2022
DOI: 10.1016/j.jnca.2022.103459
|View full text |Cite
|
Sign up to set email alerts
|

Deep learning-based privacy-preserving framework for synthetic trajectory generation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(4 citation statements)
references
References 36 publications
0
3
0
Order By: Relevance
“…The development of recurrent neural networks has given rise to GRU (Gate recurrent unit), which can effectively deal with the above problems and capture long range dependencies [8] . In order to improve the accuracy of the prediction mechanism, BiGRU improves the GRU, BiGRU network realizes the full understanding of the historical data through the forward and reverse dimensions, which has a great performance improvement compared to the unidirectional GRU network, and the prediction results are more stable its structure [9] . Using BiGRU network as a prediction framework, its model is:…”
Section: Predictive Mechanismsmentioning
confidence: 99%
“…The development of recurrent neural networks has given rise to GRU (Gate recurrent unit), which can effectively deal with the above problems and capture long range dependencies [8] . In order to improve the accuracy of the prediction mechanism, BiGRU improves the GRU, BiGRU network realizes the full understanding of the historical data through the forward and reverse dimensions, which has a great performance improvement compared to the unidirectional GRU network, and the prediction results are more stable its structure [9] . Using BiGRU network as a prediction framework, its model is:…”
Section: Predictive Mechanismsmentioning
confidence: 99%
“…Shin et al [26], on the other hand, addressed the limitations of the GAN model by introducing a classlevel trajectory data generation model using the auxiliary classifier GAN (AC GAN). Kim et al [27] proposed an adversarial autoencoder (AEE) for applying differential privacy. Similarly, Zhang et al [28] introduced LGAN-DP using a GAN framework with differential privacy.…”
Section: Related Workmentioning
confidence: 99%
“…Trajectory privacy protection techniques have gained significant attention in research due to their capacity to safeguard the privacy of users’ location and behavioral trajectories, becoming an integral component of location privacy protection strategies. There are three fundamental approaches to achieving trajectory privacy: (1) Fake Trajectory [ 4 , 12 ]. This method involves the addition of fabricated trajectory points [ 12 ] or the exchange of two location pairs that are close in time and space [ 4 ] to obfuscate the authentic trajectory data to preserve privacy.…”
Section: Introductionmentioning
confidence: 99%
“…There are three fundamental approaches to achieving trajectory privacy: (1) Fake Trajectory [ 4 , 12 ]. This method involves the addition of fabricated trajectory points [ 12 ] or the exchange of two location pairs that are close in time and space [ 4 ] to obfuscate the authentic trajectory data to preserve privacy. However, this method is susceptible to exploitation by attackers who can discern real from fake trajectory points by scrutinizing time and speed parameters.…”
Section: Introductionmentioning
confidence: 99%