Be like a Chameleon: Protect Traffic Privacy with Mimicry.
Zexiao ZouYan ZhangJin ChenJianyi ZhangZhiqiang WangLei JuRi XuPublished in: TrustCom (2023)
Keyphrases
- privacy enhancing
- privacy protection
- protect sensitive
- protection mechanisms
- user privacy
- privacy preserving
- personal information
- privacy policies
- data protection
- network traffic
- disclosure control
- traffic flow
- personal data
- privacy sensitive
- private information
- privacy preserving data mining
- sensitive information
- sensitive data
- privacy preservation
- location privacy
- legal issues
- private data
- real time
- privacy issues
- privacy concerns
- information loss
- internet traffic
- traffic data
- traffic congestion
- statistical databases
- data sharing
- data collection
- road traffic
- privacy aware
- intelligent transportation systems
- traffic management
- differential privacy
- data privacy