Efficient scheme for user's trajectory privacy
As one of the most important information in location-based services (LBS),the trajectory privacy for smart devices users has gained increasingly popularity over recent years.To address this problem,(k−1) dummy trajectories to achieve trajectory k-anonymity with comprehensively considering side infor...
Saved in:
| Main Authors: | Feng-hua LI, Cui ZHANG, Ben NIU, Hui LI, Jia-feng HUA, Guo-zhen SHI |
|---|---|
| Format: | Article |
| Language: | zho |
| Published: |
Editorial Department of Journal on Communications
2015-12-01
|
| Series: | Tongxin xuebao |
| Subjects: | |
| Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2015320/ |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Trajectory differential privacy protection mechanism based on prediction and sliding window
by: Ayong YE, et al.
Published: (2020-04-01) -
Spatio-temporal aware privacy-preserving scheme in LBS
by: Weihao LI, et al.
Published: (2018-05-01) -
Trajectory privacy protection method based on location obfuscation
by: Shaobo ZHANG, et al.
Published: (2018-07-01) -
Survey of differentially private methods for trajectory data
by: SUN Xinyue, et al.
Published: (2025-06-01) -
Survey of the context-aware location privacy-preserving techniques
by: Dian-hui MAO, et al.
Published: (2013-08-01)