2019 IEEE Intelligent Vehicles Symposium (IV) 2019
DOI: 10.1109/ivs.2019.8814250
|View full text |Cite
|
Sign up to set email alerts
|

Give Me Two Points and I'll Tell You Who You Are

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 12 publications
(6 citation statements)
references
References 17 publications
0
5
0
Order By: Relevance
“…Known locations [28], [29], [30] Location probability distribution [31], [32], [33], [34], [35] POI / Personal gazetteer [36] Shared path [37] Personal profile…”
Section: Record Linkagementioning
confidence: 99%
See 3 more Smart Citations
“…Known locations [28], [29], [30] Location probability distribution [31], [32], [33], [34], [35] POI / Personal gazetteer [36] Shared path [37] Personal profile…”
Section: Record Linkagementioning
confidence: 99%
“…Record Linkage: Record linkage is the mainstream attack addressed by the state-of-art contributions. An adversary with some background knowledge (e.g., exposed locations [28], [29], origin and destination locations [30], and social relationships [60]) can try to identify the record of a known victim (i.e., perform a re-identification attack). In [35], linkage is formalized as a k-nearest-neighbor search (i.e., finding the most similar k individuals to the query one).…”
Section: Linkage Modelsmentioning
confidence: 99%
See 2 more Smart Citations
“…However, as trajectories contain sensitive information, directly releasing or sharing them might pose serious privacy threats to individuals. Adversaries can identify individuals, and further infer their home addresses, health status and hobbies [4][5][6] from their trajectories. Therefore, it is crucial to designing effective privacy protection methods to sanitize trajectories before publishing or sharing.…”
Section: Introductionmentioning
confidence: 99%