Hierarchical interpolation point anonymity for trajectory privacy protection

[1]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[2]  Chunjun Qian,et al.  An integrated method for atherosclerotic carotid plaque segmentation in ultrasound image , 2018, Comput. Methods Programs Biomed..

[3]  Marco Gruteser,et al.  USENIX Association , 1992 .

[4]  Anil K. Jain,et al.  A modified Hausdorff distance for object matching , 1994, Proceedings of 12th International Conference on Pattern Recognition.

[5]  Francesco Bonchi,et al.  Never Walk Alone: Uncertainty for Anonymity in Moving Objects Databases , 2008, 2008 IEEE 24th International Conference on Data Engineering.

[6]  Kun Gao,et al.  Deep data analyzing algorithm based on scale space theory , 2017, Cluster Computing.

[7]  Torben Bach Pedersen,et al.  Privacy: preserving trajectory collection , 2008, GIS '08.

[8]  Ling Liu,et al.  MobiMix: Protecting location privacy with mix-zones over road networks , 2011, 2011 IEEE 27th International Conference on Data Engineering.

[9]  Dechang Pi,et al.  Novel Privacy-preserving algorithm based on frequent path for trajectory data publishing , 2018, Knowl. Based Syst..

[10]  Wen-Chih Peng,et al.  Dummy-Based Schemes for Protecting Movement Trajectories , 2012, J. Inf. Sci. Eng..

[11]  Cong Sun,et al.  Balancing trajectory privacy and data utility using a personalized anonymization model , 2014, J. Netw. Comput. Appl..

[12]  Wang-Chien Lee,et al.  Protecting Moving Trajectories with Dummies , 2007, 2007 International Conference on Mobile Data Management.

[13]  Jianfeng Ma,et al.  TrPF: A Trajectory Privacy-Preserving Framework for Participatory Sensing , 2013, IEEE Transactions on Information Forensics and Security.

[14]  Lei Chen,et al.  Robust and fast similarity search for moving object trajectories , 2005, SIGMOD '05.

[15]  Hamid R. Arabnia,et al.  Spatial and Temporal Target Association through Semantic Analysis and GPS Data Mining , 2007, IKE.

[16]  Daniel P. Huttenlocher,et al.  Comparing Images Using the Hausdorff Distance , 1993, IEEE Trans. Pattern Anal. Mach. Intell..

[17]  Junzhong Gu,et al.  A modified Hausdorff distance based algorithm for 2-dimensional spatial trajectory matching , 2010, 2010 5th International Conference on Computer Science & Education.

[18]  Muthu Ramachandran,et al.  Efficient location privacy algorithm for Internet of Things (IoT) services and applications , 2017, J. Netw. Comput. Appl..

[19]  Qiang Qu,et al.  An Effective Privacy Architecture to Preserve User Trajectories in Reward-Based LBS Applications , 2018, ISPRS Int. J. Geo Inf..

[20]  Nikos Mamoulis,et al.  Privacy Preservation in the Publication of Trajectories , 2008, The Ninth International Conference on Mobile Data Management (mdm 2008).

[21]  Liang Gao,et al.  Differential evolution algorithm-based range image registration for free-form surface parts quality inspection , 2017, Swarm Evol. Comput..

[22]  Zhiqiang Xie,et al.  The privacy preserving method for dynamic trajectory releasing based on adaptive clustering , 2017, Inf. Sci..

[23]  Daniel P. Huttenlocher,et al.  Comparing images using the Hausdorff distance under translation , 1992, Proceedings 1992 IEEE Computer Society Conference on Computer Vision and Pattern Recognition.

[24]  Xiaoyu Yang,et al.  A Privacy-Preserving Compression Storage Method for Large Trajectory Data in Road Network , 2018, Journal of Grid Computing.

[25]  Francesco Bonchi,et al.  Anonymization of moving objects databases by clustering and perturbation , 2010, Inf. Syst..

[26]  Arun Kumar Sangaiah,et al.  CenLocShare: A centralized privacy-preserving location-sharing system for mobile online social networks , 2017, Future Gener. Comput. Syst..

[27]  Jianfeng Ma,et al.  Towards Location and Trajectory Privacy Protection in Participatory Sensing , 2011, MobiCASE.

[28]  Young Joon Ahn,et al.  Sequence of Gn LN polynomial curves approximating circular arcs , 2018, J. Comput. Appl. Math..

[29]  Mukhtiar Ali Unar,et al.  Privacy Preserving Dynamic Pseudonym-Based Multiple Mix-Zones Authentication Protocol over Road Networks , 2017, Wirel. Pers. Commun..

[30]  Hua Lu,et al.  PAD: privacy-area aware, dummy-based location privacy in mobile services , 2008, MobiDE '08.

[31]  Takahiro Hara,et al.  Dummy-Based User Location Anonymization Under Real-World Constraints , 2016, IEEE Access.

[32]  Xiaofeng Meng,et al.  History trajectory privacy-preserving through graph partition , 2011, MLBS '11.

[33]  Lisheng Wang,et al.  A topo-graph model for indistinct target boundary definition from anatomical images , 2018, Comput. Methods Programs Biomed..

[34]  Josep Domingo-Ferrer,et al.  On the privacy offered by (k, δ)-anonymity , 2013, Inf. Syst..

[35]  Yiannis Kompatsiaris,et al.  ARC-OCT: Automatic detection of lumen border in intravascular OCT images , 2017, Comput. Methods Programs Biomed..

[36]  Rick Siow Mong Goh,et al.  QLDS: A Novel Design Scheme for Trajectory Privacy Protection with Utility Guarantee in Participatory Sensing , 2018, IEEE Transactions on Mobile Computing.