The privacy preserving method for dynamic trajectory releasing based on adaptive clustering

Y Xin, ZQ Xie, J Yang - Information Sciences, 2017 - Elsevier
The traditional trajectory privacy preserving methods are static releasing methods, only
focusing on the trajectories in a specific time span. Therefore, the traditional methods need …

Protecting trajectory privacy: A user-centric analysis

H Shen, G Bai, M Yang, Z Wang - Journal of Network and Computer …, 2017 - Elsevier
The existing evaluation methods for location privacy protection mechanism (LPPM) focus
mainly on location privacy at the time of issuing a location-based query, and rarely consider …

A Study of Enhancing Privacy for Intelligent Transportation Systems: -Correlation Privacy Model Against Moving Preference Attacks for Location Trajectory Data

P Sui, X Li, Y Bai - IEEE Access, 2017 - ieeexplore.ieee.org
Internet of Things (IoT) has been widely used in various application domains including smart
city, environment monitoring and intelligent transportation systems. Thousands of …

Using multi-features to recommend friends on location-based social networks

G Xu-Rui, W Li, W Wei-Li - Peer-to-Peer Networking and Applications, 2017 - Springer
Location-based social networks (LBSNs) not only offer novel services but also produce more
abundant data to help new serves for human. It will help discover latent trajectory, possible …

一种个性化移动社交网络轨迹隐私保护方案.

张博闻, 陈晶, 杜瑞颖 - Application Research of Computers …, 2017 - search.ebscohost.com
针对移动社交网络迅猛发展带来的发布轨迹隐私泄露问题, 提出了一种个性化的轨迹保护方案.
根据个体个性化的隐私保护需求差异, 对不同个体采用了不同的保护准则 …

[PDF][PDF] 支持轨迹隐私保护的两阶段用户兴趣区构建方法

冀亚丽, 桂小林, 戴慧珺, 彭振龙 - 计算机学报, 2017 - cjc.ict.ac.cn
摘要针对空间大数据开放共享中平衡隐私保护与数据可用性矛盾的需求, 该文从空间和时间两个
维度对空间时序数据进行分析, 提出蕴含空间, 时间和群体特征的用户兴趣区构建方法 …

K-匿名改进模型下的LCSS-TA 轨迹匿名算法.

郑剑, 刘聪 - Application Research of Computers/Jisuanji …, 2017 - search.ebscohost.com
传统的欧几里德距离度量函数计算轨迹相似性时, 要求轨迹的每个位置点都要有对应点.
由于噪声点的存在, 导致轨迹距离出现较大偏差, 降低轨迹相似性, 增加轨迹的信息损失 …

[HTML][HTML] 基于非敏感信息分析的轨迹数据隐私保护发布

邓劲松, 罗永龙, 俞庆英, 陈付龙 - 计算机应用, 2017 - m.fx361.com
基于非敏感信息分析的轨迹数据隐私保护发布_参考网  APP下载 搜索 基于非敏感信息分析的轨迹
数据隐私保护发布 2017-04-20邓劲松罗永龙俞庆英陈付龙 计算机应用 订阅 2017年2期 收藏 关键词 …

Trajectory anonymisation based on graph split using EMD

P Jagwani, S Kaushik - International Journal of …, 2017 - inderscienceonline.com
Analysing and mining trajectories pose new challenges for trajectory privacy. We are
addressing privacy issue for offline (historical) trajectories which are generally published for …

Privacy preserved approach for trajectory anonymization through zone creation for halting points

N Rajesh, S Abraham - 2017 International Conference on …, 2017 - ieeexplore.ieee.org
The abundance of various embedded sensors on mobile devices results in huge amount of
data generation, storage requirement and also causes the encroachment into the personal …