典型文献
Similarity-based privacy protection for publishing k-anonymous trajectories
文献摘要:
1 Introduction and main contributions
The combination of location technology and wireless com-munication technology has spawned a number of location-based services(LBS).Trusted location service providers(LSP)obtain a large amount of users'trajectories.The knowledge obtained from mining trajectory data can be used in many fields and may lead to privacy disclosure of users.The data owner(LSP)should process the trajectory data to protect privacy before publishing.Cluster-reconstruction of trajec-tories is a common privacy protection method for publishing trajectories.
文献关键词:
中图分类号:
作者姓名:
Shuai WANG;Chunyi CHEN;Guijie ZHANG
作者机构:
School of Computer Science and Technology,Changchun University of Science and Technology,Changchun 130022,China;Teacher Training Center of Colleges and Universities of Jilin Province,Jilin Normal University,Siping 136000,China;School of Computer Science and Technology,Jilin Normal University,Siping 136000,China
文献出处:
引用格式:
[1]Shuai WANG;Chunyi CHEN;Guijie ZHANG-.Similarity-based privacy protection for publishing k-anonymous trajectories)[J].计算机科学前沿,2022(03):200-202
A类:
Trusted,tories
B类:
Similarity,privacy,protection,publishing,anonymous,trajectories,Introduction,main,contributions,
The,combination,location,technology,wireless,munication,has,spawned,number,services,LBS,providers,LSP,large,amount,users,knowledge,obtained,from,mining,trajectory,data,can,used,many,fields,may,lead,disclosure,owner,should,process,before,Cluster,reconstruction,common,method
AB值:
0.569758
相似文献
机标中图分类号,由域田数据科技根据网络公开资料自动分析生成,仅供学习研究参考。