Trajectory data mining: an overview

Y Zheng - ACM Transactions on Intelligent Systems and …, 2015 - dl.acm.org
The advances in location-acquisition and mobile computing techniques have generated
massive spatial trajectory data, which represent the mobility of a diversity of moving objects …

Trajectory data mining: A review of methods and applications

JD Mazimpaka, S Timpf - Journal of …, 2016 - digitalcommons.library.umaine.edu
The increasing use of location-aware devices has led to an increasing availability of
trajectory data. As a result, researchers devoted their efforts to developing analysis methods …

Geo-indistinguishability: Differential privacy for location-based systems

ME Andrés, NE Bordenabe, K Chatzikokolakis… - Proceedings of the …, 2013 - dl.acm.org
The growing popularity of location-based systems, allowing unknown/untrusted servers to
easily collect huge amounts of information regarding users' location, has recently started …

Destination prediction by sub-trajectory synthesis and privacy protection against such prediction

AY Xue, R Zhang, Y Zheng, X Xie… - 2013 IEEE 29th …, 2013 - ieeexplore.ieee.org
Destination prediction is an essential task for many emerging location based applications
such as recommending sightseeing places and targeted advertising based on destination. A …

[PDF][PDF] 轨迹隐私保护技术研究

霍峥, 孟小峰 - 2011 - idke.ruc.edu.cn
摘要随着移动设备和定位技术的发展, 产生了大量的移动对象轨迹数据. 轨迹数据含有丰富的
时空信息, 对其分析和挖掘可以支持多种与移动对象相关的应用. 然而, 针对轨迹数据的攻击性 …

Protecting location privacy against location-dependent attack in mobile services

X Pan, J Xu, X Meng - Proceedings of the 17th ACM conference on …, 2008 - dl.acm.org
Privacy preservation has recently received considerable attention for location-based mobile
services. In this paper, we present location-dependent attack resulting from continuous and …

Urban human mobility: Data-driven modeling and prediction

J Wang, X Kong, F Xia, L Sun - ACM SIGKDD explorations newsletter, 2019 - dl.acm.org
Human mobility is a multidisciplinary field of physics and computer science and has drawn a
lot of attentions in recent years. Some representative models and prediction approaches …

Privacy games along location traces: A game-theoretic framework for optimizing location privacy

R Shokri, G Theodorakopoulos… - ACM Transactions on …, 2016 - dl.acm.org
The mainstream approach to protecting the privacy of mobile users in location-based
services (LBSs) is to alter (eg, perturb, hide, and so on) the users' actual locations in order to …

Cap: A context-aware privacy protection system for location-based services

A Pingley, W Yu, N Zhang, X Fu… - 2009 29th IEEE …, 2009 - ieeexplore.ieee.org
We address issues related to privacy protection in location-based services (LBS). Most
existing research in this field either requires a trusted third-party (anonymizer) or uses …

Quality assessment of OpenStreetMap data using trajectory mining

A Basiri, M Jackson, P Amirian… - Geo-spatial …, 2016 - Taylor & Francis
OpenStreetMap (OSM) data are widely used but their reliability is still variable. Many
contributors to OSM have not been trained in geography or surveying and consequently …