Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey of the fusion of traditional data security technology and blockchain
Blockchain is a new distributed infrastructure and computing paradigm, which has been
widely used in various fields. For example, utilizing a chain data structure to verify and …
widely used in various fields. For example, utilizing a chain data structure to verify and …
Privacy in trajectory micro-data publishing: a survey
We survey the literature on the privacy of trajectory micro-data, ie, spatiotemporal
information about the mobility of individuals, whose collection is becoming increasingly …
information about the mobility of individuals, whose collection is becoming increasingly …
Anonymizing nyc taxi data: Does it matter?
The widespread use of location-based services has led to an increasing availability of
trajectory data from urban environments. These data carry rich information that are useful for …
trajectory data from urban environments. These data carry rich information that are useful for …
Local suppression and splitting techniques for privacy preserving publication of trajectories
We study the problem of preserving user privacy in the publication of location sequences.
Consider a database of trajectories, corresponding to movements of people, captured by …
Consider a database of trajectories, corresponding to movements of people, captured by …
[HTML][HTML] Time will not tell: Temporal approaches for privacy-preserving trajectory publishing
Fine-granular spatio-temporal trajectories, ie, time-stamped sequences of locations, play a
pivotal role in transport and urban analytics. However, sharing or publishing trajectory data …
pivotal role in transport and urban analytics. However, sharing or publishing trajectory data …
Privacy-aware and AI techniques for healthcare based on k-anonymity model in internet of things
The government and industry have given the recent development of the Internet of Things in
the healthcare sector significant respect. Health service providers retain data gathered from …
the healthcare sector significant respect. Health service providers retain data gathered from …
Hiding mobile traffic fingerprints with glove
Preservation of user privacy is paramount in the publication of datasets that contain fine-
grained information about individuals. The problem is especially critical in the case of mobile …
grained information about individuals. The problem is especially critical in the case of mobile …
A fast perturbation algorithm using tree structure for privacy preserving utility mining
U Yun, J Kim - Expert Systems with Applications, 2015 - Elsevier
As one of the important approaches in privacy preserving data mining, privacy preserving
utility mining has been studied to find more meaningful results while database privacy is …
utility mining has been studied to find more meaningful results while database privacy is …
Novel trajectory privacy-preserving method based on clustering using differential privacy
X Zhao, D Pi, J Chen - Expert Systems with Applications, 2020 - Elsevier
With the development of location-aware technology, a large amount of location data of users
is collected by the trajectory database. If these trajectory data are directly used for data …
is collected by the trajectory database. If these trajectory data are directly used for data …
Anonymizing trajectory data for passenger flow analysis
The increasing use of location-aware devices provides many opportunities for analyzing and
mining human mobility. The trajectory of a person can be represented as a sequence of …
mining human mobility. The trajectory of a person can be represented as a sequence of …