The publication of trajectory data provides critical information for various location-based services, and it is critical to publish trajectory data safely while ensuring its availability. Differential privacy is a promising privacy protection technology for publishing trajectory data securely. Most of the existing trajectory privacy protection schemes do not take into account the user’s preference for location and the influence of semantic location. Besides, differential privacy for trajectory protection still has the problem of balance between the privacy budget and service quality. In this paper, a semantics- and prediction-based differential privacy protection scheme for trajectory data is proposed. Firstly, trajectory data are transform...
Over the past decade, the collection of data by individuals, businesses and government agencies has ...
Over the past decade, the collection of data by individuals, businesses and government agencies has ...
© 2016 Dr. Elham Naghi Zadeh KakhkiUbiquitous mobile phones have turned into sensing devices that ar...
Trajectory data privacy protection method is a hot topic in data privacy protection research field. ...
Although users can obtain various services by sharing their location information online with locatio...
© 2017, Springer Science+Business Media, LLC. Trajectory data gathered by mobile positioning techniq...
A number of security and privacy challenges of cyber system are arising due to the rapidly evolving ...
The ubiquity of GPS-enabled devices has resulted in an abundance of data about individual trajectori...
Privacy concerns place a great impediment to publishing and/or exchanging trajectory data across com...
© 2019 Soheila Ghane EzabadiThe evolution of smart devices and sensor-enabled vehicles has brought f...
Differential privacy is a technique for releasing statistical information about a database without r...
Trajectory analysis holds many promises, from improvements in traffic management to routing advice o...
Up to now, a large amount of trajectory data have been collected by trusted servers because of the w...
Aiming to solve the problem of low data utilization and privacy protection, a personalized different...
Over the past decade, the collection of data by individuals, businesses and government agencies has ...
Over the past decade, the collection of data by individuals, businesses and government agencies has ...
Over the past decade, the collection of data by individuals, businesses and government agencies has ...
© 2016 Dr. Elham Naghi Zadeh KakhkiUbiquitous mobile phones have turned into sensing devices that ar...
Trajectory data privacy protection method is a hot topic in data privacy protection research field. ...
Although users can obtain various services by sharing their location information online with locatio...
© 2017, Springer Science+Business Media, LLC. Trajectory data gathered by mobile positioning techniq...
A number of security and privacy challenges of cyber system are arising due to the rapidly evolving ...
The ubiquity of GPS-enabled devices has resulted in an abundance of data about individual trajectori...
Privacy concerns place a great impediment to publishing and/or exchanging trajectory data across com...
© 2019 Soheila Ghane EzabadiThe evolution of smart devices and sensor-enabled vehicles has brought f...
Differential privacy is a technique for releasing statistical information about a database without r...
Trajectory analysis holds many promises, from improvements in traffic management to routing advice o...
Up to now, a large amount of trajectory data have been collected by trusted servers because of the w...
Aiming to solve the problem of low data utilization and privacy protection, a personalized different...
Over the past decade, the collection of data by individuals, businesses and government agencies has ...
Over the past decade, the collection of data by individuals, businesses and government agencies has ...
Over the past decade, the collection of data by individuals, businesses and government agencies has ...
© 2016 Dr. Elham Naghi Zadeh KakhkiUbiquitous mobile phones have turned into sensing devices that ar...