2017
DOI: 10.1016/j.ins.2016.10.038
|View full text |Cite
|
Sign up to set email alerts
|

The privacy preserving method for dynamic trajectory releasing based on adaptive clustering

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
20
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 42 publications
(20 citation statements)
references
References 10 publications
0
20
0
Order By: Relevance
“…First, the publishers set a unified privacy protection level for all trajectories [6][7][8][9][10][11] and then complete the privacy protection for publishing trajectories. Second, trajectory points are taken as atomic operation objects; the publisher sets a unified privacy protection level for all trajectory points [12][13][14][15][16] and then completes the privacy protection. Wang.…”
Section: Related Workmentioning
confidence: 99%
“…First, the publishers set a unified privacy protection level for all trajectories [6][7][8][9][10][11] and then complete the privacy protection for publishing trajectories. Second, trajectory points are taken as atomic operation objects; the publisher sets a unified privacy protection level for all trajectory points [12][13][14][15][16] and then completes the privacy protection. Wang.…”
Section: Related Workmentioning
confidence: 99%
“…The computation of distance between individual 7 and Q is as follows: r 7q is the identity element of Q ∪ R (7), which is {F, [33,34] We execute line 10 in Algorithm 1. D = D − R(7), Q = Q ∪ R (7), and r q is {F, [33,34], {10070, 10073}, null}. When we check whether Q satisfies EIR 3-diversity, we do not call SatPriIR_El and use the incremental method SatPriIRInc_El.…”
Section: Algorithm 5 Satpriirinc_el(q H Q P L)mentioning
confidence: 99%
“…In recent years, the problem of privacy-preserving data publishing has been studied extensively [1][2][3][4][5][6][7][8][9]. Traditional privacy-preserving approaches deal with static datasets with single record and single sensitive attribute.…”
Section: Anonymization For Static Datasetsmentioning
confidence: 99%
See 1 more Smart Citation
“…In [11] an attacker is assumed to have an unregulated number of intrusion, and presented a monitoring system, which observe the groups, and then has sensitive values for each group defined to monitor. [12][13][14][15][16] defines a anonymity approach where data is defined in easy and accessible format rather than a non-formal recording using a single and generalization hierarchy. [17] Introduces a controlling approach which define the conversion, which share transactions with the maximum knowledge of materials and can be shared with a public privacy.…”
Section: Introductionmentioning
confidence: 99%