[1] |
LAI C , ZHOU H , CHENG N ,et al. Secure group communications in vehicular networks:a software-defined network-enabled architecture and solution[J]. IEEE Vehicular Technology Magazine, 2017,12(4): 40-49.
|
[2] |
HE X , JIN R , DAI H . Leveraging spatial diversity for privacy-aware location-based services in mobile networks[J]. IEEE Transactions on Information Forensics and Security, 2018,13(6): 1524-1534.
|
[3] |
ZHANG J , CHOW C Y . Enabling probabilistic differential privacy protection for location recommendations[J]. IEEE Transactions on Services Computing, 2018:1.
|
[4] |
李凤华, 李晖, 贾焰 ,等. 隐私计算研究范畴及发展趋势[J]. 通信学报, 2016,37(4): 1-11.
|
|
LI F H , LI H , JIA Y ,et al. Privacy computing:concept,connotation and its research trend[J]. Journal on Communications, 2016,37(4): 1-11.
|
[5] |
NIU B , LI Q , ZHU X ,et al. Achieving k-anonymity in privacy-aware location-based services[C]// International Conference on Computer Communications. IEEE, 2014: 754-762.
|
[6] |
LIU H , LI X , LI H ,et al. Spatiotemporal correlation-aware dummy-based privacy protection scheme for location-based services[C]// International Conference on Computer Communications. IEEE, 2017.
|
[7] |
ZHANG P , HU C , CHEN D ,et al. Shiftroute:achieving location privacy for map services on smartphones[J]. IEEE Transactions on Vehicular Technology, 2018,67(5): 4527-4538.
|
[8] |
ZHENG X , CAI Z , LI J ,et al. Location-privacy-aware review publication mechanism for local business service systems[C]// International Conference on Computer Communications. IEEE, 2017: 1-9.
|
[9] |
JIANG H , ZHAO P , WANG C . Roblop:towards robust privacy preserving against location dependent attacks in continuous lbs queries[J]. IEEE/ACM Transactions on Networking, 2018,26(2): 1018-1032.
|
[10] |
XIAO Y , XIONG L . Protecting locations with differential privacy under temporal correlations[C]// The 22nd ACM Conference on Computer and Communications Security. 2015: 1-7.
|
[11] |
SHOKRI R , THEODORAKOPOULOS G , BOUDEC J Y L ,et al. Quantifying location privacy[C]// IEEE Security and Privacy. 2011: 247-262.
|
[12] |
WANG J , LI Y , YANG D ,et al. Achieving effective k-anonymity for query privacy in location-based services[J]. IEEE Access, 2017,5: 24580-24592.
|
[13] |
LI W , NIU B , LI H ,et al. Privacy-preserving strategies in service quality aware location-based services[C]// IEEE International Conference on Communications. 2015: 7328-7334.
|
[14] |
YI X , PAULET R , BERTINO E ,et al. Practical approximate K nearest neighbor queries with location and query privacy[J]. IEEE Transactions on Knowledge and Data Engineering, 2016,28(6): 1546-1559.
|
[15] |
PAULET R , KAOSAR M , YI X ,et al. Privacy-preserving and content-protecting location based queries[J]. IEEE Transactions on Knowledge and Data Engineering, 2014,26(5): 1200-1210.
|
[16] |
ANDRES M , BORDENABE N , CHATZIKOKOLAKIS K ,et al. Geo-indistinguishability:differential privacy for location-basedsystems[C]// The ACM Conference on Computer and Communications Security. 2013: 901-914.
|
[17] |
PERAZZO P , DINI G . A uniformity-based approach to location privacy[J]. Computer Communications, 2015,64(1): 21-32.
|
[18] |
XU T , CAI Y . Feeling-based location privacy protection for locationbased services[C]// ACM Conference on Computer and Communications Security. 2009: 348-357.
|
[19] |
XU T , CAI Y . Exploring historical location data for anonymity preservation in location-based services[C]// International Conference on Computer Communications. IEEE, 2008: 1220-1228.
|
[20] |
PALANISAMY B , LIU L . Attack-resilient mix-zones over road networks:architecture and algorithms[J]. IEEE Transactions on Mobile Computing, 2015,14(3): 495-508.
|
[21] |
MEYEROWITZ J , CHOUDHURY R . Hiding stars with fireworks:location privacy through camouflage[C]// The Annual International Conference on Mobile Computing and Networking. 2009: 345-356.
|
[22] |
MACHANAVAJJHALAA , GEHRKEJ , KIFERD ,et al. L-diversity:privacy beyond k-anonymity[C]// International Conference on Data Engineering. IEEE, 2006: 24-26.
|
[23] |
TRIPATHYB K , MAITY A , RANAJIT B ,et al. A fast psensitive l-diversity anonymisation algorithm[C]// Recent Advances in Intelligent Computational Systems. IEEE, 2011: 741-744.
|
[24] |
HE X , JIN R , DAH I . Leveraging spatial diversity for privacy-aware location-based services in mobile networks[J]. IEEE Transactions on Information Forensics and Security, 2018,13(6): 1524-1534.
|
[25] |
HAO G , BINX Y . Research on privacy preserving method based on t-closeness model[C]// The International Conference on Communications in China. IEEE, 2017: 1455-1459.
|
[26] |
MONEDERO D R , FORNE J , FERRER J D . From t-closeness-like privacy to post randomization via information theory[J]. IEEE Transactions on Knowledge and Data Engineering, 2010,22(11): 1623-1636.
|
[27] |
LI N H , LIT C , VENKATASUBRAMANIAN S . T-closeness:privacy beyond k-anonymity and l-diversity[C]// International Conference on Data Engineering. IEEE, 2007: 106-115.
|
[28] |
CHEN Z , HU X , JU X ,et al. Lisa:location information scrambler for privacy protection on smartphones[C]// Conference on Communications and Network Security. IEEE, 2013: 296-304.
|