[PDF][PDF] Grid Anonymous Trajectory Privacy Protection Algorithm Based on Differential Privacy

H Dai, Z Wu, S Wang, K Wu - IAENG International Journal of Applied …, 2023 - iaeng.org
Attackers can use data analysis to learn about the user's regular habits if the current
trajectory data is shared and used without being processed. It will lead to the user's private …

[PDF][PDF] A differential privacy based (k-ψ)-anonymity method for trajectory data publishing

H Chen, S Li, Z Zhang - Computers, Materials & Continua, 2020 - cdn.techscience.cn
In recent years, mobile Internet technology and location based services have wide
application. Application providers and users have accumulated huge amount of trajectory …

Efficient trajectory data privacy protection scheme based on laplace's differential privacy

K Gu, L Yang, Y Liu, B Yin - Informatica, 2018 - informatica.si
Now many applications of location data have facilitated people's daily life. However,
publishing location data may divulge individual sensitive information so as to influence …

Personalized trajectory privacy protection method based on user-requirement

Z Hu, J Yang, J Zhang - International Journal of Cooperative …, 2018 - World Scientific
Trajectory data often provides useful information that can be utilized in real-life applications,
such as traffic planning and location-based advertising. Because people's trajectory …

Novel trajectory data publishing method under differential privacy

X Zhao, Y Dong, D Pi - Expert Systems with Applications, 2019 - Elsevier
The existing location-based services have collected a large amount of user trajectory data,
and if these data are directly released without any processing, the user's personal privacy …

Privacy protection algorithm based on trajectory shape diversity

D SUN, Y LUO, G FAN, L GUO, X ZHENG - Journal of Computer …, 2016 - joca.cn
The high similarity between trajectories in anonymity set may lead to the trajectory privacy
leak. In order to solve the problem, a trajectory privacy preserving algorithm based on …

Trajectory privacy protection method based on the time interval divided

Z Hu, J Yang, J Zhang - Computers & Security, 2018 - Elsevier
Trajectory data often provides information that is well applicable to real-world scenarios
such as traffic planning and location-based advertising. Individual trajectory information may …

A Group-Correlated Privacy Protection Trajectory Publishing Method Based on Differential Privacy

X Zhao, F Xia, G Yuan, S Chen… - 2022 IEEE 8th …, 2022 - ieeexplore.ieee.org
The group relationship (Community Relation) contained in the trajectory data can be used
for hot spot exploration, community governance, and traffic diversion, which has broad …

Research on trajectory data releasing method via differential privacy based on spatial partition

Q Han, Z Xiong, K Zhang - Security and Communication …, 2018 - Wiley Online Library
A number of security and privacy challenges of cyber system are arising due to the rapidly
evolving scale and complexity of modern system and networks. The cyber system is a …

[HTML][HTML] Trajectory data publication based on differential privacy

Z Gu, G Zhang - International Journal of Information Security and …, 2023 - igi-global.com
Analyzing trajectory data can provide people with a higher quality of life. However,
publishing trajectory data directly will leak privacy. The authors propose a trajectory data …