Hasse sensitivity level: A sensitivity-aware trajectory privacy-enhanced framework with Reinforcement Learning

J Zhang, Y Huang, Q Huang, Y Li, X Ye - Future Generation Computer …, 2023 - Elsevier
LBS services generate massive amounts of trajectory data over time, which will be shared
with others for further intelligent services. Due to the ubiquity and openness of LBS, the …

[HTML][HTML] Research on trajectory data releasing method via differential privacy based on spatial partition

Q Han, Z Xiong, K Zhang - Security and Communication Networks, 2018 - hindawi.com
A number of security and privacy challenges of cyber system are arising due to the rapidly
evolving scale and complexity of modern system and networks. The cyber system is a …

Dummy-based trajectory privacy protection against exposure location attacks

X Liu, J Chen, X Xia, C Zong, R Zhu, J Li - International Conference on …, 2019 - Springer
With the development of positioning technology and location-aware devices, moving objects'
location and trajectory information have been collected and published, resulting in serious …

Privacy-protected statistics publication over social media user trajectory streams

S Wang, R Sinnott, S Nepal - Future Generation Computer Systems, 2018 - Elsevier
An increasing amount of user location information is being generated due to the widespread
use of social network applications and the ubiquitous adoption of mobile and wearable …

Differentially private and utility preserving publication of trajectory data

ME Gursoy, L Liu, S Truex, L Yu - IEEE Transactions on Mobile …, 2018 - ieeexplore.ieee.org
The universal popularity of GPS-enabled mobile devices and traffic navigation services has
fueled the growth of trajectory data, as evidenced by Uber Movement and NYC taxi data …

[引用][C] A survey of trajectory privacy-preserving techniques

Z Huo, XF Meng - Jisuanji Xuebao(Chinese …, 2011 - … North Street Beijing 100717 cjcct. ac …

Local trajectory privacy protection in 5G enabled industrial intelligent logistics

Z Yang, R Wang, D Wu, H Wang… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
The value of trajectory data lies mainly in the spatio-temporal correlation. However, the
existing privacy protection methods ignore the spatio-temporal correlation of trajectory data …

A differential privacy-based privacy-preserving data publishing algorithm for transit smart card data

Y Li, D Yang, X Hu - Transportation Research Part C: Emerging …, 2020 - Elsevier
This manuscript is focused on transit smart card data and finds that the release of such
trajectory information after simple anonymization creates high concern about breaching …

DPT: differentially private trajectory synthesis using hierarchical reference systems

X He, G Cormode, A Machanavajjhala… - Proceedings of the …, 2015 - wrap.warwick.ac.uk
GPS-enabled devices are now ubiquitous, from airplanes and cars to smartphones and
wearable technology. This has resulted in a wealth of data about the movements of …

Protecting trajectory privacy: A user-centric analysis

H Shen, G Bai, M Yang, Z Wang - Journal of Network and Computer …, 2017 - Elsevier
The existing evaluation methods for location privacy protection mechanism (LPPM) focus
mainly on location privacy at the time of issuing a location-based query, and rarely consider …