4.6 Article

OPTDP: Towards optimal personalized trajectory differential privacy for trajectory data publishing

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Information Systems

A trajectory privacy-preserving scheme based on a dual-K mechanism for continuous location-based services

Shaobo Zhang et al.

INFORMATION SCIENCES (2020)

Article Computer Science, Information Systems

TGM: A Generative Mechanism for Publishing Trajectories With Differential Privacy

Soheila Ghane et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Article Computer Science, Information Systems

DeePGA: A Privacy-Preserving Data Aggregation Game in Crowdsensing via Deep Reinforcement Learning

Yang Liu et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Article Engineering, Electrical & Electronic

COMP: Online Control Mechanism for Profit Maximization in Privacy- Preserving Crowdsensing

Yang Liu et al.

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2020)

Article Computer Science, Hardware & Architecture

Resilient Range-Based d-Dimensional Localization for Mobile Sensor Networks

Haojun Huang et al.

IEEE-ACM TRANSACTIONS ON NETWORKING (2020)

Article Computer Science, Hardware & Architecture

Anonymization of Sensitive Quasi-Identifiers for l-Diversity and t-Closeness

Yuichi Sei et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2019)

Article Computer Science, Theory & Methods

Online Location Trace Privacy: An Information Theoretic Approach

Wenjing Zhang et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2019)

Article Computer Science, Artificial Intelligence

Quantifying Differential Privacy in Continuous Data Release Under Temporal Correlations

Yang Cao et al.

IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2019)

Article Computer Science, Information Systems

Protecting Trajectory From Semantic Attack Considering k-Anonymity, l-Diversity, and t-Closeness

Zhen Tu et al.

IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT (2019)

Review Computer Science, Information Systems

Privacy in Internet of Things: From Principles to Technologies

Chao Li et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Computer Science, Information Systems

Sampling Big Trajectory Data for Traversal Trajectory Aggregate Query

Yichen Ding et al.

IEEE TRANSACTIONS ON BIG DATA (2019)

Article Computer Science, Information Systems

Personalized semantic trajectory privacy preservation through trajectory reconstruction

Yan Dai et al.

WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS (2018)

Article Computer Science, Theory & Methods

Leveraging Spatial Diversity for Privacy-Aware Location-Based Services in Mobile Networks

Xiaofan He et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)

Article Computer Science, Artificial Intelligence

A Survey of Location Prediction on Twitter

Xin Zheng et al.

IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2018)

Article Computer Science, Information Systems

QLDS: A Novel Design Scheme for Trajectory Privacy Protection with Utility Guarantee in Participatory Sensing

Zhe Xiao et al.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2018)

Article Computer Science, Hardware & Architecture

RobLoP: Towards Robust Privacy Preserving Against Location Dependent Attacks in Continuous LBS Queries

Hongbo Jiang et al.

IEEE-ACM TRANSACTIONS ON NETWORKING (2018)

Article Computer Science, Information Systems

PLDP-TD: Personalized-location differentially private data analysis on trajectory databases

Fatemeh Deldar et al.

PERVASIVE AND MOBILE COMPUTING (2018)

Article Computer Science, Information Systems

ILLIA: Enabling k-Anonymity-Based Privacy Preserving Against Location Injection Attacks in Continuous LBS Queries

Ping Zhao et al.

IEEE INTERNET OF THINGS JOURNAL (2018)

Article Computer Science, Information Systems

Protecting personal trajectories of social media users through differential privacy

Shuo Wang et al.

COMPUTERS & SECURITY (2017)

Article Computer Science, Information Systems

Performance Modelling and Analysis of Software-Defined Networking under Bursty Multimedia Traffic

Wang Miao et al.

ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS (2016)

Article Engineering, Civil

On Geocasting over Urban Bus-Based Networks by Mining Trajectories

Fusang Zhang et al.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2016)

Article Computer Science, Information Systems

CANS: Towards Congestion-Adaptive and Small Stretch Emergency Navigation with Wireless Sensor Networks

Chen Wang et al.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2016)

Proceedings Paper Computer Science, Theory & Methods

Synthesizing Plausible Privacy-Preserving Location Traces

Vincent Bindschaedler et al.

2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP) (2016)

Article Computer Science, Artificial Intelligence

k-anonymity:: A model for protecting privacy

L Sweeney

INTERNATIONAL JOURNAL OF UNCERTAINTY FUZZINESS AND KNOWLEDGE-BASED SYSTEMS (2002)

Article Computer Science, Artificial Intelligence

The Earth Mover's Distance as a metric for image retrieval

Y Rubner et al.

INTERNATIONAL JOURNAL OF COMPUTER VISION (2000)