Results 241 to 250 of about 89,030 (269)
Some of the next articles are maybe not open access.
Dummy-Based Trajectory Privacy Protection Against Exposure Location Attacks
2019With the development of positioning technology and location-aware devices, moving objects’ location and trajectory information have been collected and published, resulting in serious personal privacy leakage. Existing dummy trajectory privacy preserving method does not consider user’s exposure locations, which causes the adversary can easily exclude ...
Xiangyu Liu +5 more
openaire +1 more source
Deviation-Based Location Switching Protocol for Trajectory Privacy Protection
2015With the development of trajectory data mining, personal privacy information is facing a great threaten. To address the problems, some trajectory privacy-preserving methods are proposed. The trajectory k-anonymous is the mainstream of the current trajectory privacy protection, which trys to anonymize k location together in a cloaked region at every ...
Shaobo Zhang, Qin Liu, Guojun Wang
openaire +1 more source
Trajectory Privacy Protection Method Based on Sensitivity Analysis
Proceedings of the 2023 7th International Conference on Electronic Information Technology and Computer Engineering, 2023Shu Gao, Wenfen Liu, Yongcan Lu
openaire +1 more source
Local Trajectory Privacy Protection in 5G Enabled Industrial Intelligent Logistics
IEEE Transactions on Industrial Informatics, 2022Zhigang Yang, Ruyan Wang, Dapeng Wu
exaly
Differential privacy trajectory data protection scheme based on R-tree
Expert Systems With Applications, 2021Dechang Pi
exaly
Trajectory Privacy Protection Method Based on Dummy Trajectory in Sparse Environment
Computer Science and Application, 2022openaire +1 more source
Trajectory Privacy Protection Method Based on Sensitive Semantic Location Replacement
Computer Networks, 2023Ling Xing +6 more
openaire +1 more source
A Group-Correlated Privacy Protection Trajectory Publishing Method Based on Differential Privacy
2022 IEEE 8th International Conference on Computer and Communications (ICCC), 2022Xinjian Zhao +4 more
openaire +1 more source
Protecting Location Privacy of Users Based on Trajectory Obfuscation in Mobile Crowdsensing
IEEE Transactions on Industrial Informatics, 2022Zhigang Gao, Yucai Huang, Leilei Zheng
exaly

