[1] |
ZHENG Y . Trajectory data mining:an overview[J]. ACM Transactions on Intelligent Systems &Technology, 2015,6(3): 1-41.
|
[2] |
张扶桑, 金蓓弘, 汪兆洋 ,等. 基于轨迹挖掘的公交车自组织网络路由机制[J]. 计算机学报, 2015,38(3): 648-662.
|
|
ZHANG F S , JIN B H , WANG Z Y ,et al. Routing mechanism of ad hoc network for bus based on trajectory mining[J]. Chinese Journal of Computers, 2015,38(3): 648-662.
|
[3] |
宋雪涛, 蒲英霞, 刘大伟 ,等. 利用行人轨迹挖掘城市区域功能属性[J]. 测绘学报, 2015,44(s1): 82-88.
|
|
SONG X T , PU Y X , LIU D W ,et al. Mining urban regional functional attributes by pedestrian trajectory[J]. Acta Geodaetica et Cartographica Sinica, 2015,44(s1): 82-88.
|
[4] |
HUA J , GAO Y , ZHONG S . Differentially private publication of general time-serial trajectory data[C]// Computer Communications. 2015: 549-557.
|
[5] |
CAO Y . Differentially private real-time data release over infinite trajectory streams[J]. IEICE Transactions on Information &Systems, 2016,E99-D(No.1): 68-73.
|
[6] |
CHEN R , FUNG B C M , MOHAMMED N ,et al. Privacy-preserving trajectory data publishing by local suppression[J]. Information Sciences, 2013,231(1): 83-97.
|
[7] |
CHOW C Y , MOKBEL M F . Privacy of spatial trajectories[M]// Computing with Spatial Trajectories, 2011: 109-141.
|
[8] |
GEDIK B , LIU L . Protecting location privacy with personalized k-anonymity:architecture and algorithms[J]. IEEE Transactions on Mobile Computing, 2008,7(1): 1-18.
|
[9] |
王璐, 孟小峰 . 位置大数据隐私保护研究综述[J]. 软件学报, 2014,25(4): 693-712.
|
|
WANG L , MENG X F . A survey of the research on privacy preserving for location data[J]. Journal of Software, 2014,25(4): 693-712.
|
[10] |
MAGLOGIANNIS I , KAZATZOPOULOS L , DELAKOURIDIS K ,et al. Enabling location privacy and medical data encryption in patient telemonitoring systems[J]. IEEE Transactions on Information Technology in Biomedicine a Publication of the IEEE Engineering in Medicine &Biology Society, 2009,13(6): 946-954.
|
[11] |
DWORK C . Differential privacy[M]// Automata,Languages and Programming. Springer Berlin Heidelberg, 2006: 1-12.
|
[12] |
SHEN E , YU T . Mining frequent graph patterns with differential privacy[C]// The 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 2013: 545-553.
|
[13] |
YANG B , SATO I , NAKAGWA H . Bayesian differential privacy on correlated data[C]// SIGMOD/PODS. 2015: 747-762.
|
[14] |
XIAO X . Differentially private data release:improving utility with wavelets and Bayesian networks[M]// Springer International Publishing, 2014: 25-35.
|
[15] |
SHORKRI R . Privacy games:optimal protection mechanism design for Bayesian and differential privacy[J]. IEEE Transactions on Dependable &Secure Computing, 2014,11(3): 266-279.
|
[16] |
ZHU T , XIONG P , LI G ,et al. Correlated differential privacy:hiding information in non-IID data set[J]. IEEE Transactions on Information Forensics &Security, 2015,10(2): 229-242.
|
[17] |
RASTOGI V , NATH S . Differentially private aggregation of distributed time series with transformation and encryption[C]// The ACM SIGMOD International Conference on Management of Data. 2010: 735-746.
|
[18] |
XIAO X , . Differentially private data release:improving utility with wavelets and Bayesian networks[C]// Springer International Publishing. 2014: 25-35.
|
[19] |
XIAO X ,et al. Differential privacy via wavelet transforms[J]. IEEE Transactions on Knowledge &Data Engineering, 2009,23(8): 23-30.
|
[20] |
JIANG W , XIE C , ZHANG Z . Wishart mechanism for differentially private principal components analysis[J]. Computer Science, 2015,9285(2): 458-473.
|
[21] |
GEHRKE J , HAY M , LUI E ,et al. Crowd-blending privacy[C]// Cryptology Conference on Advances in Cryptology.Springer-Verlag New York. 2012: 479-496.
|
[22] |
GEHRKE J , LUI E , PASS R . Towards privacy for social networks:a zero-knowledge based definition of privacy[C]// Theory of Cryptography - 8th Theory of Cryptography Conference. 2011: 432-449.
|
[23] |
KIFER D , MACHANAVAJJHALA A . Pufferfish:a framework for mathematical privacy definitions[J]. ACM Transactions on Database Systems, 2014,39(1): 1-36.
|
[24] |
HE X , MACHANAVAJJHALA A , DING B . Blowfish privacy:tuning privacy-utility trade-offs using policies[C]// The 2014 ACM SIGMOD International Conference on Management of Data. 2014: 1447-1458.
|
[25] |
CAO L , OU Y , YU P S . Coupled behavior analysis with applications[J]. IEEE Transactions on Knowledge &Data Engineering, 2012,24(8): 1378-1392.
|
[26] |
ZHOU Z H , SUN Y Y , LI Y F . Multi-instance learning by treating instances as non-IID samples[C]// The 26th Annual International Conference on Machine Learning. 2009: 1249-1256.
|
[27] |
RASTOGI V , HAY M , MILLAU G ,et al. Relationship privacy:output perturbation for queries with joins[C]// The 28th ACM Sigmod-Sigact-sigart Symposium on Principles of Database Systems. 2009: 107-116.
|
[28] |
DWORK C , ROTH A . The algorithmic foundations of differential privacy[J]. Foundations and Trends in Theoretical Computer Science, 2014,9(3-4): 211-407.
|
[29] |
BOJAN , BASRAK . The sample autocorrelation function of non-linear time series[M]// University of Groningen, 2000.
|
[30] |
WANG H , XU Z Q . CTS-DP:publishing correlated time-series data via differential privacy[J]. Knowledge-Based Systems, 2017,122: 167-179.
|
[31] |
ZHENG Y , XIE X , MA W Y . GeoLife:a collaborative social networking service among user,location and trajectory[J]. Bulletin of the Technical Committee on Data Engineering, 2010,33(2): 32-39.
|
[32] |
YUAN J , ZHENG Y , ZHANG C ,et al. T-drive:driving directions based on taxi trajectories[C]// ACM SIGSPATIAL International Symposium on Advances in Geographic Information Systems. 2010: 99-108.
|
[33] |
WANG H , TERROVITIS M , MAMOULIS N . Location recommendation in location-based social networks using user check-in data[C]// ACM Sigspatial International Conference on Advances in Geographic Information Systems. 2013: 374-383.
|