2018
DOI: 10.1155/2018/8297678
|View full text |Cite
|
Sign up to set email alerts
|

An Adaptive Window Size Selection Method for Differentially Private Data Publishing over Infinite Trajectory Stream

Abstract: Recently, various services based on user's location are emerging since the development of wireless Internet and sensor technology. VANET (vehicular ad hoc network), in which a large number of vehicles communicate using wireless communication, is also being highlighted as one of the services. VANET collects and analyzes the traffic data periodically to provide the traffic information service. The problem is that traffic data contains user’s sensitive location information that can lead to privacy violations. Dif… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 5 publications
0
4
0
Order By: Relevance
“…The sliding window approach is also used in [81], but with variable size windows. The solution considers traffic data property, such as road structure and time-based traffic variation to adaptively select the window size.…”
Section: Sliding Window Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…The sliding window approach is also used in [81], but with variable size windows. The solution considers traffic data property, such as road structure and time-based traffic variation to adaptively select the window size.…”
Section: Sliding Window Methodsmentioning
confidence: 99%
“…Trajectory data analysis interval-based methods [74], [75], [74], and [76] Achieves aggregates indistinguishability while factoring in the predicted aggregates at each timestamp (C3) The need for a centralized curator may create privacy attack opportunities sliding window methods [78], [79], [80], [81], and [ reveal or conceal pieces of their location data. For LBS applications, [91] shows that for different types of LBS, the privacy leak can be on the location, or on the query or both.…”
Section: Privacy Needs In Application Domainsmentioning
confidence: 99%
“…Among the machine learning techniques suggested in [11] for identifying fake websites are (Lagrangian Support Vector Machine) LSVM, (Logistic regression) LR, Random Forest (RF), Naive Bayes (NB), and statistical techniques for finding Concept Drifts in websites. Only a few studies have produced practical results, according to the author in [12], intending to foster research on intelligent security techniques based on a cyclic process that begins with the discovery of new threats and ends with the analysis and development of prevention measures. The authors of [13] propose a novel Gradient Boosting Decision Tree (GBDT) training technique with narrower sensitivity limitations and much better noise allocations.…”
Section: Related Workmentioning
confidence: 99%
“…Literature (Cao et al, 2017) quantified the differential privacy risk under time correlation for the influence of time correlation in a continuous data release (Acs & Castelluccia, 2014;Ma et al, 2019;Wang, Sinnott & Nepal, 2017;Jo, Jung & Park, 2018). studied the release of user trajectory data, and proposed a space-based differential privacy protection mechanism through the spatial correlation of trajectory data, but it is not applicable.…”
Section: Related Workmentioning
confidence: 99%