Trajectory data mining: an overview
Y Zheng - ACM Transactions on Intelligent Systems and …, 2015 - dl.acm.org
The advances in location-acquisition and mobile computing techniques have generated
massive spatial trajectory data, which represent the mobility of a diversity of moving objects …
massive spatial trajectory data, which represent the mobility of a diversity of moving objects …
Trajectory data mining: A review of methods and applications
JD Mazimpaka, S Timpf - Journal of …, 2016 - digitalcommons.library.umaine.edu
The increasing use of location-aware devices has led to an increasing availability of
trajectory data. As a result, researchers devoted their efforts to developing analysis methods …
trajectory data. As a result, researchers devoted their efforts to developing analysis methods …
Geo-indistinguishability: Differential privacy for location-based systems
The growing popularity of location-based systems, allowing unknown/untrusted servers to
easily collect huge amounts of information regarding users' location, has recently started …
easily collect huge amounts of information regarding users' location, has recently started …
Destination prediction by sub-trajectory synthesis and privacy protection against such prediction
Destination prediction is an essential task for many emerging location based applications
such as recommending sightseeing places and targeted advertising based on destination. A …
such as recommending sightseeing places and targeted advertising based on destination. A …
[PDF][PDF] 轨迹隐私保护技术研究
霍峥, 孟小峰 - 2011 - idke.ruc.edu.cn
摘要随着移动设备和定位技术的发展, 产生了大量的移动对象轨迹数据. 轨迹数据含有丰富的
时空信息, 对其分析和挖掘可以支持多种与移动对象相关的应用. 然而, 针对轨迹数据的攻击性 …
时空信息, 对其分析和挖掘可以支持多种与移动对象相关的应用. 然而, 针对轨迹数据的攻击性 …
Protecting location privacy against location-dependent attack in mobile services
Privacy preservation has recently received considerable attention for location-based mobile
services. In this paper, we present location-dependent attack resulting from continuous and …
services. In this paper, we present location-dependent attack resulting from continuous and …
Urban human mobility: Data-driven modeling and prediction
Human mobility is a multidisciplinary field of physics and computer science and has drawn a
lot of attentions in recent years. Some representative models and prediction approaches …
lot of attentions in recent years. Some representative models and prediction approaches …
Privacy games along location traces: A game-theoretic framework for optimizing location privacy
R Shokri, G Theodorakopoulos… - ACM Transactions on …, 2016 - dl.acm.org
The mainstream approach to protecting the privacy of mobile users in location-based
services (LBSs) is to alter (eg, perturb, hide, and so on) the users' actual locations in order to …
services (LBSs) is to alter (eg, perturb, hide, and so on) the users' actual locations in order to …
Cap: A context-aware privacy protection system for location-based services
We address issues related to privacy protection in location-based services (LBS). Most
existing research in this field either requires a trusted third-party (anonymizer) or uses …
existing research in this field either requires a trusted third-party (anonymizer) or uses …
Quality assessment of OpenStreetMap data using trajectory mining
OpenStreetMap (OSM) data are widely used but their reliability is still variable. Many
contributors to OSM have not been trained in geography or surveying and consequently …
contributors to OSM have not been trained in geography or surveying and consequently …