2011
DOI: 10.3724/sp.j.1016.2011.01820
|View full text |Cite
|
Sign up to set email alerts
|

A Survey of Trajectory Privacy-Preserving Techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
21
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
7
3

Relationship

0
10

Authors

Journals

citations
Cited by 30 publications
(21 citation statements)
references
References 2 publications
0
21
0
Order By: Relevance
“…Huo and Meng [33] classified trajectory privacy techniques into three categories, i.e., dummy location-based methods [65], generalized trajectory k-anonymity based methods, and suppression methods [64].…”
Section: ) Trajectory Privacy Preservation (Tr)mentioning
confidence: 99%
“…Huo and Meng [33] classified trajectory privacy techniques into three categories, i.e., dummy location-based methods [65], generalized trajectory k-anonymity based methods, and suppression methods [64].…”
Section: ) Trajectory Privacy Preservation (Tr)mentioning
confidence: 99%
“…The existing location data privacy protection methods [4,32] are mainly classified to three categories: the heuristic privacy-measure methods, the probability-based privacy inference methods and the privacy information retrieval methods. The heuristic privacy-measure methods are mainly to provide the privacy protection measure for some no-high required users, such as k-anonymity [19], t-closing [3], m-invariability [27] and l-diversity [25]. The information retrieval privacy protection methods may result in no data can be released, and these methods have high overhead.…”
Section: Related Workmentioning
confidence: 99%
“…Although their scheme can ensure data security, data utility is decreased. Current location data privacy protection methods [1,24] are mainly classified to three categories: the heuristic privacy-measure methods, the probability-based privacy inference methods and the privacy information retrieval's methods. The heuristic privacy-measure methods [25,26,27,28] are mainly to provide the privacy protection measure for some no-high required users, such as k-anonymity [25], t-closing [26], m-invariability [27] and l-diversity [28].…”
Section: Related Workmentioning
confidence: 99%