Similarity-based privacy protection for publishing k-anonymous trajectories

被引:1
|
作者
Wang, Shuai [1 ,2 ]
Chen, Chunyi [1 ]
Zhang, Guijie [3 ]
机构
[1] Changchun Univ Sci & Technol, Sch Comp Sci & Technol, Changchun 130022, Peoples R China
[2] Jilin Normal Univ, Teacher Training Ctr Coll & Univ Jilin Prov, Siping 136000, Peoples R China
[3] Jilin Normal Univ, Sch Comp Sci & Technol, Siping 136000, Peoples R China
基金
中国国家自然科学基金;
关键词
D O I
10.1007/s11704-020-0271-y
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
引用
收藏
页数:3
相关论文
共 50 条
  • [1] Similarity-based privacy protection for publishing k-anonymous trajectories
    WANG Shuai
    CHEN Chunyi
    ZHANG Guijie
    Frontiers of Computer Science, 2022, 16 (03)
  • [2] Similarity-based privacy protection for publishing k-anonymous trajectories
    Shuai Wang
    Chunyi Chen
    Guijie Zhang
    Frontiers of Computer Science, 2022, 16
  • [3] k-Anonymous Data Privacy Protection Mechanism Based on Optimal Clustering
    Zhang Q.
    Ye A.
    Ye G.
    Deng H.
    Chen A.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2022, 59 (07): : 1625 - 1635
  • [4] A New Method of Privacy Protection: Random k-Anonymous
    Song, Fagen
    Ma, Tinghuai
    Tian, Yuan
    Al-Rodhaan, Mznah
    IEEE ACCESS, 2019, 7 : 75434 - 75445
  • [5] Location privacy-preserving method of k-anonymous based on service similarity
    Ye, A-Yong
    Li, Ya-Cheng
    Ma, Jian-Feng
    Xu, Li
    Tongxin Xuebao/Journal on Communications, 2014, 35 (11): : 162 - 169
  • [6] A k-anonymous location privacy protection method of dummy based on geographical semantics
    Zhang, Yong-Bing
    Zhang, Qiu-Yu
    Li, Zong-Yi
    Yan, Yan
    Zhang, Mo-Yi
    International Journal of Network Security, 2019, 21 (06) : 937 - 946
  • [7] A k-anonymous location privacy protection method of dummy based on approximate matching
    Zhang, Yong-Bing
    Zhang, Qiu-Yu
    Li, Zong-Yi
    Duan, Hong-Xiang
    Zhang, Mo-Yi
    Kongzhi yu Juece/Control and Decision, 2020, 35 (01): : 65 - 73
  • [8] K-anonymous location privacy protection scheme for the mobile terminal
    Song C.
    Jin T.
    Ni S.
    He J.
    Du S.
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2021, 48 (03): : 138 - 145
  • [9] All-dummy k-anonymous privacy protection algorithm based on location offset
    Liu, Jianghui
    Wang, Shengxiang
    COMPUTING, 2022, 104 (08) : 1739 - 1751
  • [10] All-dummy k-anonymous privacy protection algorithm based on location offset
    Jianghui Liu
    Shengxiang Wang
    Computing, 2022, 104 : 1739 - 1751