Precise sensitivity recognizing,privacy preserving,knowledge graph-based method for trajectory data publication
摘要
1Introduction The existing privacy protection methods of trajectory data publication have two problems.First,existing methods[1-3]cannot resist attribute link attacks effectively.In practical scenarios,it is necessary to integrate data from a variety of fields for data analysis,such as cross-domain recommendations.We usually need to obtain the user attributes outside of the trajectory data as background knowledge.
基金
supported in part by the Guangxi"Bagui Sechola"Teams and the Guangxi Natural Science Foundation(2020JA170023).
二级参考文献23
-
1Giannotti F,Nanni M,Pedreschi D,et al.Trajectory pattern mining//Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.San Jose,USA,2007:330-339.
-
2Lee Jae-Gil,Han Jia-Wei,Li Xiao-Lei,et al.TraClass:Trajectory classification using hierarchical region based and trajectory-based clustering//Proceedings of the 34th Interna tional Conference on Very Large Data Bases.Auckland,New Zealand,2008:1081-1094.
-
3Lee Jae-Gil,Han-Jia Wei,Whang Kyu-Young.Trajectory clustering a partition and group framework//Proceedings of the 2007 ACM SIGMOD International Conference on Management of Data.Beijing,China,2007:593-604.
-
4Li Xiao-Lei,Han Jia-Wei,Lee Jae-Gil,et al.Traffic densitybased discovery of hot routes in road networks//Proceedings of the 10th International Symposium on Spatial and Temporal Databases.Boston,USA,2007:441-459.
-
5Terrovitis M,Mamoulis N.Privacy preservation in the publication of trajectories//Proceedings of the 9th International Conference on Mobile Data Management.Beijing,China,2008:65-72.
-
6Abul O,Bonchi F,Nanni M.Never walk alone:Uncertainty for anonymity in moving objects databases//Proceedings of the 24th IEEE International Conference on Data Engineering.Cancun,Mexico,2008:376-385.
-
7Gao Sheng,Ma Jian-Feng,Sun Cong,et al.Balancing trajectory privacy and data utility using a personalized anony mization model.Journal of Network and Computer Applications,2013,38(9):125-134.
-
8Domingo Ferrer J,Trujillo-Rasua R.Microaggregation and permutation based anonymization of movement data.Information Sciences,2012,208(9):55-80.
-
9Nergiz M,Atzori M,Saygin Y.Towards trajectory anony mization:A generalization based approach//Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS.Irvine,USA,2008:52-61.
-
10Huo Zheng,HuangYi,MengXiao-Feng.Historytrajectory privacy-preserving through graph partition//Proceedings of the 1st International Workshop on Mobile Location Based Service.Beijing,China,2011:71-82.
共引文献39
-
1宋成,张亚东,彭维平,王磊,刘志中.基于相似轨迹替代查询的位置隐私保护方案研究[J].北京邮电大学学报,2020,43(1):135-142. 被引量:2
-
2郭会,韩建民,鲁剑锋,彭浩,郑路倩.实现轨迹k^m-匿名的最小变形度算法[J].计算机工程,2015,41(11):180-185. 被引量:1
-
3宋成,张亚东,王磊,刘志中,晁浩.基于DTW交换查询的轨迹隐私保护方案[J].北京邮电大学学报,2018,41(6):97-102. 被引量:2
-
4胡兆玮,杨静.轨迹隐私保护技术研究进展分析[J].计算机科学,2016,43(4):16-23. 被引量:7
-
5张翼.基于相对点阵的位置隐私保护方法[J].网络安全技术与应用,2016(6):115-115. 被引量:1
-
6张少波,Md Zakirul Alam Bhuiyan,刘琴,王国军.移动社交网络中基于代理转发机制的轨迹隐私保护方法[J].电子与信息学报,2016,38(9):2158-2164. 被引量:5
-
7雷凯跃,李兴华,刘海,裴卓雄,马建峰,李晖.轨迹发布中基于时空关联性的假轨迹隐私保护方案[J].通信学报,2016,37(12):156-164. 被引量:19
-
8仝伟,毛云龙,陈庆军,王彬入,张保佳,仲盛.抗大数据分析的隐私保护:研究现状与进展[J].网络与信息安全学报,2016,2(4):44-55. 被引量:7
-
9霍峥,王卫红,曹玉辉.PTDC:路网环境中感知隐私的轨迹数据采集技术[J].计算机应用,2017,37(9):2567-2571. 被引量:2
-
10董玉兰,皮德常.一种基于假数据的新型轨迹隐私保护模型[J].计算机科学,2017,44(8):124-128. 被引量:10
-
1展超.价差2000元,听起来的确有差异 Integra DRX-3.4[J].家庭影院技术,2022(6):72-73.
-
2Dong-Fan Xie,Tai-Lang Zhu,Qian Li.Capturing driving behavior Heterogeneity based on trajectory data[J].International Journal of Modeling, Simulation, and Scientific Computing,2020,11(3):98-116. 被引量:1
-
3Haibao Jiang,Dezhi Han,Han Liu,Jiuzhang Han,Wenjing Nie.Time Synchronized Velocity Error for Trajectory Compression[J].Computer Modeling in Engineering & Sciences,2022(2):1193-1219.
-
4Zhibin ZHANG,John St BUCKERIDGE.Jean-Marc Jallon[J].Integrative Zoology,2020,15(1):87-87.
-
5Zhiming Ding,Shan Jiang,Xinrun Xu,Yanbo Han.An Internet of Things based scalable framework for disaster data management[J].Journal of Safety Science and Resilience,2022,3(2):136-152.
-
6John S.BUCKERIDGE.Integrative Zoology: 2006-2016 - A decade of substantial achievement![J].Integrative Zoology,2016,11(6):425-425.
-
7张强,周鹏,刘昌来,余永帆,张敏,杨甲定.NaCl处理下全缘冬青和红果冬青根系的转录组活性比较[J].南京林业大学学报(自然科学版),2022,46(3):99-108. 被引量:2
-
8Ahmed S.Almasoud,Taiseer Abdalla Elfadil Eisa,Fahd N.Al-Wesabi,Abubakar Elsafi,Mesfer Al Duhayyim,Ishfaq Yaseen,Manar Ahmed Hamza,Abdelwahed Motwakel.Parkinson’s Detection Using RNN-Graph-LSTM with Optimization Based on Speech Signals[J].Computers, Materials & Continua,2022(7):871-886.
-
9Susan D.HEALY.Animal cognition[J].Integrative Zoology,2019,14(2):128-131.
-
10Yang Jingjing,Guo Yuchun,Feng Tingting,Chen Yishuai.User friendly preferential private recommendation[J].The Journal of China Universities of Posts and Telecommunications,2022,29(3):43-53.