2015 16th IEEE International Conference on Mobile Data Management 2015
DOI: 10.1109/mdm.2015.18
|View full text |Cite
|
Sign up to set email alerts
|

SST: Privacy Preserving for Semantic Trajectories

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
9
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 19 publications
(9 citation statements)
references
References 17 publications
0
9
0
Order By: Relevance
“…In [14], the average information loss is defined as the shrink of the probability that an object can be determined in a certain position. [107] evaluates point-level information loss based on the translation ratio which is the percentage of modified points in each trajectory after anonymization.…”
Section: The Quality Of Datamentioning
confidence: 99%
“…In [14], the average information loss is defined as the shrink of the probability that an object can be determined in a certain position. [107] evaluates point-level information loss based on the translation ratio which is the percentage of modified points in each trajectory after anonymization.…”
Section: The Quality Of Datamentioning
confidence: 99%
“…The main idea was to forbid the data release of sensitive location information to protect the individual trajectory privacy of users. Aimed to balance the data utility and k-anonymity trajectory privacy, Han et al [30] proposed a semantic space translation algorithm (SST) which provided different levels of privacy protection for different locations. Hwang et al [31] introduced a novel time-obfuscated technique which breaks the sequence of the query issuing time to protect users' trajectory privacy.…”
Section: Trajectory Privacy Preservingmentioning
confidence: 99%
“…There have been many centralized approaches for trajectory anonymization. Most of them [9,10,13,20,[22][23][24] output anonymized trajectories in the form of cloaking regions or centers of clusters. For example, in Reference [10], the spatial-temporal cloaking technique is applied to generate cloaking regions covering segments of trajectories.…”
Section: Privacy Preserving Trajectory Publishingmentioning
confidence: 99%