2010
DOI: 10.1016/j.is.2010.05.003
|View full text |Cite
|
Sign up to set email alerts
|

Anonymization of moving objects databases by clustering and perturbation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
131
0
1

Year Published

2012
2012
2024
2024

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 140 publications
(132 citation statements)
references
References 49 publications
0
131
0
1
Order By: Relevance
“…Consequently, several anonymity notions and methods for trajectories have been proposed [21,20,22,7,37,6,1,33,43,31,34,47,32,2,23,24]. Among those works, we next review the ones that are most similar to our approach, and we highlight our comparative advantages.…”
Section: Trajectory Anonymizationmentioning
confidence: 99%
See 4 more Smart Citations
“…Consequently, several anonymity notions and methods for trajectories have been proposed [21,20,22,7,37,6,1,33,43,31,34,47,32,2,23,24]. Among those works, we next review the ones that are most similar to our approach, and we highlight our comparative advantages.…”
Section: Trajectory Anonymizationmentioning
confidence: 99%
“…Among those works, we next review the ones that are most similar to our approach, and we highlight our comparative advantages. Other comparisons of several trajectory anonymization methods can be found in [6,2].…”
Section: Trajectory Anonymizationmentioning
confidence: 99%
See 3 more Smart Citations