Please use this identifier to cite or link to this item: https://hdl.handle.net/20.500.11851/5766
Full metadata record
DC FieldValueLanguage
dc.contributor.authorAbul, Osman-
dc.contributor.authorAtzori M.-
dc.contributor.authorBonchi F.-
dc.contributor.authorGiannotti F.-
dc.date.accessioned2021-09-11T15:19:57Z-
dc.date.available2021-09-11T15:19:57Z-
dc.date.issued2007en_US
dc.identifier.citation17th IEEE International Conference on Data Mining Workshops, ICDM Workshops 2007, 28 October 2007 through 31 October 2007, Omaha, NE, 73001en_US
dc.identifier.isbn0769530192; 9780769530192-
dc.identifier.issn1550-4786-
dc.identifier.urihttps://doi.org/10.1109/ICDMW.2007.93-
dc.identifier.urihttps://hdl.handle.net/20.500.11851/5766-
dc.description.abstractSpatio-temporal traces left behind by moving individuals are increasingly available. On the one hand, mining this kind of data is expected to produce interesting behavioral knowledge enabling novel classes of mobility applications; but on the other hand, due to the peculiar nature of position data, mining it creates important privacy concerns. Thus, studying privacy preserving data mining methods for moving object data is interesting and challenging. In this paper, we address the problem of hiding sensitive trajectory patterns from moving objects databases. The aim is to modify the database such that a given set of sensitive trajectory patterns can no longer be extracted, while the others are preserved as much as possible. We provide the formal problem statement and show that it is NP-hard; so we devise heuristics and a polynomial sanitization algorithm. We discuss a possible attack to our model, that exploits the knowledge of the underlying road network, and we enhance our model to protect from this kind of attacks. Experimental results show the effectiveness of our proposal. © 2007 IEEE.en_US
dc.language.isoenen_US
dc.relation.ispartofProceedings - IEEE International Conference on Data Mining, ICDMen_US
dc.rightsinfo:eu-repo/semantics/closedAccessen_US
dc.titleHiding sensitive trajectory patternsen_US
dc.typeConference Objecten_US
dc.departmentFaculties, Faculty of Engineering, Department of Computer Engineeringen_US
dc.departmentFakülteler, Mühendislik Fakültesi, Bilgisayar Mühendisliği Bölümütr_TR
dc.identifier.startpage693en_US
dc.identifier.endpage698en_US
dc.identifier.scopus2-s2.0-49549100210en_US
dc.institutionauthorAbul, Osman-
dc.identifier.doi10.1109/ICDMW.2007.93-
dc.relation.publicationcategoryKonferans Öğesi - Uluslararası - Kurum Öğretim Elemanıen_US
dc.relation.conference17th IEEE International Conference on Data Mining Workshops, ICDM Workshops 2007en_US
dc.identifier.scopusquality--
item.fulltextNo Fulltext-
item.openairecristypehttp://purl.org/coar/resource_type/c_18cf-
item.languageiso639-1en-
item.cerifentitytypePublications-
item.openairetypeConference Object-
item.grantfulltextnone-
crisitem.author.dept02.3. Department of Computer Engineering-
Appears in Collections:Bilgisayar Mühendisliği Bölümü / Department of Computer Engineering
Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection
Show simple item record



CORE Recommender

SCOPUSTM   
Citations

20
checked on Apr 20, 2024

Page view(s)

48
checked on Apr 22, 2024

Google ScholarTM

Check




Altmetric


Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.