You Can Walk Alone: Trajectory Privacy-Preserving through Significant Stays Protection

Z Huo, X Meng, H Hu, Y Huang - … DASFAA 2012, Busan, South Korea, April …, 2012 - Springer
Publication of moving objects' everyday life trajectories may cause serious personal privacy
leakage. Existing trajectory privacy-preserving methods try to anonymize k whole trajectories …

History trajectory privacy-preserving through graph partition

Z Huo, Y Huang, X Meng - Proceedings of the 1st international workshop …, 2011 - dl.acm.org
With rapid development of positioning techniques and location based services (LBS),
locations and traces of moving objects are collected by service providers, the data will then …

Novel privacy-preserving algorithm based on frequent path for trajectory data publishing

Y Dong, D Pi - Knowledge-Based Systems, 2018 - Elsevier
Existing location-based services have collected a large amount of location data, which
contain users' personal information and has serious personal privacy leakage threats …

A novel time-obfuscated algorithm for trajectory privacy protection

RH Hwang, YL Hsueh… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
Location-based services (LBS) which bring so much convenience to our daily life have been
intensively studied over the years. Generally, an LBS query processing can be categorized …

Privacy-preserving trajectory stream publishing

K Al-Hussaeni, BCM Fung, WK Cheung - Data & Knowledge Engineering, 2014 - Elsevier
Recent advancement in mobile computing and sensory technology has facilitated the
possibility of continuously updating, monitoring, and detecting the latest location and status …

A survey and experimental study on privacy-preserving trajectory data publishing

F Jin, W Hua, M Francia, P Chao… - … on Knowledge and …, 2022 - ieeexplore.ieee.org
Trajectory data has become ubiquitous nowadays, which can benefit various real-world
applications such as traffic management and location-based services. However, trajectories …

Privacy-preserving trajectory data publishing by local suppression

R Chen, BCM Fung, N Mohammed, BC Desai… - Information Sciences, 2013 - Elsevier
The pervasiveness of location-aware devices has spawned extensive research in trajectory
data mining, resulting in many important real-life applications. Yet, the privacy issue in …

PPTD: Preserving personalized privacy in trajectory data publishing by sensitive attribute generalization and trajectory local suppression

EG Komishani, M Abadi, F Deldar - Knowledge-Based Systems, 2016 - Elsevier
Trajectory data often provide useful information that can be used in real-life applications,
such as traffic management, Geo-marketing, and location-based advertising. However, a …

Protecting Trajectory From Semantic Attack Considering -Anonymity, -Diversity, and -Closeness

Z Tu, K Zhao, F Xu, Y Li, L Su… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Nowadays, human trajectories are widely collected and utilized for scientific research and
business purpose. However, publishing trajectory data without proper handling might cause …

[HTML][HTML] Personalized semantic trajectory privacy preservation through trajectory reconstruction

Y Dai, J Shao, C Wei, D Zhang, HT Shen - World Wide Web, 2018 - Springer
Trajectory data gathered by mobile positioning techniques and location-aware devices
contain plenty of sensitive spatial-temporal and semantic information, and can support many …