Results 231 to 240 of about 89,030 (269)
Some of the next articles are maybe not open access.
Mincer Algorithm: Privacy Protection for Publishing Trajectories Dynamically
2020 12th International Conference on Intelligent Human-Machine Systems and Cybernetics (IHMSC), 2020Some applications require real-time analysis of trajectory data. But the direct release of the original trajectory to a third party for analysis will threaten the privacy of the trajectory subject. So the protection of trajectory privacy published dynamically is important.
Shuai Wang, Chunyi Chen, Guijie Zhang
openaire +1 more source
User Relationship Privacy Protection on Trajectory Data
2019Various mobile devices facilitate the users’ life, but the issues are brought into privacy focus by the individuals. This paper aims at the protection of intimate relationships among users. We consider the intimacy of user relationships based on similar sub-trajectories between the users. Then, we propose a \(k_{mn}\)-anonymity protection model.
Zi Yang, Mingda Yang, Bo Ning
openaire +1 more source
Trajectory Privacy Protection Scheme for Different Travel Modes
2021The problem of trajectory privacy is getting more attention in recent years. It is unreasonable to adopt the same privacy protection scheme in diversified travel modes, since the trajectories have different constraints under different travel modes.
Yanzi Li +3 more
openaire +1 more source
Method of trajectory privacy protection based on restraining trajectory in LBS
International Journal of Information and Communication Technology, 2018With the development of mobile positioning technology, location-based services are becoming more and more widely used in life, but it has produced the security problem of the user's privacy leakage. In this paper, the problem of user trajectory privacy protection in location-based services is introduced, and a method of trajectory privacy protection ...
Zemao Zhao +4 more
openaire +1 more source
Hierarchical interpolation point anonymity for trajectory privacy protection
Intelligent Data Analysis, 2019The traditional trajectory privacy protection algorithm approaches the task as a single-layer problem. Taking a perspective in harmony with an approach more characteristic of human thinking, in which complex problems are solved hierarchically, we propose a two-level hierarchical granularity model for this problem.
Wang, Xiaohan +3 more
openaire +1 more source
Trajectory Privacy Protection Method through Active Points Hiding
2018 Eighth International Conference on Instrumentation & Measurement, Computer, Communication and Control (IMCCC), 2018The use of individual trajectory information may result in serious invasions of personal privacy or leakage of personal data. Existing trajectory privacy protection methods are designed to protect the whole trajectory rather than to protect sensitive or frequently visited location points, which can cause additional information loss. This paper proposes
Jing Yand, Zhaowei Hu, Jianpei Zhang
openaire +1 more source
Protecting sensitive place visits in privacy-preserving trajectory publishing
Computers & Security, 2020Abstract The rise of mobile computing has generated huge amount of trajectory data. Since these data are valuable for many people, publishing them while providing adequate individual privacy protection has been a challenging task. In this paper, we present an algorithm for protecting sensitive place visits in privacy-preserving trajectory publishing.
Nana Wang, Mohan S Kankanhalli
openaire +1 more source
Protecting Privacy-Sensitive Locations in Trajectories with Correlated Positions
2019 IEEE Global Communications Conference (GLOBECOM), 2019The location privacy issue has become a critical research topic recently. The existing solutions do not solve one typical problem in practice: people may only want to protect certain privacy-sensitive locations among a group of temporal and spatial correlated points in a trajectory.
Bo Liu +5 more
openaire +1 more source
Differential Privacy Trajectory Protection Method Based on Spatiotemporal Correlation
2020Location-based services provide service and convenience, while causing the leakage of track privacy. The existing trajectory privacy protection methods lack the consideration of the correlation between the noise sequence, the user’s original trajectory sequence, and the published trajectory sequence.
Kangkang Dou, Jian Liu
openaire +1 more source
Trajectory Privacy Protection Method based on Shadow vehicles
2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), 2021Yaqiong Ma, Xiangyu Bai, Zhaoran Wang
openaire +1 more source

