期刊文献+

Precise sensitivity recognizing,privacy preserving,knowledge graph-based method for trajectory data publication

原文传递
导出
摘要 1Introduction The existing privacy protection methods of trajectory data publication have two problems.First,existing methods[1-3]cannot resist attribute link attacks effectively.In practical scenarios,it is necessary to integrate data from a variety of fields for data analysis,such as cross-domain recommendations.We usually need to obtain the user attributes outside of the trajectory data as background knowledge.
出处 《Frontiers of Computer Science》 SCIE EI CSCD 2022年第4期219-221,共3页 中国计算机科学前沿(英文版)
基金 supported in part by the Guangxi"Bagui Sechola"Teams and the Guangxi Natural Science Foundation(2020JA170023).
  • 相关文献

参考文献1

二级参考文献23

  • 1Giannotti F,Nanni M,Pedreschi D,et al.Trajectory pattern mining//Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.San Jose,USA,2007:330-339.
  • 2Lee Jae-Gil,Han Jia-Wei,Li Xiao-Lei,et al.TraClass:Trajectory classification using hierarchical region based and trajectory-based clustering//Proceedings of the 34th Interna tional Conference on Very Large Data Bases.Auckland,New Zealand,2008:1081-1094.
  • 3Lee Jae-Gil,Han-Jia Wei,Whang Kyu-Young.Trajectory clustering a partition and group framework//Proceedings of the 2007 ACM SIGMOD International Conference on Management of Data.Beijing,China,2007:593-604.
  • 4Li Xiao-Lei,Han Jia-Wei,Lee Jae-Gil,et al.Traffic densitybased discovery of hot routes in road networks//Proceedings of the 10th International Symposium on Spatial and Temporal Databases.Boston,USA,2007:441-459.
  • 5Terrovitis M,Mamoulis N.Privacy preservation in the publication of trajectories//Proceedings of the 9th International Conference on Mobile Data Management.Beijing,China,2008:65-72.
  • 6Abul O,Bonchi F,Nanni M.Never walk alone:Uncertainty for anonymity in moving objects databases//Proceedings of the 24th IEEE International Conference on Data Engineering.Cancun,Mexico,2008:376-385.
  • 7Gao Sheng,Ma Jian-Feng,Sun Cong,et al.Balancing trajectory privacy and data utility using a personalized anony mization model.Journal of Network and Computer Applications,2013,38(9):125-134.
  • 8Domingo Ferrer J,Trujillo-Rasua R.Microaggregation and permutation based anonymization of movement data.Information Sciences,2012,208(9):55-80.
  • 9Nergiz M,Atzori M,Saygin Y.Towards trajectory anony mization:A generalization based approach//Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS.Irvine,USA,2008:52-61.
  • 10Huo Zheng,HuangYi,MengXiao-Feng.Historytrajectory privacy-preserving through graph partition//Proceedings of the 1st International Workshop on Mobile Location Based Service.Beijing,China,2011:71-82.

共引文献39

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部