[1] |
GAMBS S , KILLIJIAN M O , CORTEZ M N P . Show me how you move and I will tell you who you are[J]. Transactions on Data Privacy, 2011,2(4): 103-126.
|
[2] |
KRUMM J . A survey of computational location privacy[J]. Personal and Ubiquitous Computing, 2009,13(6): 391-399.
|
[3] |
GRUTESER M , GRUNWALD D . Anonymous usage of location-based services through spatial and temporal cloaking[C]// The First International Conference on Mobile Systems,Applications,and Services. New York:ACM, 2003: 163-168.
|
[4] |
NIU B , LI Q , ZHU X ,et al. Achieving k-anonymity in privacy-aware location-based services[C]// The 33rd Annual IEEE International Conference on Computer Communications. Washington:IEEE, 2014: 754-762.
|
[5] |
NIU B , ZHANG Z Y , LI X Q ,et al. Privacy-area aware dummy generation algorithms for location-based services[C]// The 2014 IEEE International Conference on Communication. Washington:IEEE, 2014: 957-962.
|
[6] |
DUCKHAM M , KULIK L . A formal model of obfuscation and negotiation for location privacy[C]// The 3rd International Conference on Pervasive Computing. Berlin:Springer, 2005: 152-170.
|
[7] |
MASCETTI S , FRENI D , BETTINI C ,et al. Privacy in geo-social networks:proximity notification with untrusted service providers and curious buddies[J]. Journal of VLDB, 2010,20(4): 541-566.
|
[8] |
ANDRES M E , BORDENABE N E , CHATZIKOKOLAKIS K ,et al. Geo-indistinguishability:differential privacy for location-based systems[C]// The 2013 ACM SIGSAC Conference on Computer and Communications Security. New York:ACM, 2013: 901-914.
|
[9] |
XIAO Y , LI X . Protecting locations with differential privacy under temporal correlations[C]// The 22nd ACM SIGSAC Conference on Computer and Communications Security. New York:ACM, 2015: 1298-1309.
|
[10] |
SCHLEGEL R , CHOW C Y , HUANG Q ,et al. User-defined privacy grid system for continuous location-based services[J]. IEEE Transactions on Mobile Computing, 2015,14(10): 2158-2172.
|
[11] |
MOKBEL M F , CHOW C Y , AREF W G . The new casper:privacy-aware location-based database server[C]// The 23rd International Conference on Data Engineering. Washington:IEEE, 2007: 1499-1500.
|
[12] |
MOKBEL M F , CHOW C Y , AREF W G . Casper:query processing for location services without compromising privacy[J]. ACM Transactions on Database Systems, 2009,34(4): 24-48.
|
[13] |
LI X H , WANG E M , YANG W D ,et al. DALP:a demand-aware location privacy protection scheme in continuous location-based services[J]. Concurrency and Computation:Practice and Experience, 2016,28(4): 1219-1236.
|
[14] |
GEDIK B , LIU L . Protecting location privacy with personalized k-anonymity:architecture and algorithms[J]. IEEE Transactions on Mobile Computing, 2008,7(1): 1-18.
|
[15] |
KALNIS P , GHINITA G , MOURATIDIS K ,et al. Preventing location-based identity inference in anonymous spatial queries[J]. IEEE Transactions on Knowledge and Data Engineering, 2007,19(12): 1719-1733.
|
[16] |
TAN K W , LIN Y . Spatial cloaking revisited:distinguishing information leakage from anonymity[C]// The 11th International Symposium on Advances in Spatial and Temporal Databases. Washington:IEEE, 2009: 117-134.
|
[17] |
LI T C , ZHU W T . Protecting user anonymity in location-based services with fragmented cloaking region[C]// 2012 IEEE International Conference on Computer Science and Automation Engineering. Washington:IEEE, 2012: 227-231.
|
[18] |
CHENG R , ZHANG Y , BERTINO E ,et al. Preserving user locationprivacy in mobile data management infrastructures[C]// The 6th International Workshop on Privacy Enhancing Technologies. Washington:IEEE, 2006: 393-412.
|
[19] |
BRINKOFFffT . A framework for generating network-based moving objects[J]. GeoInformatica, 2002,6(2): 153-180.
|
[20] |
HADJIELEFTHERIOU M , MANOLOPOULOS Y , THEODORIDIS Y ,et al. R-trees-a dynamic index structure for spatial searching[C]// Encyclopedia of GIS. Berlin:Springer, 2008: 993-1002.
|