4.8 Article

A Semantic-Preserving Scheme to Trajectory Synthesis Using Differential Privacy

Related references

Note: Only part of the references are listed.
Article Computer Science, Artificial Intelligence

Utility-aware and Privacy-preserving Trajectory Synthesis Model that Resists Social Relationship Privacy Attacks

Zhirun Zheng et al.

Summary: This article proposes a new trajectory synthesis model, (ST)-T-3-Trajectory, that effectively resists privacy attacks and ensures data utility. It addresses the shortcomings of existing work that overlooks the spatial-temporal correlations within trajectories and privacy leakage of social relationships between different users' trajectories.

ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY (2022)

Article Computer Science, Information Systems

Sensitive attribute privacy preservation of trajectory data publishing based on l-diversity

Lin Yao et al.

Summary: The widespread use of positioning technology has enabled the collection of people's movements for knowledge-based decision-making. However, the sensitive nature of the collected data raises privacy concerns. To address this, a data privacy preservation scheme with enhanced l-diversity is proposed to prevent privacy leakage. Experimental results show that this scheme can achieve better privacy without sacrificing utility compared to existing privacy preservation schemes on trajectory data.

DISTRIBUTED AND PARALLEL DATABASES (2021)

Article Computer Science, Information Systems

Privacy-Preserving Trajectory Data Publishing by Dynamic Anonymization with Bounded Distortion

Songyuan Li et al.

Summary: This paper proposes a dynamic anonymization method for trajectory privacy protection, which mixes individual trajectories in a localized manner to form synthetic trajectory data set with bounded distortion for publishing, protecting location information privacy associated with individuals and ensuring guaranteed utility of the published data. Results show that the proposed method achieves better data utilization performance compared to existing methods without compromising data security against attacks.

ISPRS INTERNATIONAL JOURNAL OF GEO-INFORMATION (2021)

Article Computer Science, Information Systems

Mobile Semantic-Aware Trajectory for Personalized Location Privacy Preservation

Guoying Qiu et al.

Summary: This article introduces a mobile semantic-aware privacy model, MSP, to address the personalized requirements between users and locations. By constructing a hierarchical semantic tree and evaluating the privacy sensitivity of locations, an adaptive privacy-preserving mechanism is developed to achieve a balance between personalized privacy preservation and data availability.

IEEE INTERNET OF THINGS JOURNAL (2021)

Article Computer Science, Information Systems

Privacy preserving semantic trajectory data publishing for mobile location-based services

Rong Tan et al.

WIRELESS NETWORKS (2020)

Article Computer Science, Information Systems

TGM: A Generative Mechanism for Publishing Trajectories With Differential Privacy

Soheila Ghane et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Article Computer Science, Artificial Intelligence

Novel trajectory privacy-preserving method based on prefix tree using differential privacy

Xiaodong Zhao et al.

KNOWLEDGE-BASED SYSTEMS (2020)

Proceedings Paper Computer Science, Hardware & Architecture

Privacy Preserving Trajectory Data Publishing with Personalized Differential Privacy

Ruxue Wen et al.

2020 IEEE INTL SYMP ON PARALLEL & DISTRIBUTED PROCESSING WITH APPLICATIONS, INTL CONF ON BIG DATA & CLOUD COMPUTING, INTL SYMP SOCIAL COMPUTING & NETWORKING, INTL CONF ON SUSTAINABLE COMPUTING & COMMUNICATIONS (ISPA/BDCLOUD/SOCIALCOM/SUSTAINCOM 2020) (2020)

Proceedings Paper Computer Science, Information Systems

A Differentially Private Trajectory Publishing Mechanism Based on Stay Points

Ying Xia et al.

CYBERSPACE SAFETY AND SECURITY, PT I (2020)

Article Computer Science, Artificial Intelligence

Novel trajectory data publishing method under differential privacy

Xiaodong Zhao et al.

EXPERT SYSTEMS WITH APPLICATIONS (2019)

Proceedings Paper Computer Science, Information Systems

Publishing Sensitive Trajectory Data under Enhanced l-Diversity Model

Lin Yao et al.

2019 20TH INTERNATIONAL CONFERENCE ON MOBILE DATA MANAGEMENT (MDM 2019) (2019)

Article Automation & Control Systems

Location Privacy Protection Based on Differential Privacy Strategy for Big Data in Industrial Internet of Things

Chunyong Yin et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2018)

Article Computer Science, Information Systems

Personalized semantic trajectory privacy preservation through trajectory reconstruction

Yan Dai et al.

WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS (2018)

Article Computer Science, Hardware & Architecture

SafePath: Differentially-private publishing of passenger trajectories in transportation systems

Khalil Al-Hussaeni et al.

COMPUTER NETWORKS (2018)

Article Computer Science, Artificial Intelligence

Novel Privacy-preserving algorithm based on frequent path for trajectory data publishing

Yulan Dong et al.

KNOWLEDGE-BASED SYSTEMS (2018)

Article Computer Science, Information Systems

Research on Trajectory Data Releasing Method via Differential Privacy Based on Spatial Partition

Qilong Han et al.

SECURITY AND COMMUNICATION NETWORKS (2018)

Article Computer Science, Information Systems

Achieving differential privacy of trajectory data publishing in participatory sensing

Meng Li et al.

INFORMATION SCIENCES (2017)

Article Computer Science, Information Systems

Protecting personal trajectories of social media users through differential privacy

Shuo Wang et al.

COMPUTERS & SECURITY (2017)

Article Computer Science, Artificial Intelligence

PPTD: Preserving personalized privacy in trajectory data publishing by sensitive attribute generalization and trajectory local suppression

Elahe Ghasemi Komishani et al.

KNOWLEDGE-BASED SYSTEMS (2016)

Proceedings Paper Computer Science, Theory & Methods

Synthesizing Plausible Privacy-Preserving Location Traces

Vincent Bindschaedler et al.

2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP) (2016)

Article Computer Science, Artificial Intelligence

Trajectory Data Mining: An Overview

Yu Zheng

ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY (2015)

Proceedings Paper Computer Science, Information Systems

SST: Privacy Preserving for Semantic Trajectories

Pin-I Han et al.

2015 16TH IEEE INTERNATIONAL CONFERENCE ON MOBILE DATA MANAGEMENT, VOL 2 (2015)

Article Computer Science, Information Systems

OPT: Differentially Private Trajectory Synthesis Using Hierarchical Reference Systems

Xi He et al.

PROCEEDINGS OF THE VLDB ENDOWMENT (2015)

Article Multidisciplinary Sciences

Unique in the Crowd: The privacy bounds of human mobility

Yves-Alexandre de Montjoye et al.

SCIENTIFIC REPORTS (2013)

Article Computer Science, Artificial Intelligence

Learning Travel Recommendations from User-Generated GPS Traces

Yu Zheng et al.

ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY (2011)

Article Computer Science, Hardware & Architecture

Privacy Integrated Queries: An Extensible Platform for Privacy-Preserving Data Analysis

Frank McSherry

COMMUNICATIONS OF THE ACM (2010)

Article Computer Science, Information Systems

Calibrating noise to sensitivity in private data analysis

Cynthia Dwork et al.

THEORY OF CRYPTOGRAPHY, PROCEEDINGS (2006)