Mining Method of Vehicle Trajectory Data Stay Point Fused with Privacy Protection
CSTR:
Author:
  • Article
  • | |
  • Metrics
  • |
  • Reference
  • |
  • Related
  • |
  • Cited by
  • | |
  • Comments
    Abstract:

    With the popularization of on-board GPS positioning equipment, a large amount of vehicle trajectory data and location information have been generated, and various trajectory mining technologies have emerged as the times require. However, the existing trajectory mining technologies rarely consider the leakage of users’ privacy. Therefore, this study proposes a method of stay point mining from vehicle trajectory data integrating privacy protection. In this algorithm, the stay points in the trajectory are screened out by density clustering, and privacy protection of the stay points is then conducted with the differential privacy technology. The experimental verification shows that the proposed method can not only effectively identify the location of the stay points but also protect their privacy from being leaked.

    Reference
    Related
    Cited by
Get Citation

徐燕,樊娜,段宗涛,郝家欢,梁星.融合隐私保护的车辆轨迹数据停留点挖掘方法.计算机系统应用,2023,32(2):329-338

Copy
Related Videos

Share
Article Metrics
  • Abstract:
  • PDF:
  • HTML:
  • Cited by:
History
  • Received:June 27,2022
  • Revised:July 25,2022
  • Online: October 28,2022
Article QR Code
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-3
Address:4# South Fourth Street, Zhongguancun,Haidian, Beijing,Postal Code:100190
Phone:010-62661041 Fax: Email:csa (a) iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063