Results 231 to 240 of about 89,030 (269)
Some of the next articles are maybe not open access.

Mincer Algorithm: Privacy Protection for Publishing Trajectories Dynamically

2020 12th International Conference on Intelligent Human-Machine Systems and Cybernetics (IHMSC), 2020
Some applications require real-time analysis of trajectory data. But the direct release of the original trajectory to a third party for analysis will threaten the privacy of the trajectory subject. So the protection of trajectory privacy published dynamically is important.
Shuai Wang, Chunyi Chen, Guijie Zhang
openaire   +1 more source

User Relationship Privacy Protection on Trajectory Data

2019
Various mobile devices facilitate the users’ life, but the issues are brought into privacy focus by the individuals. This paper aims at the protection of intimate relationships among users. We consider the intimacy of user relationships based on similar sub-trajectories between the users. Then, we propose a \(k_{mn}\)-anonymity protection model.
Zi Yang, Mingda Yang, Bo Ning
openaire   +1 more source

Trajectory Privacy Protection Scheme for Different Travel Modes

2021
The problem of trajectory privacy is getting more attention in recent years. It is unreasonable to adopt the same privacy protection scheme in diversified travel modes, since the trajectories have different constraints under different travel modes.
Yanzi Li   +3 more
openaire   +1 more source

Method of trajectory privacy protection based on restraining trajectory in LBS

International Journal of Information and Communication Technology, 2018
With the development of mobile positioning technology, location-based services are becoming more and more widely used in life, but it has produced the security problem of the user's privacy leakage. In this paper, the problem of user trajectory privacy protection in location-based services is introduced, and a method of trajectory privacy protection ...
Zemao Zhao   +4 more
openaire   +1 more source

Hierarchical interpolation point anonymity for trajectory privacy protection

Intelligent Data Analysis, 2019
The traditional trajectory privacy protection algorithm approaches the task as a single-layer problem. Taking a perspective in harmony with an approach more characteristic of human thinking, in which complex problems are solved hierarchically, we propose a two-level hierarchical granularity model for this problem.
Wang, Xiaohan   +3 more
openaire   +1 more source

Trajectory Privacy Protection Method through Active Points Hiding

2018 Eighth International Conference on Instrumentation & Measurement, Computer, Communication and Control (IMCCC), 2018
The use of individual trajectory information may result in serious invasions of personal privacy or leakage of personal data. Existing trajectory privacy protection methods are designed to protect the whole trajectory rather than to protect sensitive or frequently visited location points, which can cause additional information loss. This paper proposes
Jing Yand, Zhaowei Hu, Jianpei Zhang
openaire   +1 more source

Protecting sensitive place visits in privacy-preserving trajectory publishing

Computers & Security, 2020
Abstract The rise of mobile computing has generated huge amount of trajectory data. Since these data are valuable for many people, publishing them while providing adequate individual privacy protection has been a challenging task. In this paper, we present an algorithm for protecting sensitive place visits in privacy-preserving trajectory publishing.
Nana Wang, Mohan S Kankanhalli
openaire   +1 more source

Protecting Privacy-Sensitive Locations in Trajectories with Correlated Positions

2019 IEEE Global Communications Conference (GLOBECOM), 2019
The location privacy issue has become a critical research topic recently. The existing solutions do not solve one typical problem in practice: people may only want to protect certain privacy-sensitive locations among a group of temporal and spatial correlated points in a trajectory.
Bo Liu   +5 more
openaire   +1 more source

Differential Privacy Trajectory Protection Method Based on Spatiotemporal Correlation

2020
Location-based services provide service and convenience, while causing the leakage of track privacy. The existing trajectory privacy protection methods lack the consideration of the correlation between the noise sequence, the user’s original trajectory sequence, and the published trajectory sequence.
Kangkang Dou, Jian Liu
openaire   +1 more source

Trajectory Privacy Protection Method based on Shadow vehicles

2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), 2021
Yaqiong Ma, Xiangyu Bai, Zhaoran Wang
openaire   +1 more source

Home - About - Disclaimer - Privacy