Trajectory data mining: an overview
Y Zheng - ACM Transactions on Intelligent Systems and …, 2015 - dl.acm.org
The advances in location-acquisition and mobile computing techniques have generated
massive spatial trajectory data, which represent the mobility of a diversity of moving objects …
massive spatial trajectory data, which represent the mobility of a diversity of moving objects …
Trajectory data mining: A review of methods and applications
The increasing use of location-aware devices has led to an increasing availability of
trajectory data. As a result, researchers devoted their efforts to develo** analysis methods …
trajectory data. As a result, researchers devoted their efforts to develo** analysis methods …
Geo-indistinguishability: Differential privacy for location-based systems
The growing popularity of location-based systems, allowing unknown/untrusted servers to
easily collect huge amounts of information regarding users' location, has recently started …
easily collect huge amounts of information regarding users' location, has recently started …
Destination prediction by sub-trajectory synthesis and privacy protection against such prediction
Destination prediction is an essential task for many emerging location based applications
such as recommending sightseeing places and targeted advertising based on destination. A …
such as recommending sightseeing places and targeted advertising based on destination. A …
Protecting location privacy against location-dependent attack in mobile services
Privacy preservation has recently received considerable attention for location-based mobile
services. In this paper, we present location-dependent attack resulting from continuous and …
services. In this paper, we present location-dependent attack resulting from continuous and …
Urban human mobility: Data-driven modeling and prediction
Human mobility is a multidisciplinary field of physics and computer science and has drawn a
lot of attentions in recent years. Some representative models and prediction approaches …
lot of attentions in recent years. Some representative models and prediction approaches …
Privacy games along location traces: A game-theoretic framework for optimizing location privacy
The mainstream approach to protecting the privacy of mobile users in location-based
services (LBSs) is to alter (eg, perturb, hide, and so on) the users' actual locations in order to …
services (LBSs) is to alter (eg, perturb, hide, and so on) the users' actual locations in order to …
Cap: A context-aware privacy protection system for location-based services
We address issues related to privacy protection in location-based services (LBS). Most
existing research in this field either requires a trusted third-party (anonymizer) or uses …
existing research in this field either requires a trusted third-party (anonymizer) or uses …
Quality assessment of OpenStreetMap data using trajectory mining
OpenStreetMap (OSM) data are widely used but their reliability is still variable. Many
contributors to OSM have not been trained in geography or surveying and consequently …
contributors to OSM have not been trained in geography or surveying and consequently …
Prolonging the hide-and-seek game: Optimal trajectory privacy for location-based services
Human mobility is highly predictable. Individuals tend to only visit a few locations with high
frequency, and to move among them in a certain sequence reflecting their habits and daily …
frequency, and to move among them in a certain sequence reflecting their habits and daily …