Differential privacy protection method based on published trajectory cross-correlation constraint
نویسندگان
چکیده
منابع مشابه
User Privacy Protection from Trajectory Perspective in Location-based Applications
Under the help of information and communication technologies, our lives are becoming better than ever in such a way we have been spending. One of popular and worthy supports comes from mobile devices. Integrated with modern positioning-aware technologies like Assisted Global Positioning System (A-GPS), mobile devices nowadays can locate users’ position with acceptable accuracy. However, privacy...
متن کاملAlgorithm-irrelevant Privacy Protection Method Based on Randomization
Privacy preserving classification mining is one of the fast-growing subareas of data mining. The algorithm-related methods of privacy-preserving are designed for particular classification algorithm and couldn’t be used in other classification algorithms. To solve this problem, it proposes a new algorithm-irrelevant privacy protection method based on randomization. This method generates and open...
متن کاملPower Differential based Wide Area Protection
Current differential based wide area protection (WAP) has recently been proposed as a technique to increase the reliability of protection systems. It increases system stability and can prevent large contingencies such as cascading outages and blackouts. This paper describes how power differential protection (PDP) can be used within a WAP and shows that the algorithm operates correctly for a...
متن کاملPreserving Differential Privacy in Degree-Correlation based Graph Generation
Enabling accurate analysis of social network data while preserving differential privacy has been challenging since graph features such as cluster coefficient often have high sensitivity, which is different from traditional aggregate functions (e.g., count and sum) on tabular data. In this paper, we study the problem of enforcing edge differential privacy in graph generation. The idea is to enfo...
متن کاملMedical privacy protection based on granular computing
Based on granular computing methodology, we propose two criteria to quantitatively measure privacy invasion. The total cost criterion measures the effort needed for a data recipient to find private information. The average benefit criterion measures the benefit a data recipient obtains when he received the released data. These two criteria remedy the inadequacy of the deterministic privacy form...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: PLOS ONE
سال: 2020
ISSN: 1932-6203
DOI: 10.1371/journal.pone.0237158