Results 221 to 230 of about 89,030 (269)
Some of the next articles are maybe not open access.

Protecting trajectory privacy: A user-centric analysis

Journal of Network and Computer Applications, 2017
Abstract The existing evaluation methods for location privacy protection mechanism (LPPM) focus mainly on location privacy at the time of issuing a location-based query, and rarely consider trajectory privacy from where multiple successive queries are issued.
Hang Shen   +3 more
openaire   +3 more sources

Novel trajectory privacy protection method against prediction attacks

Expert Systems with Applications, 2023
Shuyuan Qiu   +3 more
openaire   +3 more sources

A personalized trajectory privacy protection method

Computers & Security, 2021
Abstract Trajectory data of sports or activities are usually collected and shared into social apps like Wechat moments, Sina weibo in public to provide health services and recommendation, while a large number of friends with weak ties in social circle will cause privacy leakage of users’ locations and life habits. To solve the problem, a personalized
Jiachun Li, Guoqian Chen
openaire   +1 more source

Trajectory Privacy Protection Method Based on Differential Privacy in Crowdsensing

IEEE Transactions on Services Computing
Qiong Zhang   +5 more
openaire   +3 more sources

Privacy-protected social media user trajectories calibration

2016 IEEE 12th International Conference on e-Science (e-Science), 2016
Advanced data analytics have become an integral part of a number of eScience initiatives including the many challenges facing the urban sciences. Understanding the movement of people and their spatial trajectorits would greatly aid the development of policies for sustainable urban living including urban traffic analysis and smart city management.
Shuo Wang, Richard Sinnott, Surya Nepal
openaire   +1 more source

Trajectory Privacy Protection on Spatial Streaming Data with Differential Privacy

2018 IEEE Global Communications Conference (GLOBECOM), 2018
Continuously sharing user's trajectory data which contain one's location information makes the crowd sensing of the traffic dynamics and mobility trends feasible. This kind of spatial streaming data is beneficial for intelligent transportation but at the risk of disclosing personal privacy, even if it is published in statistical form such as “the ...
Xiang Liu   +3 more
openaire   +1 more source

Historical Trajectories Based Location Privacy Protection Query

2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 IEEE 11th Intl Conf on Autonomic and Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops, 2014
With the wide adoption of intelligent mobile phone with global positioning functionalities, location based services (LBS) are more and more popular. Location privacy becomes an important issue. The current methods on privacy protection can be classified into the following folds: privacy preserving LBS query in a real time manner, privacy protection on ...
Liu Cao, Yuqing Sun, Haoran Xu
openaire   +1 more source

Protecting Privacy in Trajectories with a User-Centric Approach

ACM Transactions on Knowledge Discovery from Data, 2018
The increased use of location-aware devices, such as smartphones, generates a large amount of trajectory data. These data can be useful in several domains, like marketing, path modeling, localization of an epidemic focus, and so on. Nevertheless, since trajectory information contains personal mobility data, improper use or publication of trajectory ...
Romero-Tris, Cristina, Megias, David
openaire   +1 more source

Trajectory Privacy Protection Based on Location Semantic Perception

International Journal of Cooperative Information Systems, 2019
A personalized trajectory privacy protection method based on location semantic perception to achieve the personalized goal of privacy protection parameter setting and policy selection is proposed. The concept of user perception is introduced and a set of security samples that the user feels safe and has no risk of privacy leakage is set by the user’s ...
Zhao-Wei Hu, Jing Yang
openaire   +1 more source

Home - About - Disclaimer - Privacy