2022
DOI: 10.3390/electronics12010070
|View full text |Cite
|
Sign up to set email alerts
|

Knowledge-Driven Location Privacy Preserving Scheme for Location-Based Social Networks

Abstract: Location privacy-preserving methods for location-based services in mobile communication networks have received great attention. Traditional location privacy-preserving methods mostly focus on the researches of location data analysis in geographical space. However, there is a lack of studies on location privacy preservation by considering the personalized features of users. In this paper, we present a Knowledge-Driven Location Privacy Preserving (KD-LPP) scheme, in order to mine user preferences and provide cus… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2023
2023
2025
2025

Publication Types

Select...
4

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 33 publications
0
3
0
Order By: Relevance
“…Zhu et al [26] proposed a knowledge-driven location privacy protection scheme to meet the demand for customized location privacy protection based on users' personalized features. The solution proposes the UBPG algorithm to mine the base persona, model user familiarity and user curiosity, and generate a psychological portrait.…”
Section: Virtual Collaboration Location-based Solutionsmentioning
confidence: 99%
“…Zhu et al [26] proposed a knowledge-driven location privacy protection scheme to meet the demand for customized location privacy protection based on users' personalized features. The solution proposes the UBPG algorithm to mine the base persona, model user familiarity and user curiosity, and generate a psychological portrait.…”
Section: Virtual Collaboration Location-based Solutionsmentioning
confidence: 99%
“…The evaluation metrics for trajectory clustering include precision, recall, and the F1-score. We utilize location data with semantic tagging, as established in our previous research [40,41], given the absence of an approach to group users within the Geolife datasets into diverse clusters. This experiment aims to compare the performance of trajectory clustering and privacy security for ILP [18], BU [42], SP-tree [43], DP-LTOD [19], N-gram [44], and NPT [45], respectively.…”
Section: Evaluation Metricsmentioning
confidence: 99%
“…Faradic et al [4] perform a comparative analysis of state-of-the-art computational personality recognition methods on a varied set of social media ground truth data from Facebook, Twitter and YouTube, and achieved the decay in accuracy when porting models trained in one social media environment to another Takahashi. Zhu et al [15] present a Knowledge-Driven Location Privacy Preserving (KD-LPP) scheme, in order to mine user preferences and provide customized location privacy protection for users. Firstly, the UBPG algorithm is proposed to mine the basic portrait.…”
Section: Introductionmentioning
confidence: 99%