2018
DOI: 10.1016/j.cose.2018.05.001
|View full text |Cite
|
Sign up to set email alerts
|

Trajectory privacy protection method based on the time interval divided

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
21
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 29 publications
(21 citation statements)
references
References 11 publications
0
21
0
Order By: Relevance
“…e algorithm constructed the anonymous set to realize privacy protection by partitioning the graph. Hu et al [3] assumed that there was an independent privacy level on different trajectory segments and selected the maximum privacy requirements of trajectory segments as the privacy requirement. Similar to nonpersonalized trajectory privacy protection method, the…”
Section: Trajectory Body Sets the Personalized Privacy Requirementsmentioning
confidence: 99%
See 4 more Smart Citations
“…e algorithm constructed the anonymous set to realize privacy protection by partitioning the graph. Hu et al [3] assumed that there was an independent privacy level on different trajectory segments and selected the maximum privacy requirements of trajectory segments as the privacy requirement. Similar to nonpersonalized trajectory privacy protection method, the…”
Section: Trajectory Body Sets the Personalized Privacy Requirementsmentioning
confidence: 99%
“…Although the traditional Euclidean distance accurately expresses the linear distance between geographical objects, the paths are usually polygonal in the actual geographic connected region. erefore, it is more reasonable to use the Manhattan distance to measure the distance between the trajectory points [3].…”
Section: Modified Manhattan Space Distancementioning
confidence: 99%
See 3 more Smart Citations