2019
DOI: 10.3390/s19092102
|View full text |Cite
|
Sign up to set email alerts
|

User Identification across Asynchronous Mobility Trajectories

Abstract: With the popularity of location-based services and applications, a large amount of mobility data has been generated. Identification through mobile trajectory information, especially asynchronous trajectory data has raised great concerns in social security prevention and control. This paper advocates an identification resolution method based on the most frequently distributed TOP-N (the most frequently distributed N regions regarding user trajectories) regions regarding user trajectories. This method first find… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
19
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
3
1

Relationship

1
8

Authors

Journals

citations
Cited by 19 publications
(19 citation statements)
references
References 28 publications
0
19
0
Order By: Relevance
“…The main feature of wandering behavior is to walk around a place repeatedly. The existing wandering behavior research mainly focuses on the abnormal behavior of patients with Alzheimer’s disease [ 7 , 32 ].…”
Section: Research Methodsmentioning
confidence: 99%
“…The main feature of wandering behavior is to walk around a place repeatedly. The existing wandering behavior research mainly focuses on the abnormal behavior of patients with Alzheimer’s disease [ 7 , 32 ].…”
Section: Research Methodsmentioning
confidence: 99%
“…The Geolife trajectory dataset has been used in different research fields such as in privacy preserving location data [26], measuring trajectory stops and moves [27], user identification [28], trajectory completion [29], and transport mode detection [30].…”
Section: Gps Trajectoriesmentioning
confidence: 99%
“…Roedler et al [47] combined user-generated timestamp information with location information for use in constructing a personalized social behavior pattern designed to address user identification issues. Qi et al [48] designed an identification scheme based on user trajectory, which analyzes the TOP-N region with the most frequent distribution of user trajectories and uses different similarity calculation methods to measure the similarity between two trajectories. This achieves better identification performance.…”
Section: User Behavior Information-based User Identificationmentioning
confidence: 99%