[1] |
ZHANG H , XU L , HUANG H ,et al. Mining spatial association rules from LBS anonymity data set for improving utilization[A]. Proceedings of the 21th IEEE International Conference on Geoinformatics[C]. Kaifeng,China, 2013. 1-6.
|
[2] |
WERNKE M , SKVORTSOV P , DURR F ,et al. A classification of location privacy attacks and approaches[J]. Personal & Ubiquitous Computing, 2014,18(1): 163-175.
|
[3] |
HIDETOSHI K , YANAGISAWA Y , SATOH T . An anonymous communication technique using dummies for location-based services[A]. Proceedings of International Conference on Pervasive Services[C]. Santorini,Greece, 2005. 88-97.
|
[4] |
JIA J , ZHANG F . Nonexposure accurate location k-anonymity algorithm in LBS[J]. The Scientific World Journal, 2014,2014(1): 619357-619357.
|
[5] |
PAN X , MENG X F , XU J L . Distortion-based anonymity for continuous queries in location-based mobile services[A]. Proceedings of the 17th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems[C]. New York,USA, 2009. 256-265.
|
[6] |
GAO S , MA J F , SHI W ,et al. TRPF:a trajectory privacy-preserving framework for participatory sensing[J]. IEEE Transactions on Information Forensics and Security, 2013,8(6): 874-887.
|
[7] |
XU T , CAI Y . Exploring historical location data for anonymity preservation in location-based services[A]. Proceedings of the 27th IEEE International Conference on Computer Communications 2008[C]. Phoenix,USA, 2008. 1220-1228.
|
[8] |
HWANG R H , HSUEH Y L . A novel time-obfuscated algorithm for trajectory privacy protection[J]. IEEE Transactions on Services Computing, 2014,7(22): 126-139.
|
[9] |
PALANISAMY B , LIU L . Attack-resilient mix-zones over road networks:architecture and algorithms[J]. IEEE Transactions on Mobile Computing, 2015,14(3): 495-508.
|
[10] |
YANG N , CAO Y , LIU Q ,et al. A novel personalized TTP-free location privacy preserving method[J]. International Journal of Security &Its Applications, 2014,8(2): 387.
|
[11] |
CHOW C Y , MOKBEL M F , LIU X . Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments[J]. Geoinformatica, 2011,15(2): 351-380.
|
[12] |
NIU B , ZHU X Y , LI W H ,et al. A personalized two-tier cloaking scheme for privacy-aware location-based services[A]. Proceedings of International Conference on Computing,Networking and Communications[C]. Garden Grove,USA, 2015. 94-98.
|
[13] |
YOU T H , PENG W C , LEE W C . Protecting moving trajectories with dummies[A]. Proceedings of IEEE 14th International Conference on Mobile Data Management[C]. Mannheim,Germany, 2007. 278-282.
|
[14] |
DONG K , GU T , TAO X ,et al. Jointcache:collaborative path confusion through lightweight P2P communication[A]. Proceedings of IEEE International Conference on Pervasive Computing and Communications Workshops[C]. San Diego,USA, 2013. 352-355.
|
[15] |
PALANISAMY B , LIU L . Road network mix-zones for anonymous location based services[A]. Proceedings of the 29th International Conference on Data Engineering[C]. Brisbane,Australia, 2013. 1300-1303.
|
[16] |
HOH B , GRUSTESER M . Protecting location privacy through path confusion[A]. Security and Privacy for Emerging Areas in Communications Networks[C]. Athens,Greece, 2005. 345-356.
|
[17] |
WU X , SUN G . A novel dummy-based mechanism to protect privacy on trajectories[A]. Proceedings of IEEE International Conference on Data Mining series[C]. Shenzhen,China, 2014. 1120-1125.
|
[18] |
NIU B , LI Q H , ZHU X Y ,et al. Achieving k-anonymity in privacy-aware location-based service[A]. Proceedings of the 33rd IEEE International Conference on Computer Communications[C]. Toronto,Canada, 2014. 754-762.
|
[19] |
PINGLEY A . Protection of query privacy for continuous location based services[A]. Proceedings of the 30th IEEE International Conference on Computer Communications 2011[C]. Shanghai,China, 2011. 1710-1718.
|
[20] |
HARA T , YAMAMOTO A , ARASEL Y ,et al. Location anonymization using real car trace data for location based services[A]. Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication[C]. Siem Reap,Cambodia, 2014. 1-8.
|
[21] |
SHARMA V , SHEN C . Evaluation of an entropy-based k-anonymity model for location based services[A]. Proceedings of International Conference on Computing,Networking and Communications[C]. Garden Grove,USA, 2015. 374-378.
|
[22] |
SHOKRI R , THEODORAKOPOULOS G , BOUDEC J Y L ,et al. Quantifying location privacy[A]. Proceedings of the 32nd IEEE Symposium on Security & Privacy[C]. Claremont Resort,USA, 2011. 247-262.
|
[23] |
FREUDIGER J . When Whereabouts is no Longer Thereabouts:Location Privacy in Wireless Networks[D]. PhD thesis EPFL, 2011.
|
[24] |
FREUDIGER J , SHOKRI R , HUBAUX J P . Evaluating the Privacy risk of Location-based Services[M]. Financial Cryptography and Data Security. Springer Berlin Heidelberg, 2012. 31-46.
|
[25] |
NIU B , LI Q H , ZHU X Y ,et al. Enhancing privacy through caching in location-based services[A]. Proceedings of the 34rd IEEE International Conference on Computer Communications[C]. Hong Kong,China, 2015. 1017-1025.
|
[26] |
FREJINGER E . Route Choice Analysis:Data,Models,Algorithms and Applications[D]. PhD thesis EPFL, 2008.
|
[27] |
KATO R , IWATA M , HARA T ,et al. A dummy-based anonymization method based on user trajectory with pauses[A]. Proceedings of the 20th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems[C]. Redondo Beach,USA, 2012. 249-258.
|