2013 IEEE International Conference on Big Data 2013
DOI: 10.1109/bigdata.2013.6691626
|View full text |Cite
|
Sign up to set email alerts
|

DP-WHERE: Differentially private modeling of human mobility

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
72
0
1

Year Published

2016
2016
2021
2021

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 97 publications
(73 citation statements)
references
References 19 publications
0
72
0
1
Order By: Relevance
“…For example, the trajectory data provided by CDR tracks individuals and preferences risking their privacy as it is possible to uniquely track 95% of peoples' trajectories by knowing only four spatio-temporal points [139]. Though various methods, e.g., obfuscation [140], k-anonymity [141], differentially private model [71], [142], information fusion and aggregation [143], have been proposed, yet privacy protection remains an open challenge.…”
Section: E Data Privacy and Anonymitymentioning
confidence: 99%
See 2 more Smart Citations
“…For example, the trajectory data provided by CDR tracks individuals and preferences risking their privacy as it is possible to uniquely track 95% of peoples' trajectories by knowing only four spatio-temporal points [139]. Though various methods, e.g., obfuscation [140], k-anonymity [141], differentially private model [71], [142], information fusion and aggregation [143], have been proposed, yet privacy protection remains an open challenge.…”
Section: E Data Privacy and Anonymitymentioning
confidence: 99%
“…Gonzalez et al reported spatial and temporal regularity in daily human mobility which can be represented using simple regular patterns [32]. The same principle was used to estimate the daily mobility tier which can be used to find the O-D matrices for the transportation [71]. Schneider et al investigated a method by combining the daily mobility patterns, called motifs, of different large-scale data sources which can be extended to a range of UA [53].…”
Section: A Mobile Phone Network Data Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…The goal of these papers is to compute differentially private histograms independently for each attribute (or jointly for a small number of attributes) and then try to generate a joint histogram for all attributes from the partial histograms. This was done for a data set of commuting patterns in [39] and for an arbitrary data set in [40]. In particular, [40] first tried to build a dependency hierarchy between attributes.…”
Section: Related Work On Differentially Private Data Publishingmentioning
confidence: 99%
“…Thus, in order to avoid obtaining too many sparsely populated bins, the number of bins per attribute must be significantly reduced (with the subsequent accuracy loss). An interesting approach to deal with multidimensional data is proposed in [39,40]. The goal of these papers is to compute differentially private histograms independently for each attribute (or jointly for a small number of attributes) and then try to generate a joint histogram for all attributes from the partial histograms.…”
Section: Related Work On Differentially Private Data Publishingmentioning
confidence: 99%