2021
DOI: 10.1016/j.neucom.2020.02.130
|View full text |Cite
|
Sign up to set email alerts
|

Social space keyword query based on semantic trajectory

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(7 citation statements)
references
References 32 publications
0
7
0
Order By: Relevance
“…In order to test the performance of the location privacy protection method proposed in this paper, the algorithm has been fully experimented in terms of data availability, privacy protection degree, and algorithm running time. The experiment is implemented using Python, and the data sets are Gowalla data set and Geolife data set [18,19]. The experimental environment of this article is PyCharm.…”
Section: Experimental Results and Analysismentioning
confidence: 99%
“…In order to test the performance of the location privacy protection method proposed in this paper, the algorithm has been fully experimented in terms of data availability, privacy protection degree, and algorithm running time. The experiment is implemented using Python, and the data sets are Gowalla data set and Geolife data set [18,19]. The experimental environment of this article is PyCharm.…”
Section: Experimental Results and Analysismentioning
confidence: 99%
“…This multi-resolution idea is similar to our proposed hierarchical trajectory representation whereas we leverage the semantic hierarchy instead of the regions of interests. Most recently, semantic trajectory analysis has fostered a series of new applications, such as recommender systems in cultural spaces proposed by Angelis et al [26], the itinerary recommender system by Cai et al [27], similar pattern group identification by Cao et al [28], and social-space keyword query by [29]. All of these works are centralized approaches and would not scale up when the huge amount of trajectories across the world need to be compared as that in our problem setting.…”
Section: Related Workmentioning
confidence: 99%
“…One is the POI dataset [34] from several provinces in China, which contains about 4 million pieces and is stored in the MySQL database. One is the Gowalla dataset [35]. The algorithm proposed in this paper is compared with G-Casper [36] and Casper [37] algorithms in terms of the anonymous success rate, privacy protection degree, algorithm running time, and algorithm antiattack.…”
Section: Experimental Analysismentioning
confidence: 99%