Login / Signup

Method of trajectory privacy protection based on restraining trajectory in LBS.

Zemao ZhaoJiabo WangChuanlin SunYouwei YuanBin Li
Published in: Int. J. Inf. Commun. Technol. (2018)
Keyphrases
  • privacy protection
  • input data
  • information loss
  • database
  • management system