Results 241 to 250 of about 89,030 (269)
Some of the next articles are maybe not open access.

Dummy-Based Trajectory Privacy Protection Against Exposure Location Attacks

2019
With the development of positioning technology and location-aware devices, moving objects’ location and trajectory information have been collected and published, resulting in serious personal privacy leakage. Existing dummy trajectory privacy preserving method does not consider user’s exposure locations, which causes the adversary can easily exclude ...
Xiangyu Liu   +5 more
openaire   +1 more source

Deviation-Based Location Switching Protocol for Trajectory Privacy Protection

2015
With the development of trajectory data mining, personal privacy information is facing a great threaten. To address the problems, some trajectory privacy-preserving methods are proposed. The trajectory k-anonymous is the mainstream of the current trajectory privacy protection, which trys to anonymize k location together in a cloaked region at every ...
Shaobo Zhang, Qin Liu, Guojun Wang
openaire   +1 more source

Trajectory Privacy Protection Method Based on Sensitivity Analysis

Proceedings of the 2023 7th International Conference on Electronic Information Technology and Computer Engineering, 2023
Shu Gao, Wenfen Liu, Yongcan Lu
openaire   +1 more source

Local Trajectory Privacy Protection in 5G Enabled Industrial Intelligent Logistics

IEEE Transactions on Industrial Informatics, 2022
Zhigang Yang, Ruyan Wang, Dapeng Wu
exaly  

Differential privacy trajectory data protection scheme based on R-tree

Expert Systems With Applications, 2021
Dechang Pi
exaly  

A Triple Real-Time Trajectory Privacy Protection Mechanism Based on Edge Computing and Blockchain in Mobile Crowdsourcing

IEEE Transactions on Mobile Computing, 2023
Weilong Wang, Yingjie Wang, Peiyong Duan
exaly  

Trajectory Privacy Protection Method Based on Sensitive Semantic Location Replacement

Computer Networks, 2023
Ling Xing   +6 more
openaire   +1 more source

A Group-Correlated Privacy Protection Trajectory Publishing Method Based on Differential Privacy

2022 IEEE 8th International Conference on Computer and Communications (ICCC), 2022
Xinjian Zhao   +4 more
openaire   +1 more source

Protecting Location Privacy of Users Based on Trajectory Obfuscation in Mobile Crowdsensing

IEEE Transactions on Industrial Informatics, 2022
Zhigang Gao, Yucai Huang, Leilei Zheng
exaly  

Home - About - Disclaimer - Privacy