Journal on Communications ›› 2021, Vol. 42 ›› Issue (8): 164-175.doi: 10.11959/j.issn.1000-436x.2021123
• Papers • Previous Articles Next Articles
Hongtao LI1, Xiaoyu REN1, Jie WANG1, Jianfeng MA2
Revised:
2021-04-03
Online:
2021-08-25
Published:
2021-08-01
Supported by:
CLC Number:
Hongtao LI, Xiaoyu REN, Jie WANG, Jianfeng MA. Continuous location privacy protection mechanism based on differential privacy[J]. Journal on Communications, 2021, 42(8): 164-175.
[1] | 何泾沙, 杜晋晖, 朱娜斐 . 基于 k 匿名的准标识符属性个性化实现算法研究[J]. 信息网络安全, 2020,20(10): 19-26. |
HE J S , DU J H , ZHU N F . Research on k-anonymity algorithm for personalized quasi-identifier attributes[J]. Netinfo Security, 2020,20(10): 19-26. | |
[2] | 邹劲松, 李芳 . 基于可伸缩 l-多样性的大数据发布隐私保护[J]. 计算机应用研究, 2021,38(2): 564-566,571. |
ZOU J S , LI F . Big data publishing privacy protection based on scalable l-diversity[J]. Application Research of Computers, 2021,38(2): 564-566,571. | |
[3] | 汪逸飞, 罗永龙, 俞庆英 ,等. 基于信息熵抑制的轨迹隐私保护方法[J]. 计算机应用, 2018,38(11): 3252-3257. |
WANG Y F , LUO Y L , YU Q Y ,et al. Trajectory privacy-preserving method based on information entropy suppression[J]. Journal of Computer Applications, 2018,38(11): 3252-3257. | |
[4] | 王洁, 王春茹, 马建峰 ,等. 基于位置语义和查询概率的假位置选择算法[J]. 通信学报, 2020,41(3): 53-61. |
WANG J , WANG C R , MA J F ,et al. Dummy location selection algorithm based on location semantics and query probability[J]. Journal on Communications, 2020,41(3): 53-61. | |
[5] | HU Z W , YANG J , ZHANG J P . Trajectory privacy protection method based on the time interval divided[J]. Computers & Security, 2018,77: 488-499. |
[6] | 李婕, 白志宏, 于瑞云 ,等. 基于PSO优化的移动位置隐私保护算法[J]. 计算机学报, 2018,41(5): 1037-1051. |
LI J , BAI Z H , YU R Y ,et al. Mobile location privacy protection algorithm based on PSO optimization[J]. Chinese Journal of Computers, 2018,41(5): 1037-1051. | |
[7] | HE W , . Research on LBS privacy protection technology in mobile social networks[C]// 2017 IEEE 2nd Advanced Information Technology,Electronic and Automation Control Conference. Piscataway:IEEE Press, 2017: 73-76. |
[8] | DWORK C , KENTHAPADI K , MCSHERRY F ,et al. Our data,ourselves:privacy via distributed noise generation[M]. Berlin: Springer, 2006. |
[9] | CHEN R , FUNG B C M , DESAI B C ,et al. Differentially private transit data publication:a case study on the Montreal transportation system[C]// Proceedings of the 18th ACM SIGKDD international conference on Knowledge discovery and data mining. New York:ACM Press, 2012: 213-221. |
[10] | 霍峥, 孟小峰 . 一种满足差分隐私的轨迹数据发布方法[J]. 计算机学报, 2018,41(2): 400-412. |
HUO Z , MENG X F . A trajectory data publication method under differential privacy[J]. Chinese Journal of Computers, 2018,41(2): 400-412. | |
[11] | 吴云乘, 陈红, 赵素云 ,等. 一种基于时空相关性的差分隐私轨迹保护机制[J]. 计算机学报, 2018,41(2): 309-322. |
WU Y C , CHEN H , ZHAO S Y ,et al. Differentially private trajectory protection based on spatial and temporal correlation[J]. Chinese Journal of Computers, 2018,41(2): 309-322. | |
[12] | XIAO Y H , XIONG L . Protecting locations with differential privacy under temporal correlations[C]// Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. New York:ACM Press, 2015: 1298-1309. |
