Local motion identification and correction schemes for ultrafast CT flow studies

CJ Wolfkiel - Proceedings Fifth Annual IEEE Symposium on …, 1992 - computer.org
Mobile users participate in numerous social media applications that revolve around user
locations, and receive customized services and recommendations tailored to their …

Trajectory Synthesis Method Based on Personalized Local Differential Privacy

O Yuqi - 2023 IEEE 14th International Conference on Software …, 2023 - ieeexplore.ieee.org
Trajectory datasets are widely used in location-based services, providing convenience to
users and posing privacy risks. The traditional approach to trajectory dataset protection …

Differentially-private mining of representative travel patterns

M Maruseac, G Ghinita - 2016 17th IEEE International …, 2016 - ieeexplore.ieee.org
Mobile users participate in numerous social media applications that revolve around user
locations, and receive customized services and recommendations tailored to their …

A novel dummy-based mechanism to protect privacy on trajectories

X Wu, G Sun - 2014 IEEE international conference on data …, 2014 - ieeexplore.ieee.org
In recent years, wireless communication technologies and accurate positioning devices
enable us to enjoy various types of location-based services. However, revealing users …

Differentially private trajectory analysis for points-of-interest recommendation

C Li, B Palanisamy, J Joshi - 2017 IEEE International Congress …, 2017 - ieeexplore.ieee.org
Ubiquitous deployment of low-cost mobile positioning devices and the widespread use of
high-speed wireless networks enable massive collection of large-scale trajectory data of …

Hiding sensitive trajectory patterns

O Abul, M Atzori, F Bonchi… - … Conference on Data …, 2007 - ieeexplore.ieee.org
Spatio-temporal traces left behind by moving individuals are increasingly available. On the
one hand, mining this kind of data is expected to produce interesting behavioral knowledge …

A novel personalized differential privacy mechanism for trajectory data publication

F Tian, S Zhang, L Lu, H Liu… - … Conference on Networking …, 2017 - ieeexplore.ieee.org
With the development of smart city, more organizations analyze people's trajectory data, so
as to provide better location-based services. However, publishing the original trajectory data …

Releasing Differential Private Trajectory Datasets Without Revealing Trajectory Correlations

H Zhu, Y Yu, M Xie - Security and Communication Networks, 2022 - Wiley Online Library
With the prevailing use of smartphones and location‐based services, vast amounts of
trajectory data are collected and used for many applications. When trajectory data are sent …

TGM: A generative mechanism for publishing trajectories with differential privacy

S Ghane, L Kulik… - IEEE Internet of Things …, 2019 - ieeexplore.ieee.org
We describe a new generative algorithm called trajectory generative mechanism (TGM) for
publishing trajectory datasets with ε-differential privacy guarantee, which achieves …

Check for updates A Data Publishing Method for Trajectory Privacy Classification Based on Differential Privacy

Q He, B Liao, P Liu, Q Dong - Frontiers of Networking …, 2024 - books.google.com
The traditional privacy protection method of trajectory data release protects the whole
trajectory to the same degree, resulting in an unjustifiable allocation of the privacy budget …