2021
DOI: 10.1007/978-981-16-6554-7_78
|View full text |Cite
|
Sign up to set email alerts
|

Time-Aware Missing Traffic Flow Prediction for Sensors with Privacy-Preservation

Abstract: With the continuous development of IoT, a number of sensors establish on the roadside to monitor traffic conditions in real time. The continuously traffic data generated by these sensors makes traffic management feasible. However, loss of data may occur due to inevitable sensor failure, impeding traffic managers to understand traffic dynamics clearly. In this situation, it is becoming a necessity to predict missing traffic flow accurately for effective traffic management. Furthermore, the traffic sensor data a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 18 publications
0
2
0
Order By: Relevance
“…As IoT technology develops, various types of data are being collected. In the IoT environment, various sensors can typically collect traffic information [17,18] or obtain biometric information for healthcare services. Meng et al [19] proposed a privacy-aware factorization-based hybrid method for healthcare service recommendation.…”
Section: Related Work 21 Data Collected In the Iot Environmentmentioning
confidence: 99%
“…As IoT technology develops, various types of data are being collected. In the IoT environment, various sensors can typically collect traffic information [17,18] or obtain biometric information for healthcare services. Meng et al [19] proposed a privacy-aware factorization-based hybrid method for healthcare service recommendation.…”
Section: Related Work 21 Data Collected In the Iot Environmentmentioning
confidence: 99%
“…Considering the above challenges, we propose a novel traffic prediction method named AS M V P distr−L S H , which is based on the principle of distributed locality-sensitive hashing (LSH) [24][25][26] to protect privacy and fill the missing traffic data [27]. LSH has a favorable feature that is to retain similarity, i.e., two adjacent points are likely to be given the same exponent [28][29][30][31].…”
Section: Introductionmentioning
confidence: 99%