Privacy preserving semantic trajectory data publishing for mobile location-based services
暂无分享,去创建一个
Rong Tan | Wen Si | Yuan Tao | Yuan-Yuan Zhang | Rong Tan | Wen Si | Y. Tao | Yuanyuan Zhang
[1] David K. Y. Yau,et al. Privacy vulnerability of published anonymous mobility traces , 2013, TNET.
[2] Yu Zheng,et al. Trajectory Data Mining , 2015, ACM Trans. Intell. Syst. Technol..
[3] Xuelong Li,et al. When Location Meets Social Multimedia , 2015, ACM Transactions on Intelligent Systems and Technology.
[4] Xiaofeng Meng,et al. You Can Walk Alone: Trajectory Privacy-Preserving through Significant Stays Protection , 2012, DASFAA.
[5] Yueshen Xu,et al. Network Location-Aware Service Recommendation with Random Walk in Cyber-Physical Systems , 2017, Sensors.
[6] Wang-Chien Lee,et al. Semantic trajectory mining for location prediction , 2011, GIS.
[7] Kai-Florian Richter,et al. Semantic trajectory compression: Representing urban movement in a nutshell , 2012, J. Spatial Inf. Sci..
[8] Xiao-Feng Meng,et al. A Survey of Trajectory Privacy-Preserving Techniques: A Survey of Trajectory Privacy-Preserving Techniques , 2011 .
[9] Laurence T. Yang,et al. A Survey on Electronic Textiles: A Survey on Electronic Textiles , 2011 .
[10] Jure Leskovec,et al. Friendship and mobility: user movement in location-based social networks , 2011, KDD.
[11] 郑凯,et al. 轨迹大数据:数据、应用与技术现状 , 2015 .
[12] Diansheng Guo,et al. Quantifying Animal Trajectories Using Spatial Aggregation and Sequence Analysis: A Case Study of Differentiating Trajectories of Multiple Species , 2016 .
[13] Lilan Liu,et al. Automated Quantitative Verification for Service-Based System Design: A Visualization Transform Tool Perspective , 2018, Int. J. Softw. Eng. Knowl. Eng..
[14] Yucong Duan,et al. Toward service selection for workflow reconfiguration: An interface-based computing solution , 2018, Future Gener. Comput. Syst..
[15] Yucong Duan,et al. Probabilistic Model Checking-Based Service Selection Method for Business Process Modeling , 2017, Int. J. Softw. Eng. Knowl. Eng..
[16] Xing Xie,et al. Social itinerary recommendation from user-generated digital trails , 2012, Personal and Ubiquitous Computing.
[17] Aniket Kittur,et al. Bridging the gap between physical location and online social networks , 2010, UbiComp.
[18] Chi-Yin Chow,et al. Trajectory privacy in location-based services and data publication , 2011, SKDD.
[19] Dino Pedreschi,et al. Trajectory pattern mining , 2007, KDD '07.
[20] Meng Xiao. A Survey of Trajectory Privacy-Preserving Techniques , 2011 .
[21] Wang-Chien Lee,et al. Protecting Moving Trajectories with Dummies , 2007, 2007 International Conference on Mobile Data Management.
[22] Kang Zhang,et al. Applying improved particle swarm optimization for dynamic service composition focusing on quality of service evaluations under hybrid networks , 2018, Int. J. Distributed Sens. Networks.
[23] Yueshen Xu,et al. Collaborative Service Selection via Ensemble Learning in Mixed Mobile Network Environments , 2017, Entropy.
[24] Xing Xie,et al. Discovering regions of different functions in a city using human mobility and POIs , 2012, KDD.
[25] Nikos Mamoulis,et al. Privacy Preservation in the Publication of Trajectories , 2008, The Ninth International Conference on Mobile Data Management (mdm 2008).
[26] Ling Liu,et al. From Data Privacy to Location Privacy: Models and Algorithms , 2007, VLDB.
[27] Yucong Duan,et al. An Approach to Data Consistency Checking for the Dynamic Replacement of Service Process , 2017, IEEE Access.
[28] Qinghua Li,et al. Achieving k-anonymity in privacy-aware location-based services , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.
[29] Yuyu Yin,et al. QoS Prediction for Web Service Recommendation with Network Location-Aware Neighbor Selection , 2016, Int. J. Softw. Eng. Knowl. Eng..
[30] Jian Wan,et al. Location-Aware Service Recommendation With Enhanced Probabilistic Matrix Factorization , 2018, IEEE Access.
[31] Ahmed Elragal,et al. Trajectory data mining: integrating semantics , 2013, J. Enterp. Inf. Manag..
[32] Peter R. Stopher,et al. Review of GPS Travel Survey and GPS Data-Processing Methods , 2014 .
[33] Panos Kalnis,et al. Discovery of Path Nearby Clusters in Spatial Networks , 2015, IEEE Transactions on Knowledge and Data Engineering.
[34] Yücel Saygin,et al. Towards trajectory anonymization: a generalization-based approach , 2008, SPRINGL '08.
[35] Anna Monreale,et al. WhereNext: a location predictor on trajectory pattern mining , 2009, KDD.
[36] Honghao Gao,et al. Applying Probabilistic Model Checking to Financial Production Risk Evaluation and Control: A Case Study of Alibaba’s Yu’e Bao , 2018, IEEE Transactions on Computational Social Systems.
[37] Ling Liu,et al. Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms , 2008, IEEE Transactions on Mobile Computing.