Results 1 to 10 of about 413,134 (172)

A Privacy-Preserving Trajectory Publishing Method Based on Multi-Dimensional Sub-Trajectory Similarities [PDF]

open access: yesSensors, 2023
With the popularity of location services and the widespread use of trajectory data, trajectory privacy protection has become a popular research area. k-anonymity technology is a common method for achieving privacy-preserved trajectory publishing.
Hua Shen, Yu Wang, Mingwu Zhang
doaj   +4 more sources

KSDP scheme for trajectory data publishing

open access: yesShenzhen Daxue xuebao. Ligong ban, 2023
For clustering applications in the field of trajectory privacy protection, the k-means algorithm is sensitive to initial values and the number of clusters may be somewhat arbitrary.
ZHANG Jun   +4 more
doaj   +2 more sources

Privacy risks in trajectory data publishing: reconstructing private trajectories from continuous properties [PDF]

open access: yes, 2008
Location and time information about individuals can be captured through GPS devices, GSM phones, RFID tag readers, and by other similar means. Such data can be pre-processed to obtain trajectories which are sequences of spatio-temporal data points ...
Kaplan, Emre   +5 more
core   +3 more sources

A trajectory data publishing algorithm satisfying local suppression [PDF]

open access: yesInternational Journal of Distributed Sensor Networks, 2021
Suppressing the trajectory data to be released can effectively reduce the risk of user privacy leakage. However, the global suppression of the data set to meet the traditional privacy model method reduces the availability of trajectory data.
Xiaohui Li   +3 more
doaj   +2 more sources

Risk-Aware Individual Trajectory Data Publishing With Differential Privacy [PDF]

open access: yesIEEE Access, 2021
Large-scale spatiotemporal data mining has created valuable insights into managing key areas of society and the economy. It has encouraged data owners to release/publish trajectory datasets. However, the ill-informed publication of such valuable datasets
Jianzhe Zhao   +4 more
doaj   +2 more sources

CLM:differential privacy protection method for trajectory publishing

open access: yesTongxin xuebao, 2017
In order to solve the problem existing in differential privacy preserving publishing methods that the independent noise was easy to be filtered out,a differential privacy publishing method for trajectory data (CLM),was proposed.A correlated Laplace ...
Hao WANG   +3 more
doaj   +3 more sources

Dummy trajectory privacy protection scheme for trajectory publishing based on the spatiotemporal correlation

open access: yesTongxin xuebao, 2016
The spatiotemporal correlation was analyzed between neighboring locations and the trajectories similarity from the movement direction, the reachable time between neighboring locations and the movement distance, and a dummy trajectory privacy protection ...
Kai-yue LEI   +5 more
doaj   +3 more sources

Successive Trajectory Privacy Protection with Semantics Prediction Differential Privacy

open access: yesEntropy, 2022
The publication of trajectory data provides critical information for various location-based services, and it is critical to publish trajectory data safely while ensuring its availability.
Jing Zhang   +4 more
doaj   +1 more source

Differentially Private Timestamps Publishing in Trajectory

open access: yesElectronics, 2023
In recent years, location-based social media has become popular, and a large number of spatiotemporal trajectory data have been generated. Although these data have significant mining value, they also pose a great threat to the privacy of users. At present, many studies have realized the privacy-preserving mechanism of location data in social media in ...
Liang Yan   +5 more
openaire   +1 more source

Privacy-Preserving Trajectory Data Publishing by Dynamic Anonymization with Bounded Distortion

open access: yesISPRS International Journal of Geo-Information, 2021
Publication of trajectory data that contain rich information of vehicles in the dimensions of time and space (location) enables online monitoring and supervision of vehicles in motion and offline traffic analysis for various management tasks. However, it
Songyuan Li   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy