4.7 Article

Decentralized k-anonymization of trajectories via privacy-preserving tit-for-tat

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Artificial Intelligence

OPTDP: Towards optimal personalized trajectory differential privacy for trajectory data publishing

Wenqing Cheng et al.

Summary: This paper proposes an optimal personalized trajectory differential privacy mechanism, which achieves personalized privacy protection through establishing probabilistic mobility model and semantic location matching, and demonstrates a better tradeoff between privacy protection and data utility in experiments.

NEUROCOMPUTING (2022)

Editorial Material Computer Science, Hardware & Architecture

The Limits of Differential Privacy (and Its Misuse in Data Release and Machine Learning)

Josep Domingo-Ferrer et al.

COMMUNICATIONS OF THE ACM (2021)

Article Computer Science, Hardware & Architecture

A survey of trajectory distance measures and performance evaluation

Han Su et al.

VLDB JOURNAL (2020)

Editorial Material Multidisciplinary Sciences

Mobile phone data for informing public health actions across the COVID-19 pandemic life cycle

Nuria Oliver et al.

SCIENCE ADVANCES (2020)

Article Computer Science, Information Systems

Big Trajectory Data: A Survey of Applications and Services

Xiangjie Kong et al.

IEEE ACCESS (2018)

Article Computer Science, Theory & Methods

Group Sparsity Tensor Factorization for Re-Identification of Open Mobility Traces

Takao Murakami et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)

Article Computer Science, Information Systems

Trajectory Similarity Join in Spatial Networks

Shuo Shang et al.

PROCEEDINGS OF THE VLDB ENDOWMENT (2017)

Editorial Material Multidisciplinary Sciences

Comment on Unique in the shopping mall: On the reidentifiability of credit card metadata

David Sanchez et al.

SCIENCE (2016)

Article Mathematics, Interdisciplinary Applications

Spatio-temporal techniques for user identification by means of GPS mobility data

Luca Rossi et al.

EPJ DATA SCIENCE (2015)

Proceedings Paper Computer Science, Theory & Methods

Location Privacy via Differential Private Perturbation of Cloaking Area

Hoa Ngo et al.

2015 IEEE 28TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM CSF 2015 (2015)

Proceedings Paper Computer Science, Information Systems

Differentially Private Real-time Data Release over Infinite Trajectory Streams

Yang Cao et al.

2015 16TH IEEE INTERNATIONAL CONFERENCE ON MOBILE DATA MANAGEMENT, VOL 2 (2015)

Article Computer Science, Information Systems

Local Differential Perturbations: Location Privacy under Approximate Knowledge Attackers

Rinku Dewri

IEEE TRANSACTIONS ON MOBILE COMPUTING (2013)

Article Computer Science, Information Systems

Microaggregation- and permutation-based anonymization of movement data

Josep Domingo-Ferrer et al.

INFORMATION SCIENCES (2012)

Article Computer Science, Artificial Intelligence

Ordinal, continuous and heterogeneous k-anonymity through microaggregation

J Domingo-Ferrer et al.

DATA MINING AND KNOWLEDGE DISCOVERY (2005)

Review Engineering, Electrical & Electronic

A chronology of interpolation: From ancient astronomy to modern signal and image processing

E Meijering

PROCEEDINGS OF THE IEEE (2002)