[1] |
GEDIK B , LIU L . Protecting location privacy with personalized k-anonymity:architecture and algorithms[J]. IEEE Transactions on Mobile Computing, 2008,7(1): 1-18.
|
[2] |
PINGLY A,YU W , ZHANG N , FU X ,et al. Cap:a context-aware privacy protection system for location-based services[C]// ICDCS. 2009: 49-57.
|
[3] |
LI X,ZHANG C , JUNG T , QIAN J ,et al. Graph-based privacy-preserving data publication[C]// INFOCOM. 2016.
|
[4] |
CHEN Z , HU X , JU X ,et al. Lisa:location information scrambler for privacy protection on smartphones[C]// CNS. 2013.
|
[5] |
ANDRES M , BORDENABE N , CHATZIKOKOLAKIS K ,et al. Geo-indistinguishability:differential privacy for location-based systems[C]// CCS. 2013.
|
[6] |
PERAZZO P , DINI G . A uniformity-based approach to location privacy[J]. Computer Communications, 2015,64(1): 21-32.
|
[7] |
NIU B , LI Q , ZHU X ,et al. Achieving k-anonymity in privacy-aware location-based services[C]// INFOCOM. 2014.
|
[8] |
NIU B , LI Q , ZHU X ,et al. Enhancing privacy through caching in location-based services[C]// INFOCOM. 2015.
|
[9] |
SHOKRI R , THEODORAKOPOULOS G , PAPADIMITRATIS P ,et al. Hiding in the mobile crowd:Location privacy through collaboration[J]. IEEE Transactions on Dependable and Secure Computing, 2014,11(3): 266-279.
|
[10] |
黄毅, 霍峥, 孟小峰 . CoPrivacy:一种用户协作无匿名区域的位置隐私保护方法[J]. 计算机学报, 2011,34(10): 1976-1985.
|
|
HUANG Y , HUO Z , MENG X F . CoPrivacy:a collaborative location privacy-preserving method without cloaking region[J]. Chinese Journal of Comuputers, 2011,34(10): 1976-1985.
|
[11] |
YI X , PAULET R , BERTINO E ,et al. Practical approximate K nearest neighbor queries with location and query privacy[J]. IEEE Transactions on Knowledge and Data Engineering, 2016,PP(99): 1-14.
|
[12] |
PAULET R , KAOSAR M , YI X ,et al. Privacy-preserving and content-protecting location based queries[J]. IEEE Transactions on Knowledge and Data Engineering, 2014,26(5): 1200-1210.
|
[13] |
CHOW C , MOKBEL M , LIU X . Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments[J]. GeoInformatica, 2011,15(2): 351-380.
|
[14] |
MOKEL M , CHOW C , AREF W . The new casper:query processing for location services without compromising privacy[J]. The IEEE VLDB Journal, 2006.
|
[15] |
ZHANG X , XIA Y , BAE H . A novel location privacy preservation method for moving object[J]. International Journal of Security and Its Applications, 2015,9(2): 1-12.
|
[16] |
BERESFORD A , STAJANO F . Location privacy in pervasive computing[J]. IEEE Pervasive Computing, 2003,2(1): 46-55.
|
[17] |
PALANISAMY B , LIU L . Attack-resilient mix-zones over road networks:architecture and algorithms[J]. IEEE Transactions on Mobile Computing, 2015,14(3): 495-508.
|
[18] |
MEYEROWITZ J , CHOUDHURY R . Hiding stars with fireworks:location privacy through camouflage[C]// MobiCom. 2009.
|
[19] |
XU T , CAI T . Feeling-based location privacy protection for location-based services[C]// CCS. 2009.
|
[20] |
MONTAZERI Z , HOUMANSADR A , PISHRO H . Achieving perfect location privacy in wireless devices using anonymization[J]. IEEE Transactions on Information Forensics and Security, 2017,PP(99): 1.
|
[21] |
WANG X , PANDE A , ZHU J ,et al. Stamp:enabling privacy-preserving location proofs for mobile users[J]. IEEE/ACM Transactions on Networking, 2016,24(6): 3276-3289.
|
[22] |
FAWAZ K , SHIN K . Location privacy protection for smartphone users[C]// CCS. 2014.
|
[23] |
SHOKRI R , THEODORAKOPOULOS G , TRONCOSO C ,et al. Protecting location privacy:optimal strategy against localization attacks[C]// CCS. 2012.
|
[24] |
GOTE M , NATH S , GEHRKE J . Maskit:privately releasing user context streams for personalized mobile applications[C]// SIGMOD. 2012.
|
[25] |
SHOKRI R , THEODORAKOPOULOS G , BOUDEC J ,et al. Hubaux.Quantifying location privacy[C]// SP. 2011.
|
[26] |
ZHENG Y , XIE X , MA W . Geolife:a collaborative social networking service among user,location and trajectory[C]// Data Eng.Bull. 2010.
|
[27] |
CHO E , MYERS S , LESKOVEC J . Friendship and mobility:user movement in location-based social networks[C]// KDD. 2011.
|
[28] |
PINGLEY A , ZHANG N , FU X ,et al. Protection of query privacy for continuous location based services[C]// INFOCOM. 2011.
|
[29] |
NIU B , ZHU X , LI W ,et al. A personalized two-tier cloaking scheme for privacy aware location-based services[C]// ICNC. 2015.
|