[1] |
姚瑞欣, 李晖, 曹进 ,等. 社交网络中的隐私保护研究综述[J]. 网络与信息安全学报, 2016,2(4): 33-43.
|
|
YAO R X , LI H , CAO J ,et al. Overview of privacy preserving in social network[J]. Chinese Journal of Network and Information Security, 2016,2(4): 33-43.
|
[2] |
李宇溪, 周福才, 徐紫枫 . 支持 K-近邻搜索的移动社交网络隐私保护方案[J]. 计算机学报, 2021,44(7): 1481-1500.
|
|
LI Y X , ZHOU F C , XU Z F . Pravacy-preserving K-nearst-neighbor search over mobile social network[J]. Chinese Journal of Computer, 2021,44(7): 1481-1500.
|
[3] |
ZHENG Y . Location-based social networks:users[M]. Springer,New York, 2011.
|
[4] |
LI J , YAN H , LIU Z ,et al. Location-sharing systems with enhanced privacy in mobile online social networks[J]. IEEE Systems Journal, 2017,11(2): 439-448.
|
[5] |
WANG H , LI Y , YANG C ,et al. Co-location social networks:linking the physical world and cyberspace[J]. IEEE Transactions on Mobile Computing, 2016,18(5): 1028-1041.
|
[6] |
XIE R , CHEN Y , LIN S ,et al. Understanding skout users' mobility patterns on a global scale:a data-driven study[J]. World Wide Web, 2018,22(1): 2655-2673.
|
[7] |
NOVAK E , LI Q . Near-pri:private,proximity based location sharing[C]// 33rd IEEE Conference on Computer Communications. 2014: 37-45.
|
[8] |
LUO X , QIAO Y , LI C ,et al. An overview of microblog user geolocation methods[J]. Information Processing & Management, 2020,57(6): 102375-102392.
|
[9] |
ZHENG X , HAN J , SUN A . A survey of location prediction on Twitter[J]. IEEE Transactions on Knowledge and Data Engineering, 2017,30(9): 1-11.
|
[10] |
ABHINAV K , JYOTI P . Location reference identification from tweets during emergencies:a deep learning approach[J]. International Journal of Disaster Risk Reduction, 2019,2(33): 365-375.
|
[11] |
PUTTASWAMY K , WANG S , STEINBAUER T ,et al. Preserving location privacy in geosocial applications[J]. IEEE Transactions on Mobile Computing, 2014,13(1): 159-173.
|
[12] |
DING, Y. , PEDDINTI, S.T. , ROSS, K.W . Stalking Beijing from Timbuktu:a generic measurement approach for exploiting location-based social discovery[C]// 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices. 2014: 75-80.
|
[13] |
LI M , ZHU H , GAO Z ,et al. All your location are belong to us:breaking mobile social networks for automated user location tracking[C]// 15th ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2014: 43-52.
|
[14] |
CHENG H , MAO S , XUE M ,et al. On the impact of location errors on localization attacks in location-based social network services[C]// 9th International Conference on Security,Privacy and Anonymity in Computation,Communication and Storage. 2016: 343-357.
|
[15] |
SHI W , LUO X , ZHAO F ,et al. Geolocating a WeChat user based on the relation between reported and actual distance[J]. International Journal of Distributed Sensor Networks, 2018,14(4): 1-13.
|
[16] |
XUE M , LIU Y , ROSS K ,et al. I know where you are:thwarting privacy protection in location-based social discovery services[C]// IEEE Conference on Computer Communications Workshops. 2015: 179-184.
|
[17] |
PENG J , MENG Y , XUE M ,et al. Attacks and defenses in location-based social networks:a heuristic number theory approach[C]// 36th IEEE International Symposium on Security and Privacy in Social Networks and Big Data. 2015: 64-71.
|
[18] |
POLAKIS I , ARGYROS G , PETSIOS T ,et al. Where's Wally?:precise user discovery attacks in location proximity services[C]// 22nd ACM SIGSAC Conference on Computer and Communications Security. 2015: 817-828.
|
[19] |
MORIYA K , FUJIMOTO M , ARAKAWA Y ,et al. Effective trilateration-based in-door localization method utilizing active control of lighting devices[J]. Sensors Mater, 2020,32(2): 625-650.
|
[20] |
LIU J , ZHANG Y , ZHAO F . Robust distributed node localization with error management[C]// 7th ACM International Symposium on Mobile Ad Hoc Networking and Computing. 2006: 250-261.
|
[21] |
LUENBERGER D , YE Y . Linear and nonlinear programming[M]. MA: Addison-Wesley, 1984.
|
[22] |
Tencent Homepage[EB].
|
[23] |
SIDDULA M , LI Y , CHENG X ,et al. Privacy-enhancing preferential LBS query for mobile social network users[J]. Wireless Communications and Mobile Computing, 2020(4): 1-13.
|
[24] |
JIANG H , LI J , ZHAO P ,et al. Location privacy-preserving mechanisms in location-based services:A comprehensive survey[J]. ACM Computing Surveys, 2021,54(1): 1-36.
|