2021
DOI: 10.1080/09540091.2021.1993137
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-preserving location-based traffic density monitoring

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(3 citation statements)
references
References 31 publications
0
3
0
Order By: Relevance
“…In this experiment we use five metrics to evaluate the algorithm: physical dispersion, false position set generation efficiency, semantic diversity, uncertainty and recognition rate. In addition, three other algorithms are selected for performance comparison: Dummy Location Selection (DLS) algorithm [20], Enhanced-DLS algorithm [21] and Maximum and Minimum Dummy Selection (MMDS) algorithm [22]. The physical dispersion of false location sets can be measured from the minimum distance between false locations and the area of anonymous regions.…”
Section: Experimental Results Of False Location Filtering Algorithm F...mentioning
confidence: 99%
“…In this experiment we use five metrics to evaluate the algorithm: physical dispersion, false position set generation efficiency, semantic diversity, uncertainty and recognition rate. In addition, three other algorithms are selected for performance comparison: Dummy Location Selection (DLS) algorithm [20], Enhanced-DLS algorithm [21] and Maximum and Minimum Dummy Selection (MMDS) algorithm [22]. The physical dispersion of false location sets can be measured from the minimum distance between false locations and the area of anonymous regions.…”
Section: Experimental Results Of False Location Filtering Algorithm F...mentioning
confidence: 99%
“…Wu, Wei, Meng, Zhao, and Wang suggested a traffic density monitoring model, which takes the authentic location information from the vehicles themselves as well as maintains the privacy of the information [31]. To achieve this, the authors used a pseudonym and location anonymization servers, such that vehicles' location and identification were distinctly recorded.…”
Section: Related Workmentioning
confidence: 99%
“…For example, a system that can recognize license plates may construct patterns of behavior of the corresponding vehicles' owners and use that for various malicious or illegal purposes. In fact, privacy in traffic monitoring and analysis has been studied for a while, but mostly in the context of localization and location-based services [15,23,22,20,25]. Privacy in vision-based traffic analysis has been much less studied, and privacy related to license plates is a current topic of debate among privacy advocates, legal scholars, and lawmakers [1,11].…”
Section: Introductionmentioning
confidence: 99%