Similarity-based privacy protection for publishing k-anonymous trajectories

被引:1
|
作者
Wang, Shuai [1 ,2 ]
Chen, Chunyi [1 ]
Zhang, Guijie [3 ]
机构
[1] Changchun Univ Sci & Technol, Sch Comp Sci & Technol, Changchun 130022, Peoples R China
[2] Jilin Normal Univ, Teacher Training Ctr Coll & Univ Jilin Prov, Siping 136000, Peoples R China
[3] Jilin Normal Univ, Sch Comp Sci & Technol, Siping 136000, Peoples R China
基金
中国国家自然科学基金;
关键词
D O I
10.1007/s11704-020-0271-y
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
引用
收藏
页数:3
相关论文
共 50 条
  • [21] K-Anonymous Privacy Preserving Scheme Based on Bilinear Pairings over Medical Data
    Meng, Linghang
    Hong, Xueshu
    Chen, Yingwen
    Ding, Yuke
    Zhang, Chengzhuo
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, PT I, 2020, 12384 : 381 - 393
  • [22] SLICER: A Slicing-Based K-Anonymous Privacy Preserving Scheme for Participatory Sensing
    Qiu, Fudong
    Wu, Fan
    Chen, Guihai
    2013 IEEE 10TH INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR SYSTEMS (MASS 2013), 2013, : 113 - 121
  • [23] K-anonymous Privacy Protection Based on You Only Look Once Network and Random Forest for Sports Data Security Analysis
    Cao, Jie
    Ren, Jie
    Guan, Fuyu
    Li, Xueyan
    Wang, Nan
    International Journal of Network Security, 2025, 27 (02) : 264 - 273
  • [24] A Caching-Based Dual K-Anonymous Location Privacy-Preserving Scheme for Edge Computing
    Zhang, Shiwen
    Hu, Biao
    Liang, Wei
    Li, Kuan-Ching
    Gupta, Brij B.
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (11) : 9768 - 9781
  • [25] Privately updating suppression and generalization based k-anonymous databases
    Trombetta, Alberto
    Jiang, Wei
    Bertino, Elisa
    Bossi, Lorenzo
    2008 IEEE 24TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING, VOLS 1-3, 2008, : 1370 - +
  • [26] A K-anonymous clustering algorithm based on the analytic hierarchy process
    Wang, Kun
    Zhao, Wei
    Cui, Junjie
    Cui, Yanpeng
    Hu, Jianwei
    JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2019, 59 : 76 - 83
  • [27] k Anonymous Trajectory Privacy Protection Scheme of Personalized Differential Privacy
    Song C.
    Cheng D.
    Ni S.
    Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2023, 46 (03): : 109 - 114
  • [28] A k -Anonymous Location Privacy Protection Method of Polygon Based on Density Distribution
    Zhang, Yong-Bing
    Zhang, Qiu-Yu
    Yan, Yan
    Jiang, Yi-Long
    Zhang, Mo-Yi
    International Journal of Network Security, 2021, 23 (01) : 57 - 66
  • [29] Privacy-Preserving Similarity-Based Text Retrieval
    Pang, Hweehwa
    Shen, Jialie
    Krishnan, Ramayya
    ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2010, 10 (01)
  • [30] K-Anonymous Based Anti-Positioning Security Strategy in Mobile Networks
    Zhu, Liang
    Yu, Li-Ping
    Cai, Zeng-Yu
    Liu, Xiao-Wei
    Zhang, Jian-Wei
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2022, 38 (01) : 121 - 138