Related references
Note: Only part of the references are listed.Utility-aware and Privacy-preserving Trajectory Synthesis Model that Resists Social Relationship Privacy Attacks
Zhirun Zheng et al.
ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY (2022)
Sensitive attribute privacy preservation of trajectory data publishing based on l-diversity
Lin Yao et al.
DISTRIBUTED AND PARALLEL DATABASES (2021)
Privacy-Preserving Trajectory Data Publishing by Dynamic Anonymization with Bounded Distortion
Songyuan Li et al.
ISPRS INTERNATIONAL JOURNAL OF GEO-INFORMATION (2021)
Mobile Semantic-Aware Trajectory for Personalized Location Privacy Preservation
Guoying Qiu et al.
IEEE INTERNET OF THINGS JOURNAL (2021)
Privacy preserving semantic trajectory data publishing for mobile location-based services
Rong Tan et al.
WIRELESS NETWORKS (2020)
TGM: A Generative Mechanism for Publishing Trajectories With Differential Privacy
Soheila Ghane et al.
IEEE INTERNET OF THINGS JOURNAL (2020)
Novel trajectory privacy-preserving method based on prefix tree using differential privacy
Xiaodong Zhao et al.
KNOWLEDGE-BASED SYSTEMS (2020)
Privacy Preserving Trajectory Data Publishing with Personalized Differential Privacy
Ruxue Wen et al.
2020 IEEE INTL SYMP ON PARALLEL & DISTRIBUTED PROCESSING WITH APPLICATIONS, INTL CONF ON BIG DATA & CLOUD COMPUTING, INTL SYMP SOCIAL COMPUTING & NETWORKING, INTL CONF ON SUSTAINABLE COMPUTING & COMMUNICATIONS (ISPA/BDCLOUD/SOCIALCOM/SUSTAINCOM 2020) (2020)
A Differentially Private Trajectory Publishing Mechanism Based on Stay Points
Ying Xia et al.
CYBERSPACE SAFETY AND SECURITY, PT I (2020)
Novel trajectory data publishing method under differential privacy
Xiaodong Zhao et al.
EXPERT SYSTEMS WITH APPLICATIONS (2019)
Publishing Sensitive Trajectory Data under Enhanced l-Diversity Model
Lin Yao et al.
2019 20TH INTERNATIONAL CONFERENCE ON MOBILE DATA MANAGEMENT (MDM 2019) (2019)
Location Privacy Protection Based on Differential Privacy Strategy for Big Data in Industrial Internet of Things
Chunyong Yin et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2018)
Personalized semantic trajectory privacy preservation through trajectory reconstruction
Yan Dai et al.
WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS (2018)
SafePath: Differentially-private publishing of passenger trajectories in transportation systems
Khalil Al-Hussaeni et al.
COMPUTER NETWORKS (2018)
Novel Privacy-preserving algorithm based on frequent path for trajectory data publishing
Yulan Dong et al.
KNOWLEDGE-BASED SYSTEMS (2018)
Research on Trajectory Data Releasing Method via Differential Privacy Based on Spatial Partition
Qilong Han et al.
SECURITY AND COMMUNICATION NETWORKS (2018)
Achieving differential privacy of trajectory data publishing in participatory sensing
Meng Li et al.
INFORMATION SCIENCES (2017)
Protecting personal trajectories of social media users through differential privacy
Shuo Wang et al.
COMPUTERS & SECURITY (2017)
PPTD: Preserving personalized privacy in trajectory data publishing by sensitive attribute generalization and trajectory local suppression
Elahe Ghasemi Komishani et al.
KNOWLEDGE-BASED SYSTEMS (2016)
Synthesizing Plausible Privacy-Preserving Location Traces
Vincent Bindschaedler et al.
2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP) (2016)
Trajectory Data Mining: An Overview
Yu Zheng
ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY (2015)
SST: Privacy Preserving for Semantic Trajectories
Pin-I Han et al.
2015 16TH IEEE INTERNATIONAL CONFERENCE ON MOBILE DATA MANAGEMENT, VOL 2 (2015)
OPT: Differentially Private Trajectory Synthesis Using Hierarchical Reference Systems
Xi He et al.
PROCEEDINGS OF THE VLDB ENDOWMENT (2015)
Unique in the Crowd: The privacy bounds of human mobility
Yves-Alexandre de Montjoye et al.
SCIENTIFIC REPORTS (2013)
Learning Travel Recommendations from User-Generated GPS Traces
Yu Zheng et al.
ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY (2011)
Privacy Integrated Queries: An Extensible Platform for Privacy-Preserving Data Analysis
Frank McSherry
COMMUNICATIONS OF THE ACM (2010)
Calibrating noise to sensitivity in private data analysis
Cynthia Dwork et al.
THEORY OF CRYPTOGRAPHY, PROCEEDINGS (2006)