2020
DOI: 10.1109/jiot.2019.2943719
|View full text |Cite
|
Sign up to set email alerts
|

TGM: A Generative Mechanism for Publishing Trajectories With Differential Privacy

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
16
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 40 publications
(16 citation statements)
references
References 23 publications
0
16
0
Order By: Relevance
“…Unfortunately, the computation is expensive, and it is hard to protect location privacy in real-time. Ghane et al [42] present a trajectory generative mechanism (TGM), which is the first mechanism that captures the stay locations in trajectories. It encodes the trajectories as a graphical generation and generates the trajectories of arbitrary length.…”
Section: B Differential Privacy Trajectory Protectionmentioning
confidence: 99%
“…Unfortunately, the computation is expensive, and it is hard to protect location privacy in real-time. Ghane et al [42] present a trajectory generative mechanism (TGM), which is the first mechanism that captures the stay locations in trajectories. It encodes the trajectories as a graphical generation and generates the trajectories of arbitrary length.…”
Section: B Differential Privacy Trajectory Protectionmentioning
confidence: 99%
“…Finally, the perturbed trajectory is synthesized according to the obfuscated prefix tree to protect the spatial correlation contained within the trajectory. In the literature [7], the authors presented a differential private method called TGM for publishing trajectories. In TGM, they partitioned the geographical space and constructed a prefix sequence graph to model the spatial transfer features between grids in trajectories.…”
Section: Related Workmentioning
confidence: 99%
“…Literature Limitations Methods without considering the correlation Suppression [4] and bounded perturbation [22] Kanonymity and its derivation [3,23,24]differential privacy [25][26][27][28][29][30] Face combination attacks and background knowledge attacks, and do not consider the privacy leakage caused by trajectory correlations Methods considering correlations within a single trajectory [6][7][8]31] Do not consider the privacy leakage caused by trajectory correlations…”
Section: Categorymentioning
confidence: 99%
See 2 more Smart Citations