Hierarchical interpolation point anonymity for trajectory privacy protection
暂无分享,去创建一个
[1] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[2] Chunjun Qian,et al. An integrated method for atherosclerotic carotid plaque segmentation in ultrasound image , 2018, Comput. Methods Programs Biomed..
[3] Marco Gruteser,et al. USENIX Association , 1992 .
[4] Anil K. Jain,et al. A modified Hausdorff distance for object matching , 1994, Proceedings of 12th International Conference on Pattern Recognition.
[5] Francesco Bonchi,et al. Never Walk Alone: Uncertainty for Anonymity in Moving Objects Databases , 2008, 2008 IEEE 24th International Conference on Data Engineering.
[6] Kun Gao,et al. Deep data analyzing algorithm based on scale space theory , 2017, Cluster Computing.
[7] Torben Bach Pedersen,et al. Privacy: preserving trajectory collection , 2008, GIS '08.
[8] Ling Liu,et al. MobiMix: Protecting location privacy with mix-zones over road networks , 2011, 2011 IEEE 27th International Conference on Data Engineering.
[9] Dechang Pi,et al. Novel Privacy-preserving algorithm based on frequent path for trajectory data publishing , 2018, Knowl. Based Syst..
[10] Wen-Chih Peng,et al. Dummy-Based Schemes for Protecting Movement Trajectories , 2012, J. Inf. Sci. Eng..
[11] Cong Sun,et al. Balancing trajectory privacy and data utility using a personalized anonymization model , 2014, J. Netw. Comput. Appl..
[12] Wang-Chien Lee,et al. Protecting Moving Trajectories with Dummies , 2007, 2007 International Conference on Mobile Data Management.
[13] Jianfeng Ma,et al. TrPF: A Trajectory Privacy-Preserving Framework for Participatory Sensing , 2013, IEEE Transactions on Information Forensics and Security.
[14] Lei Chen,et al. Robust and fast similarity search for moving object trajectories , 2005, SIGMOD '05.
[15] Hamid R. Arabnia,et al. Spatial and Temporal Target Association through Semantic Analysis and GPS Data Mining , 2007, IKE.
[16] Daniel P. Huttenlocher,et al. Comparing Images Using the Hausdorff Distance , 1993, IEEE Trans. Pattern Anal. Mach. Intell..
[17] Junzhong Gu,et al. A modified Hausdorff distance based algorithm for 2-dimensional spatial trajectory matching , 2010, 2010 5th International Conference on Computer Science & Education.
[18] Muthu Ramachandran,et al. Efficient location privacy algorithm for Internet of Things (IoT) services and applications , 2017, J. Netw. Comput. Appl..
[19] Qiang Qu,et al. An Effective Privacy Architecture to Preserve User Trajectories in Reward-Based LBS Applications , 2018, ISPRS Int. J. Geo Inf..
[20] Nikos Mamoulis,et al. Privacy Preservation in the Publication of Trajectories , 2008, The Ninth International Conference on Mobile Data Management (mdm 2008).
[21] Liang Gao,et al. Differential evolution algorithm-based range image registration for free-form surface parts quality inspection , 2017, Swarm Evol. Comput..
[22] Zhiqiang Xie,et al. The privacy preserving method for dynamic trajectory releasing based on adaptive clustering , 2017, Inf. Sci..
[23] Daniel P. Huttenlocher,et al. Comparing images using the Hausdorff distance under translation , 1992, Proceedings 1992 IEEE Computer Society Conference on Computer Vision and Pattern Recognition.
[24] Xiaoyu Yang,et al. A Privacy-Preserving Compression Storage Method for Large Trajectory Data in Road Network , 2018, Journal of Grid Computing.
[25] Francesco Bonchi,et al. Anonymization of moving objects databases by clustering and perturbation , 2010, Inf. Syst..
[26] Arun Kumar Sangaiah,et al. CenLocShare: A centralized privacy-preserving location-sharing system for mobile online social networks , 2017, Future Gener. Comput. Syst..
[27] Jianfeng Ma,et al. Towards Location and Trajectory Privacy Protection in Participatory Sensing , 2011, MobiCASE.
[28] Young Joon Ahn,et al. Sequence of Gn LN polynomial curves approximating circular arcs , 2018, J. Comput. Appl. Math..
[29] Mukhtiar Ali Unar,et al. Privacy Preserving Dynamic Pseudonym-Based Multiple Mix-Zones Authentication Protocol over Road Networks , 2017, Wirel. Pers. Commun..
[30] Hua Lu,et al. PAD: privacy-area aware, dummy-based location privacy in mobile services , 2008, MobiDE '08.
[31] Takahiro Hara,et al. Dummy-Based User Location Anonymization Under Real-World Constraints , 2016, IEEE Access.
[32] Xiaofeng Meng,et al. History trajectory privacy-preserving through graph partition , 2011, MLBS '11.
[33] Lisheng Wang,et al. A topo-graph model for indistinct target boundary definition from anatomical images , 2018, Comput. Methods Programs Biomed..
[34] Josep Domingo-Ferrer,et al. On the privacy offered by (k, δ)-anonymity , 2013, Inf. Syst..
[35] Yiannis Kompatsiaris,et al. ARC-OCT: Automatic detection of lumen border in intravascular OCT images , 2017, Comput. Methods Programs Biomed..
[36] Rick Siow Mong Goh,et al. QLDS: A Novel Design Scheme for Trajectory Privacy Protection with Utility Guarantee in Participatory Sensing , 2018, IEEE Transactions on Mobile Computing.