trajectory Data Publication [PDF]
To address the problem of privacy leakage caused by trajectory sequences in trajectory data publication,this paper proposes a privacy protection algorithm,TPL-Local,based on optimized local suppression.The algorithm identifies the minimal violating ...
YU Qingying, WANG Yanfei, YE Zitong, ZHANG Shuanggui, CHEN Chuanming
doaj +1 more source

