Privacy: preserving trajectory collection
暂无分享,去创建一个
[1] Marco Gruteser,et al. USENIX Association , 1992 .
[2] Ashwin Machanavajjhala,et al. l-Diversity: Privacy Beyond k-Anonymity , 2006, ICDE.
[3] Beng Chin Ooi,et al. Effective Density Queries on ContinuouslyMoving Objects , 2006, 22nd International Conference on Data Engineering (ICDE'06).
[4] Sushil Jajodia,et al. Protecting Privacy Against Location-Based Personal Identification , 2005, Secure Data Management.
[5] Torben Bach Pedersen,et al. Privacy-Preserving Data Mining on Moving Object Trajectories , 2007, 2007 International Conference on Mobile Data Management.
[6] Chi-Yin Chow,et al. A peer-to-peer spatial cloaking algorithm for anonymous location-based service , 2006, GIS '06.
[7] Wang-Chien Lee,et al. Protecting Moving Trajectories with Dummies , 2007, 2007 International Conference on Mobile Data Management.
[8] Ling Liu,et al. Location Privacy in Mobile Systems: A Personalized Anonymization Model , 2005, 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05).
[9] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[10] Torben Bach Pedersen,et al. Mining Long, Sharable Patterns in Trajectories of Moving Objects , 2009, STDBM.
[11] Walid G. Aref,et al. Casper*: Query processing for location services without compromising privacy , 2006, TODS.
[12] Elisa Bertino,et al. State-of-the-art in privacy preserving data mining , 2004, SGMD.