Results 21 to 30 of about 89,030 (269)

Time Distortion Anonymization for the Publication of Mobility Data with High Utility [PDF]

open access: yes, 2015
An increasing amount of mobility data is being collected every day by different means, such as mobile applications or crowd-sensing campaigns. This data is sometimes published after the application of simple anonymization techniques (e.g., putting an ...
Brunie, Lionel   +3 more
core   +3 more sources

Trajectory data privacy protection based on differential privacy mechanism

open access: yesIOP Conference Series: Materials Science and Engineering, 2018
In this paper, we propose a trajectory data privacy protection scheme based on differential privacy mechanism. In the proposed scheme, the algorithm first selects the protected points from the user's trajectory data; secondly, the algorithm forms the polygon according to the protected points and the adjacent and high frequent accessed points that are ...
Ke Gu, Lihao Yang, Yongzhi Liu, Bo Yin
openaire   +2 more sources

Trajectory privacy data publishing scheme based on local optimisation and R-tree

open access: yesConnection Science, 2023
The proliferation of location-based service applications has led to a substantial surge in the amount of life trajectory data produced by mobile devices. And these data frequently contain confidential personal details.
Peiqian Liu   +3 more
doaj   +1 more source

Privacy-Preserving Trajectory Data Publishing by Dynamic Anonymization with Bounded Distortion

open access: yesISPRS International Journal of Geo-Information, 2021
Publication of trajectory data that contain rich information of vehicles in the dimensions of time and space (location) enables online monitoring and supervision of vehicles in motion and offline traffic analysis for various management tasks. However, it
Songyuan Li   +3 more
doaj   +1 more source

Spatio-Temporal Techniques for User Identification by means of GPS Mobility Data [PDF]

open access: yes, 2015
One of the greatest concerns related to the popularity of GPS-enabled devices and applications is the increasing availability of the personal location information generated by them and shared with application and service providers.
Musolesi, Mirco   +2 more
core   +4 more sources

Trajectory mining, representation and privacy protection [PDF]

open access: yesProceedings of the 2nd ACM SIGSPATIAL PhD Workshop, 2015
The maturing of mobile devices and systems provides an unprecedented opportunity to collect a large amount of real world human motion data at all scales. The rich knowledge contained in these data sets is valuable. In this analysis, we first study information dissemination through the physical contacts learnt from the data sets.
openaire   +1 more source

Real-time trajectory privacy protection based on improved differential privacy method and deep learning model

open access: yesJournal of Cloud Computing: Advances, Systems and Applications, 2022
Accurate and real-time trajectory data publishing plays an important role in providing users with the latest traffic and road condition information to help in rationally planning travel time and routes.
Jing Xiong, Hong Zhu
doaj   +1 more source

A system-theoretic framework for privacy preservation in continuous-time multiagent dynamics

open access: yes, 2020
In multiagent dynamical systems, privacy protection corresponds to avoid disclosing the initial states of the agents while accomplishing a distributed task. The system-theoretic framework described in this paper for this scope, denoted dynamical privacy,
Altafini, Claudio
core   +1 more source

Ethics of Artificial Intelligence [PDF]

open access: yes, 2021
Artificial intelligence (AI) is a digital technology that will be of major importance for the development of humanity in the near future. AI has raised fundamental questions about what we should do with such systems, what the systems themselves should do,
Müller, Vincent C.
core  

Shape similarity differential privacy trajectory protection mechanism based on relative entropy and K-means

open access: yesTongxin xuebao, 2021
To solve the problem that most studies had not fully considered the sensitivity of location to privacy budget and the influence of trajectory shape, which made the usability of published trajectory poor, a shape similarity differential privacy trajectory
Suxia ZHU, Shulun LIU, Guanglu SUN
doaj   +2 more sources

Home - About - Disclaimer - Privacy