Trajectory privacy protection method based on the time interval divided
暂无分享,去创建一个
[1] Lars Kulik,et al. The CASE histogram: privacy-aware processing of trajectory data using aggregates , 2015, GeoInformatica.
[2] Benjamin C. M. Fung,et al. Privacy-preserving trajectory stream publishing , 2014, Data Knowl. Eng..
[3] Yücel Saygin,et al. Towards trajectory anonymization: a generalization-based approach , 2008, SPRINGL '08.
[4] Mahdi Abadi,et al. PPTD: Preserving personalized privacy in trajectory data publishing by sensitive attribute generalization and trajectory local suppression , 2016, Knowl. Based Syst..
[5] Josep Domingo-Ferrer,et al. From t-closeness to differential privacy and vice versa in data anonymization , 2015, Knowl. Based Syst..
[6] Xu Jian,et al. A Clustering-Based Privacy-Preserving Method for Uncertain Trajectory Data , 2014, TrustCom 2014.
[7] Cong Sun,et al. Balancing trajectory privacy and data utility using a personalized anonymization model , 2014, J. Netw. Comput. Appl..
[8] Vijayalakshmi Atluri,et al. Ensuring Privacy and Security for LBS through Trajectory Partitioning , 2010, 2010 Eleventh International Conference on Mobile Data Management.
[9] Benjamin C. M. Fung,et al. Privacy-preserving trajectory data publishing by local suppression , 2013, Inf. Sci..
[10] Geoffrey I. Webb,et al. Encyclopedia of Machine Learning and Data Mining , 2017, Encyclopedia of Machine Learning and Data Mining.
[11] Benjamin C. M. Fung,et al. Anonymizing trajectory data for passenger flow analysis , 2014 .
[12] Steven Furnell,et al. A novel privacy preserving user identification approach for network traffic , 2017, Comput. Secur..
[13] Jianjun Li,et al. Efficient reverse spatial and textual k nearest neighbor queries on road networks , 2016, Knowl. Based Syst..
[14] Richard O. Sinnott,et al. Protecting personal trajectories of social media users through differential privacy , 2017, Comput. Secur..
[15] Thomas Brinkhoff,et al. Generating Traffic Data , 2003, IEEE Data Eng. Bull..
[16] Francesco Bonchi,et al. Never Walk Alone: Uncertainty for Anonymity in Moving Objects Databases , 2008, 2008 IEEE 24th International Conference on Data Engineering.
[17] Laks V. S. Lakshmanan,et al. Anonymizing moving objects: how to hide a MOB in a crowd? , 2009, EDBT '09.
[18] Muhammad Tanveer,et al. An efficient regularized K-nearest neighbor based weighted twin support vector regression , 2016, Knowl. Based Syst..
[19] Ren-Hung Hwang,et al. A Novel Time-Obfuscated Algorithm for Trajectory Privacy , 2012 .