Login / Signup
Differential Private Trajectory Obfuscation.
Roland Assam
Marwan Hassani
Thomas Seidl
Published in:
MobiQuitous (2012)
Keyphrases
</>
reverse engineering
privacy preserving
trajectory data
malware detection
trajectory planning
moving object trajectories
case study
static analysis
control flow
private data
public private
configuration space
trajectories of moving objects