Similarity-based privacy protection for publishing k-anonymous trajectories

被引:1
|
作者
Wang, Shuai [1 ,2 ]
Chen, Chunyi [1 ]
Zhang, Guijie [3 ]
机构
[1] Changchun Univ Sci & Technol, Sch Comp Sci & Technol, Changchun 130022, Peoples R China
[2] Jilin Normal Univ, Teacher Training Ctr Coll & Univ Jilin Prov, Siping 136000, Peoples R China
[3] Jilin Normal Univ, Sch Comp Sci & Technol, Siping 136000, Peoples R China
基金
中国国家自然科学基金;
关键词
D O I
10.1007/s11704-020-0271-y
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
引用
收藏
页数:3
相关论文
共 50 条
  • [41] Content Knowledge Based Privacy Estimation Model for Anonymous OSN Data Publishing
    Cheng, Cheng
    Zhang, Chunhong
    Hu, Qingyuan
    2013 8TH INTERNATIONAL ICST CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA (CHINACOM), 2013, : 438 - 444
  • [42] K-anonymous Location-based Fine-grained Access Control for Mobile Cloud
    Baseri, Yaser
    Hafid, Abdelhakim
    Cherkaoui, Soumaya
    2016 13TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2016,
  • [43] Historical Trajectories Based Location Privacy Protection Query
    Cao, Liu
    Sun, Yuqing
    Xu, Haoran
    2014 IEEE 11TH INTL CONF ON UBIQUITOUS INTELLIGENCE AND COMPUTING AND 2014 IEEE 11TH INTL CONF ON AUTONOMIC AND TRUSTED COMPUTING AND 2014 IEEE 14TH INTL CONF ON SCALABLE COMPUTING AND COMMUNICATIONS AND ITS ASSOCIATED WORKSHOPS, 2014, : 228 - 235
  • [44] Translocation-Based Algorithm for Publishing Trajectories with Personalized Privacy Requirements
    Wang, Shuai
    Chen, Chunyi
    Zhang, Guijie
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2020, 2020
  • [45] Privacy Protection in E-commerce: Identity-based Anonymous Privacy Agent
    Guo, Dan
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (03): : 143 - 152
  • [46] Transient Current Similarity-Based Protection for Interconnecting Transformers in Wind Farms
    Liao, Jianquan
    Zhu, Xiaonan
    Wang, Qianggang
    IEEE ACCESS, 2019, 7 : 45744 - 45757
  • [47] An Anonymous IP-based Privacy Protection Routing Mechanism for CDNi
    Li, Shi
    Doh, Inshil
    Chae, Kijoon
    2016 INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2016, : 75 - 80
  • [48] Anonymous Identity-Based Key Scheme in Application of Privacy Protection
    Shen, Changjiang
    Yang, Lan
    Zhou, Chuansheng
    PROCEEDINGS OF THE 2017 2ND INTERNATIONAL CONFERENCE ON EDUCATION, SPORTS, ARTS AND MANAGEMENT ENGINEERING (ICESAME 2017), 2017, 123 : 1529 - 1535
  • [49] Satisfying Link Perturbation and k-out Anonymous in Social Network Privacy Protection
    Zhang, Miaomiao
    Qin, Sujuan
    Guo, Fenzhuo
    2017 17TH IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT 2017), 2017, : 1387 - 1391
  • [50] DesTeller: A System for Destination Prediction Based on Trajectories with Privacy Protection
    Xue, Andy Yuan
    Zhang, Rui
    Zheng, Yu
    Xie, Xing
    Yu, Jianhui
    Tang, Yong
    PROCEEDINGS OF THE VLDB ENDOWMENT, 2013, 6 (12): : 1198 - 1201