Results 221 to 230 of about 89,030 (269)
Some of the next articles are maybe not open access.
Protecting trajectory privacy: A user-centric analysis
Journal of Network and Computer Applications, 2017Abstract The existing evaluation methods for location privacy protection mechanism (LPPM) focus mainly on location privacy at the time of issuing a location-based query, and rarely consider trajectory privacy from where multiple successive queries are issued.
Hang Shen +3 more
openaire +3 more sources
Novel trajectory privacy protection method against prediction attacks
Expert Systems with Applications, 2023Shuyuan Qiu +3 more
openaire +3 more sources
A personalized trajectory privacy protection method
Computers & Security, 2021Abstract Trajectory data of sports or activities are usually collected and shared into social apps like Wechat moments, Sina weibo in public to provide health services and recommendation, while a large number of friends with weak ties in social circle will cause privacy leakage of users’ locations and life habits. To solve the problem, a personalized
Jiachun Li, Guoqian Chen
openaire +1 more source
Trajectory Privacy Protection Method Based on Differential Privacy in Crowdsensing
IEEE Transactions on Services ComputingQiong Zhang +5 more
openaire +3 more sources
Privacy-protected social media user trajectories calibration
2016 IEEE 12th International Conference on e-Science (e-Science), 2016Advanced data analytics have become an integral part of a number of eScience initiatives including the many challenges facing the urban sciences. Understanding the movement of people and their spatial trajectorits would greatly aid the development of policies for sustainable urban living including urban traffic analysis and smart city management.
Shuo Wang, Richard Sinnott, Surya Nepal
openaire +1 more source
Trajectory Privacy Protection on Spatial Streaming Data with Differential Privacy
2018 IEEE Global Communications Conference (GLOBECOM), 2018Continuously sharing user's trajectory data which contain one's location information makes the crowd sensing of the traffic dynamics and mobility trends feasible. This kind of spatial streaming data is beneficial for intelligent transportation but at the risk of disclosing personal privacy, even if it is published in statistical form such as “the ...
Xiang Liu +3 more
openaire +1 more source
Historical Trajectories Based Location Privacy Protection Query
2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 IEEE 11th Intl Conf on Autonomic and Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops, 2014With the wide adoption of intelligent mobile phone with global positioning functionalities, location based services (LBS) are more and more popular. Location privacy becomes an important issue. The current methods on privacy protection can be classified into the following folds: privacy preserving LBS query in a real time manner, privacy protection on ...
Liu Cao, Yuqing Sun, Haoran Xu
openaire +1 more source
Protecting Privacy in Trajectories with a User-Centric Approach
ACM Transactions on Knowledge Discovery from Data, 2018The increased use of location-aware devices, such as smartphones, generates a large amount of trajectory data. These data can be useful in several domains, like marketing, path modeling, localization of an epidemic focus, and so on. Nevertheless, since trajectory information contains personal mobility data, improper use or publication of trajectory ...
Romero-Tris, Cristina, Megias, David
openaire +1 more source
Trajectory Privacy Protection Based on Location Semantic Perception
International Journal of Cooperative Information Systems, 2019A personalized trajectory privacy protection method based on location semantic perception to achieve the personalized goal of privacy protection parameter setting and policy selection is proposed. The concept of user perception is introduced and a set of security samples that the user feels safe and has no risk of privacy leakage is set by the user’s ...
Zhao-Wei Hu, Jing Yang
openaire +1 more source

