Results 11 to 20 of about 89,030 (269)

A Trajectory Privacy Protection Method Based on Random Sampling Differential Privacy [PDF]

open access: yesISPRS International Journal of Geo-Information, 2021
With the popularity of location-aware devices (e.g., smart phones), a large number of trajectory data were collected. The trajectory dataset can be used in many fields including traffic monitoring, market analysis, city management, etc.
Tinghuai Ma, Fagen Song
doaj   +4 more sources

Trajectory privacy protection scheme based on differential privacy

open access: yesTongxin xuebao, 2021
To solve the problem that the current sampling mechanism and data obfuscation method may raise insufficient data availability and privacy protection, a trajectory privacy protection scheme based on differential privacy was proposed.A new efficient ...
Si CHEN   +3 more
doaj   +3 more sources

Interchange-Based Privacy Protection for Publishing Trajectories [PDF]

open access: yesIEEE Access, 2019
Information extracted from trajectory data is very useful in many practical application scenarios. Before trajectories for data mining are published, they need to be processed to protect the privacy of the trajectories' bodies.
Shuai Wang   +3 more
doaj   +2 more sources

CLM:differential privacy protection method for trajectory publishing

open access: yesTongxin xuebao, 2017
In order to solve the problem existing in differential privacy preserving publishing methods that the independent noise was easy to be filtered out,a differential privacy publishing method for trajectory data (CLM),was proposed.A correlated Laplace ...
Hao WANG   +3 more
doaj   +3 more sources

Trajectory privacy protection method based on location obfuscation

open access: yesTongxin xuebao, 2018
In the process of continuous queries,a method of trajectory privacy protection based on location obfuscation was proposed to solve the problem that K-anonymity was difficult to guarantee user privacy in third party architectrue.Firstly,the (G-1) query ...
Shaobo ZHANG, Qin LIU, Guojun WANG
doaj   +3 more sources

Trajectory differential privacy protection method based on exponential mechanism

open access: yes大数据, 2023
A trajectory differential privacy protection method based on exponential mechanism was proposed, aiming at the problem of privacy disclosure caused by ignoring semantic information carried by location points in traditional trajectory data protection.For ...
Huicong JIAO, Wenju LIU, Ze WANG
doaj   +1 more source

Trajectory privacy protection mechanism of obfuscating paths based on vehicles cooperation

open access: yes网络与信息安全学报, 2019
Vehicles sent location information to third parties to obtain location-based services in the Internet of vehicles, which may lead to vehicle trajectory privacy leakage.
ZHAO Ziwen, YE Ayong, JIN Junlin, MENG Lingyu
doaj   +3 more sources

Differential privacy protection method based on published trajectory cross-correlation constraint.

open access: yesPLoS ONE, 2020
Aiming to solve the problem of low data utilization and privacy protection, a personalized differential privacy protection method based on cross-correlation constraints is proposed.
Zhaowei Hu, Jing Yang
doaj   +1 more source

Risk-Aware Individual Trajectory Data Publishing With Differential Privacy

open access: yesIEEE Access, 2021
Large-scale spatiotemporal data mining has created valuable insights into managing key areas of society and the economy. It has encouraged data owners to release/publish trajectory datasets. However, the ill-informed publication of such valuable datasets
Jianzhe Zhao   +4 more
doaj   +1 more source

Towards trajectory anonymization: a generalization-based approach [PDF]

open access: yes, 2009
Trajectory datasets are becoming popular due to the massive usage of GPS and locationbased services. In this paper, we address privacy issues regarding the identification of individuals in static trajectory datasets.
Atzori, Maurizio   +5 more
core   +2 more sources

Home - About - Disclaimer - Privacy