Results 1 to 10 of about 413,134 (172)
A Privacy-Preserving Trajectory Publishing Method Based on Multi-Dimensional Sub-Trajectory Similarities [PDF]
With the popularity of location services and the widespread use of trajectory data, trajectory privacy protection has become a popular research area. k-anonymity technology is a common method for achieving privacy-preserved trajectory publishing.
Hua Shen, Yu Wang, Mingwu Zhang
doaj +4 more sources
KSDP scheme for trajectory data publishing
For clustering applications in the field of trajectory privacy protection, the k-means algorithm is sensitive to initial values and the number of clusters may be somewhat arbitrary.
ZHANG Jun +4 more
doaj +2 more sources
Privacy risks in trajectory data publishing: reconstructing private trajectories from continuous properties [PDF]
Location and time information about individuals can be captured through GPS devices, GSM phones, RFID tag readers, and by other similar means. Such data can be pre-processed to obtain trajectories which are sequences of spatio-temporal data points ...
Kaplan, Emre +5 more
core +3 more sources
A trajectory data publishing algorithm satisfying local suppression [PDF]
Suppressing the trajectory data to be released can effectively reduce the risk of user privacy leakage. However, the global suppression of the data set to meet the traditional privacy model method reduces the availability of trajectory data.
Xiaohui Li +3 more
doaj +2 more sources
Risk-Aware Individual Trajectory Data Publishing With Differential Privacy [PDF]
Large-scale spatiotemporal data mining has created valuable insights into managing key areas of society and the economy. It has encouraged data owners to release/publish trajectory datasets. However, the ill-informed publication of such valuable datasets
Jianzhe Zhao +4 more
doaj +2 more sources
CLM:differential privacy protection method for trajectory publishing
In order to solve the problem existing in differential privacy preserving publishing methods that the independent noise was easy to be filtered out,a differential privacy publishing method for trajectory data (CLM),was proposed.A correlated Laplace ...
Hao WANG +3 more
doaj +3 more sources
The spatiotemporal correlation was analyzed between neighboring locations and the trajectories similarity from the movement direction, the reachable time between neighboring locations and the movement distance, and a dummy trajectory privacy protection ...
Kai-yue LEI +5 more
doaj +3 more sources
Successive Trajectory Privacy Protection with Semantics Prediction Differential Privacy
The publication of trajectory data provides critical information for various location-based services, and it is critical to publish trajectory data safely while ensuring its availability.
Jing Zhang +4 more
doaj +1 more source
Differentially Private Timestamps Publishing in Trajectory
In recent years, location-based social media has become popular, and a large number of spatiotemporal trajectory data have been generated. Although these data have significant mining value, they also pose a great threat to the privacy of users. At present, many studies have realized the privacy-preserving mechanism of location data in social media in ...
Liang Yan +5 more
openaire +1 more source
Privacy-Preserving Trajectory Data Publishing by Dynamic Anonymization with Bounded Distortion
Publication of trajectory data that contain rich information of vehicles in the dimensions of time and space (location) enables online monitoring and supervision of vehicles in motion and offline traffic analysis for various management tasks. However, it
Songyuan Li +3 more
doaj +1 more source

