Privacy-preserving generation and publication of synthetic trajectory microdata: a comprehensive survey
JW Kim, B Jang - Journal of Network and Computer Applications, 2024 - Elsevier
The generation of trajectory data has increased dramatically with the advent and
widespread use of GPS-enabled devices. This rich source of data provides invaluable …
widespread use of GPS-enabled devices. This rich source of data provides invaluable …
Trajectory recovery from ash: User privacy is not preserved in aggregated mobility data
Human mobility data has been ubiquitously collected through cellular networks and mobile
applications, and publicly released for academic research and commercial purposes for the …
applications, and publicly released for academic research and commercial purposes for the …
Privacy in trajectory micro-data publishing: a survey
We survey the literature on the privacy of trajectory micro-data, ie, spatiotemporal
information about the mobility of individuals, whose collection is becoming increasingly …
information about the mobility of individuals, whose collection is becoming increasingly …
Protecting Trajectory From Semantic Attack Considering -Anonymity, -Diversity, and -Closeness
Nowadays, human trajectories are widely collected and utilized for scientific research and
business purpose. However, publishing trajectory data without proper handling might cause …
business purpose. However, publishing trajectory data without proper handling might cause …
Neural Collaborative Filtering to Detect Anomalies in Human Semantic Trajectories
Human trajectory anomaly detection is critical for applications such as security surveillance
and public health, yet most existing methods focus on vehicle-level traffic, with limited …
and public health, yet most existing methods focus on vehicle-level traffic, with limited …
Your apps give you away: distinguishing mobile users by their app usage fingerprints
Understanding mobile app usage has become instrumental to service providers to optimize
their online services. Meanwhile, there is a growing privacy concern that users' app usage …
their online services. Meanwhile, there is a growing privacy concern that users' app usage …
SoK: differentially private publication of trajectory data
À Miranda-Pascual, P Guerra-Balboa… - Proceedings on …, 2023 - petsymposium.org
Trajectory analysis holds many promises, from improvements in traffic management to
routing advice or infrastructure development. However, learning users' paths is extremely …
routing advice or infrastructure development. However, learning users' paths is extremely …
A new privacy breach: User trajectory recovery from aggregated mobility data
Human mobility data have been ubiquitously collected through cellular networks and mobile
applications, and publicly released for academic research and commercial purposes for the …
applications, and publicly released for academic research and commercial purposes for the …
An overview of proposals towards the privacy-preserving publication of trajectory data
À Miranda-Pascual, P Guerra-Balboa… - International Journal of …, 2024 - Springer
The privacy risks of processing human locations and their trajectories have been
demonstrated by a large number of studies and real-world incidents. As a result, many …
demonstrated by a large number of studies and real-world incidents. As a result, many …
Obfuscation at-source: Privacy in context-aware mobile crowd-sourcing
By effectively reaching out to and engaging larger population of mobile users, mobile crowd-
sourcing has become a strategy to perform large amount of urban tasks. The recent …
sourcing has become a strategy to perform large amount of urban tasks. The recent …