[1] |
MOKBEL M F . Privacy in location-based services: start-of-the-art and research directions[A]. The Int Conf on Mobile Data Management (MDM'07)[C]. Mannheim: IEEE, German, 2007.228-235.
|
[2] |
吴英杰, 唐庆明, 倪巍伟 . 基于聚类杂交的隐私保护轨迹数据发布算法[J]. 计算机研究与发展, 2013,50(3):578-593. WU Y J , TANG Q M , NI W W . A clustering hybrid based algorithm for privacy preserving trajectory data publishing[J]. Journal of Com-puter Research and Development, 2013,50(3):578-593.
|
[3] |
张建明, 赵玉娟, 姜浩斌 等. 车辆自组网的位置隐私保护技术研究[J]. 通信学报, 2012,33(8):180-189. ZHANG J M , ZHAO Y J , JIANG H B , et al. Research on protection technology for location privacy in VANET[J]. Journal on Communications, 2012,33(8):180-189.
|
[4] |
CHOW C , MOKBEL M F , LIU X . A peer-to-peer spatial cloaking algorithm for anonymous location-based services[A]. Proc of the ACM Symposium on Advances in Geographic Information Systems(ACM GIS'06)[C]. Arlington: ACM, USA, 2006.171-178.
|
[5] |
GHINITA G , KALNIS P , KHOSHGOZARAN A . Private queries in location based services: anonymizers are not necessary[A]. ACM SIGMOD Int Conf on Management of data (SIGMOD'08)[C]. New York: ACM, USA, 2008.121-132.
|
[6] |
GRUTESER M , GRUNWALD D . Anonymous usage of loca-tion-based services through spatial and temporal cloaking[A]. Proc of the Int Conf on Mobile Systems, Applications, and Services (Mobi-Sys'03)[C]. San Francisco: USA, 2003.163-168.
|
[7] |
SWEENEY L . k-Anonymity: a model for protecting privacy[J]. International Journal on Uncertainty, Fuzziness and Konwledge Based Systems, 2002,10(5):557-570.
|
[8] |
ARIS G D , PANOS K , VASSILIOS S . Providing k-anonymity in location based services[J] ACM SIGKDD Explorations Newsletter, 2010,1(12):3-10.
|
[9] |
YAROVOY R , BONCHI F , LAK SHMANAN L V S . Anonymizing moving objects: how to hide a MOB in a crowd[A]. Proc of the 12th Int Conf on Extending Database Technology: Advances in Database Technology(EDBT'09)[C]. New York: ACM, USA, 2009.72-83.
|
[10] |
CHOW C Y , MOHAMED F M . Trajectory privacy in location-based services and data publication[J]. ACM SIGKDD Explorations News-letter, 2011,1(13):19-29.
|
[11] |
NERGIZ M E , ATZORI M , SAYGIN Y . Towards trajectory ano-nymization: a generalization-based approach[A]. Proc of the SIG-SPATIAL ACM GIS 2008 Int Workshop on Security and Privacy in GIS and LBS(SPRINGL'08)[C]. New York: ACM, USA, 2008.52-61.
|
[12] |
ABUL O , BONCHI F , NANNI M . Never walk alone: uncertainty for anonymity in moving objects databases[A]. Proc of the IEEE 24th Int Conf on Data Engineering(ICDE'08)[C]. Cancun: IEEE, Mexico, 2008.376-385.
|
[13] |
HUO Z , HU H , MENG X . History trajectory privacy-preserving through graph partition[A]. Proc of the 1st Int Conf on Mobile Location-based service(MLBS'11)[C]. Beijing: ACM, China, 2011.88-97.
|
[14] |
GAO S , MA J , SUN C . Balancing trajectory privacy and data utility using a personalized anonymization model[J]. Journal of Network and Computer Applications, 2014,38:125-134.
|
[15] |
BRINKHO T . Generating traffic data[J]. Bulletin of the Technical Committee on Data Engineering, 2003,26(2):19-25.
|