Aiming to solve the problem of low data utilization and privacy protection, a personalized differential privacy protection method based on cross-correlation constraints is proposed. By protecting sensitive location points on the trajectory and their affiliated sensitive points, this method combines the sensitivity of the user's trajectory location and user privacy protection requirements and privacy budget to propose a (R,Ɛ) -extended differential privacy protection model. Using autocorrelation Laplace transform, specific Gaussian white noise is transformed into noise that is related to the user's real trajectory sequence in both time and space. Then the noise is added to the user trajectory sequence to ensure spatio-temporal correlation be...
Over the past decade, the collection of data by individuals, businesses and government agencies has ...
Over the past decade, the collection of data by individuals, businesses and government agencies has ...
Up to now, a large amount of trajectory data have been collected by trusted servers because of the w...
Trajectory data privacy protection method is a hot topic in data privacy protection research field. ...
The publication of trajectory data provides critical information for various location-based services...
A number of security and privacy challenges of cyber system are arising due to the rapidly evolving ...
Privacy protection is one of the major obstacles for data sharing. Time-series data have the charact...
Concerns on location privacy frequently arise with the rapid development of GPS enabled devices and ...
Recent advances in positioning techniques, along with the widespread use of mobile devices, make it ...
Concerns on location privacy frequently arise with the rapid development of GPS enabled devices and ...
Privacy concerns place a great impediment to publishing and/or exchanging trajectory data across com...
Privacy preserving on data mining and data release has attracted an increasing research interest ove...
With the popularity of GPS-enabled devices, a huge amount of trajectory data has been continuously c...
Recent advances in positioning techniques, along with the widespread use of mobile devices, make it ...
Over the past decade, the collection of data by individuals, businesses and government agencies has ...
Over the past decade, the collection of data by individuals, businesses and government agencies has ...
Over the past decade, the collection of data by individuals, businesses and government agencies has ...
Up to now, a large amount of trajectory data have been collected by trusted servers because of the w...
Trajectory data privacy protection method is a hot topic in data privacy protection research field. ...
The publication of trajectory data provides critical information for various location-based services...
A number of security and privacy challenges of cyber system are arising due to the rapidly evolving ...
Privacy protection is one of the major obstacles for data sharing. Time-series data have the charact...
Concerns on location privacy frequently arise with the rapid development of GPS enabled devices and ...
Recent advances in positioning techniques, along with the widespread use of mobile devices, make it ...
Concerns on location privacy frequently arise with the rapid development of GPS enabled devices and ...
Privacy concerns place a great impediment to publishing and/or exchanging trajectory data across com...
Privacy preserving on data mining and data release has attracted an increasing research interest ove...
With the popularity of GPS-enabled devices, a huge amount of trajectory data has been continuously c...
Recent advances in positioning techniques, along with the widespread use of mobile devices, make it ...
Over the past decade, the collection of data by individuals, businesses and government agencies has ...
Over the past decade, the collection of data by individuals, businesses and government agencies has ...
Over the past decade, the collection of data by individuals, businesses and government agencies has ...
Up to now, a large amount of trajectory data have been collected by trusted servers because of the w...