Privacy-preserving generation and publication of synthetic trajectory microdata: a comprehensive survey

JW Kim, B Jang - Journal of Network and Computer Applications, 2024 - Elsevier
The generation of trajectory data has increased dramatically with the advent and
widespread use of GPS-enabled devices. This rich source of data provides invaluable …

Trajectory recovery from ash: User privacy is not preserved in aggregated mobility data

F Xu, Z Tu, Y Li, P Zhang, X Fu, D Jin - Proceedings of the 26th …, 2017 - dl.acm.org
Human mobility data has been ubiquitously collected through cellular networks and mobile
applications, and publicly released for academic research and commercial purposes for the …

Privacy in trajectory micro-data publishing: a survey

M Fiore, P Katsikouli, E Zavou, M Cunche… - Transactions on Data …, 2020 - orbit.dtu.dk
We survey the literature on the privacy of trajectory micro-data, ie, spatiotemporal
information about the mobility of individuals, whose collection is becoming increasingly …

Protecting Trajectory From Semantic Attack Considering -Anonymity, -Diversity, and -Closeness

Z Tu, K Zhao, F Xu, Y Li, L Su… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Nowadays, human trajectories are widely collected and utilized for scientific research and
business purpose. However, publishing trajectory data without proper handling might cause …

Neural Collaborative Filtering to Detect Anomalies in Human Semantic Trajectories

Y Liu, L Kennedy, H Amiri, A Züfle - Proceedings of the 1st ACM …, 2024 - dl.acm.org
Human trajectory anomaly detection is critical for applications such as security surveillance
and public health, yet most existing methods focus on vehicle-level traffic, with limited …

Your apps give you away: distinguishing mobile users by their app usage fingerprints

Z Tu, R Li, Y Li, G Wang, D Wu, P Hui, L Su… - Proceedings of the ACM …, 2018 - dl.acm.org
Understanding mobile app usage has become instrumental to service providers to optimize
their online services. Meanwhile, there is a growing privacy concern that users' app usage …

SoK: differentially private publication of trajectory data

À Miranda-Pascual, P Guerra-Balboa… - Proceedings on …, 2023 - petsymposium.org
Trajectory analysis holds many promises, from improvements in traffic management to
routing advice or infrastructure development. However, learning users' paths is extremely …

A new privacy breach: User trajectory recovery from aggregated mobility data

Z Tu, F Xu, Y Li, P Zhang, D Jin - IEEE/ACM Transactions on …, 2018 - ieeexplore.ieee.org
Human mobility data have been ubiquitously collected through cellular networks and mobile
applications, and publicly released for academic research and commercial purposes for the …

An overview of proposals towards the privacy-preserving publication of trajectory data

À Miranda-Pascual, P Guerra-Balboa… - International Journal of …, 2024 - Springer
The privacy risks of processing human locations and their trajectories have been
demonstrated by a large number of studies and real-world incidents. As a result, many …

Obfuscation at-source: Privacy in context-aware mobile crowd-sourcing

T Kandappu, A Misra, SF Cheng… - Proceedings of the …, 2018 - dl.acm.org
By effectively reaching out to and engaging larger population of mobile users, mobile crowd-
sourcing has become a strategy to perform large amount of urban tasks. The recent …