Leveraging Transformer Architecture for Effective Trajectory-User Linking (TUL) Attack and Its Mitigation
Abstract
References
Index Terms
- Leveraging Transformer Architecture for Effective Trajectory-User Linking (TUL) Attack and Its Mitigation
Recommendations
Protecting sensitive place visits in privacy-preserving trajectory publishing
Highlights- We propose a method for privacy-preserving trajectory publishing.
- It aims at ...
AbstractThe rise of mobile computing has generated huge amount of trajectory data. Since these data are valuable for many people, publishing them while providing adequate individual privacy protection has been a challenging task. In this paper,...
Novel trajectory privacy protection method against prediction attacks
Highlights- Formally define the privacy attack method of trajectory prediction attack.
- A ...
AbstractWhen the public uses Location-based Services (LBSs), their location information is constantly exposed. Owing to the spatiotemporal correlation of trajectories, it is easy for attackers to use historical trajectories and background ...
Characterization, Detection and Mitigation of Low-Rate DoS attack
ICTCS '14: Proceedings of the 2014 International Conference on Information and Communication Technology for Competitive StrategiesNow a day's web services become key aspect of life. Unfortunately there are several threats to these services. These threats are phishing, e-mail borne viruses, Trojan horse programs, Denial of Service etc. Among of them Distributed Denial of Service ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
Publisher
Springer-Verlag
Berlin, Heidelberg
Publication History
Author Tags
Qualifiers
- Article
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 0Total Downloads
- Downloads (Last 12 months)0
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
View options
Get Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in