2020
DOI: 10.1016/j.jestch.2020.06.002
|View full text |Cite
|
Sign up to set email alerts
|

Impact of prior knowledge on privacy leakage in trajectory data publishing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 25 publications
0
4
0
Order By: Relevance
“…Identity linkage attack: In the published dataset, if the trajectory of the sensor data for a patient is unique, then an adversary can quickly identify a patient record along with the patient's sensitive data using his prior knowledge [11].…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…Identity linkage attack: In the published dataset, if the trajectory of the sensor data for a patient is unique, then an adversary can quickly identify a patient record along with the patient's sensitive data using his prior knowledge [11].…”
Section: Introductionmentioning
confidence: 99%
“…Attribute linkage attack: In the published dataset, the most frequent occurrence of the sensitive values of a targeted victim could result in an attribute linking attack. The adversary could breach the sensitive information with high confidence even though the unique sensor trajectory information of the victim is not available [11].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…However, the attacker can still infer the sensitive attribute range based on the equivalence class where the quasi-identifier is located. 4) Suppression [21], [22]. The released locations are selectively suppressed or reduced frequency according to the region's sensitivity.…”
mentioning
confidence: 99%