A survey on trajectory data management, analytics, and learning

S Wang, Z Bao, JS Culpepper, G Cong - ACM Computing Surveys …, 2021 - dl.acm.org
Recent advances in sensor and mobile devices have enabled an unprecedented increase
in the availability and collection of urban trajectory data, thus increasing the demand for …

Technical requirements and approaches in personal data control

J Sim, B Kim, K Jeon, M Joo, J Lim, J Lee… - ACM Computing …, 2023 - dl.acm.org
There has been a trend of moving from simply de-identification to providing extended data
control to their owner (eg, data portability and right to be forgotten), partly due to the …

Trajectory privacy preservation based on a fog structure for cloud location services

T Wang, J Zeng, MZA Bhuiyan, H Tian, Y Cai… - IEEE …, 2017 - ieeexplore.ieee.org
The development of mobile cloud computing technology has made location-based service
(LBS) increasingly more popular. Given the continuous requests to cloud LBS servers, the …

A survey and experimental study on privacy-preserving trajectory data publishing

F Jin, W Hua, M Francia, P Chao… - … on Knowledge and …, 2022 - ieeexplore.ieee.org
Trajectory data has become ubiquitous nowadays, which can benefit various real-world
applications such as traffic management and location-based services. However, trajectories …

Releasing correlated trajectories: Towards high utility and optimal differential privacy

L Ou, Z Qin, S Liao, Y Hong, X Jia - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
A mutual correlation between trajectories of two users is very helpful to real-life applications
such as product recommendation and social media. While providing tremendous benefits …

The privacy preserving method for dynamic trajectory releasing based on adaptive clustering

Y Xin, ZQ Xie, J Yang - Information Sciences, 2017 - Elsevier
The traditional trajectory privacy preserving methods are static releasing methods, only
focusing on the trajectories in a specific time span. Therefore, the traditional methods need …

Counterfeit clones: a novel technique for source and sink location privacy in wireless sensor networks

SA Al-Ahmadi - IEEE Access, 2022 - ieeexplore.ieee.org
Wireless Sensor Networks (WSNs) are an essential part of the Internet of Things (IoT). In
WSNs, sensors are randomly deployed in harsh environments for monitoring purposes. In …

An optimal pufferfish privacy mechanism for temporally correlated trajectories

L Ou, Z Qin, S Liao, H Yin, X Jia - IEEE Access, 2018 - ieeexplore.ieee.org
Temporally correlated trajectories are ubiquitous, and it has been a challenging problem to
protect the temporal correlation from being used against users' privacy. In this paper, we …

Smart management of healthcare professionals involved in COVID-19 contrast with SWAPS

P Bellavista, M Torello, A Corradi… - Frontiers in Sustainable …, 2021 - frontiersin.org
The recent COVID-19 pandemic in Italy has highlighted several critical issues in the
management process of infected people. At the health level, the management of the COVID …

AGENT: An adaptive geo-indistinguishable mechanism for continuous location-based service

X Ma, J Ma, H Li, Q Jiang, S Gao - Peer-to-Peer Networking and …, 2018 - Springer
With the widespread use of Location-base Services (LBSs), the problem of location privacy
has drawn significant attention from the research community. To protect the user's exact …