Similarity-based privacy protection for publishing k-anonymous trajectories

被引:2
作者
Wang, Shuai [1 ,2 ]
Chen, Chunyi [1 ]
Zhang, Guijie [3 ]
机构
[1] Changchun Univ Sci & Technol, Sch Comp Sci & Technol, Changchun 130022, Peoples R China
[2] Jilin Normal Univ, Teacher Training Ctr Coll & Univ Jilin Prov, Siping 136000, Peoples R China
[3] Jilin Normal Univ, Sch Comp Sci & Technol, Siping 136000, Peoples R China
基金
中国国家自然科学基金;
关键词
D O I
10.1007/s11704-020-0271-y
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
引用
收藏
页数:3
相关论文
共 50 条
[41]   Content Knowledge Based Privacy Estimation Model for Anonymous OSN Data Publishing [J].
Cheng, Cheng ;
Zhang, Chunhong ;
Hu, Qingyuan .
2013 8TH INTERNATIONAL ICST CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA (CHINACOM), 2013, :438-444
[42]   K-anonymous Location-based Fine-grained Access Control for Mobile Cloud [J].
Baseri, Yaser ;
Hafid, Abdelhakim ;
Cherkaoui, Soumaya .
2016 13TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2016,
[43]   Historical Trajectories Based Location Privacy Protection Query [J].
Cao, Liu ;
Sun, Yuqing ;
Xu, Haoran .
2014 IEEE 11TH INTL CONF ON UBIQUITOUS INTELLIGENCE AND COMPUTING AND 2014 IEEE 11TH INTL CONF ON AUTONOMIC AND TRUSTED COMPUTING AND 2014 IEEE 14TH INTL CONF ON SCALABLE COMPUTING AND COMMUNICATIONS AND ITS ASSOCIATED WORKSHOPS, 2014, :228-235
[44]   Translocation-Based Algorithm for Publishing Trajectories with Personalized Privacy Requirements [J].
Wang, Shuai ;
Chen, Chunyi ;
Zhang, Guijie .
MATHEMATICAL PROBLEMS IN ENGINEERING, 2020, 2020
[45]   Privacy Protection in E-commerce: Identity-based Anonymous Privacy Agent [J].
Guo, Dan .
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (03) :143-152
[46]   Transient Current Similarity-Based Protection for Interconnecting Transformers in Wind Farms [J].
Liao, Jianquan ;
Zhu, Xiaonan ;
Wang, Qianggang .
IEEE ACCESS, 2019, 7 :45744-45757
[47]   An Anonymous IP-based Privacy Protection Routing Mechanism for CDNi [J].
Li, Shi ;
Doh, Inshil ;
Chae, Kijoon .
2016 INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2016, :75-80
[48]   Anonymous Identity-Based Key Scheme in Application of Privacy Protection [J].
Shen, Changjiang ;
Yang, Lan ;
Zhou, Chuansheng .
PROCEEDINGS OF THE 2017 2ND INTERNATIONAL CONFERENCE ON EDUCATION, SPORTS, ARTS AND MANAGEMENT ENGINEERING (ICESAME 2017), 2017, 123 :1529-1535
[49]   Satisfying Link Perturbation and k-out Anonymous in Social Network Privacy Protection [J].
Zhang, Miaomiao ;
Qin, Sujuan ;
Guo, Fenzhuo .
2017 17TH IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT 2017), 2017, :1387-1391
[50]   DesTeller: A System for Destination Prediction Based on Trajectories with Privacy Protection [J].
Xue, Andy Yuan ;
Zhang, Rui ;
Zheng, Yu ;
Xie, Xing ;
Yu, Jianhui ;
Tang, Yong .
PROCEEDINGS OF THE VLDB ENDOWMENT, 2013, 6 (12) :1198-1201