[13] | ZHENG Y , XIE X , MA W Y . Geolife:a collaborative social networking service among user,location and trajectory[J]. IEEE Data Engineering Bulletin, 2010,33(2): 32-39. |
[14] | CHO E , MYERS S A , LESKOVEC J . Friendship and mobility:user movement in location-based social networks[C]// Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. New York:ACM Press, 2011: 1082-1090. |
[15] | 石秀金, 徐嘉敏, 王锐 ,等. 基于噪声前缀树的轨迹数据发布隐私保护算法研究[J]. 智能计算机与应用, 2019,9(2): 9-15. |
SHI X J , XU J M , WANG R ,et al. Research on privacy protection algorithm of trajectory data distribution based on noise prefix tree[J]. Intelligent Computer and Applications, 2019,9(2): 9-15. | |
[16] | 兰微, 林英, 包聆言 ,等. 融入兴趣区域的差分隐私轨迹数据保护方法[J]. 计算机科学与探索, 2020,14(1): 59-72. |
LAN W , LIN Y , BAO L Y ,et al. Trajectory-differential privacy-protection method with interest region[J]. Journal of Frontiers of Computer Science and Technology, 2020,14(1): 59-72. | |
[17] | 程保容, 叶阿勇, 张强 ,等. 一种基于隐私拆分的轨迹隐私保护方法[J]. 福建师范大学学报(自然科学版), 2020,36(6): 28-35. |
CHENG B R , YE A , ZHANG Q ,et al. A trajectory privacy preserving algorithm based on privacy splitting[J]. Journal of Fujian Normal University (Natural Science Edition), 2020,36(6): 28-35. | |
[18] | 胡德敏, 廖正佳 . 不规则线段树的差分隐私位置隐私保护方法[J]. 小型微型计算机系统, 2020,41(2): 333-337. |
HU D M , LIAO Z J . Differential privacy of location privacy protection method for irregular segment tree[J]. Journal of Chinese Computer Systems, 2020,41(2): 333-337. | |
[19] | 张双越, 田丰, 吴振强 . 一种基于差分隐私机制的自适应轨迹数据发布算法[J]. 陕西师范大学学报(自然科学版), 2018,46(5): 9-15,21. |
ZHANG S Y , TIAN F , WU Z Q . An adaptive trajectory data publishing algorithm based on differential privacy[J]. Journal of Shaanxi Normal University (Natural Science Edition), 2018,46(5): 9-15,21. |
[1] | Tao FENG, Liqiu CHEN, Junli FANG, Jianming SHI. Blockchain data sharing scheme based on localized difference privacy and attribute-based searchable encryption [J]. Journal on Communications, 2023, 44(5): 224-233. |
[2] | Shengxing YU, Zekai CHEN, Zhong CHEN, Ximeng LIU. DAGUARD: distributed backdoor attack defense scheme under federated learning [J]. Journal on Communications, 2023, 44(5): 110-122. |
[3] | Shufen ZHANG, Yanling DONG, Jingcheng XU, Haoshi WANG. AdaBoost algorithm based on target perturbation [J]. Journal on Communications, 2023, 44(2): 198-209. |
[4] | Lingtao TANG, Di WANG, Shengyun LIU. Data augmentation scheme for federated learning with non-IID data [J]. Journal on Communications, 2023, 44(1): 164-176. |
[5] | Chengsheng YUAN, Qiang GUO, Zhangjie FU. Copyright protection algorithm based on differential privacy deep fake fingerprint detection model [J]. Journal on Communications, 2022, 43(9): 181-193. |
[6] | Hanyi WANG, Xiaoguang LI, Wenqing BI, Yahong CHEN, Fenghua LI, Ben NIU. Multi-level local differential privacy algorithm recommendation framework [J]. Journal on Communications, 2022, 43(8): 52-64. |
[7] | Yong ZHANG, Dandan LI, Lu HAN, Xiaohong HUANG. Privacy-protected crowd-sensed data trading algorithm [J]. Journal on Communications, 2022, 43(5): 1-13. |
[8] | Haiyan KANG, Yuanrui JI. Research on federated learning approach based on local differential privacy [J]. Journal on Communications, 2022, 43(10): 94-105. |
[9] | Yan YAN, Yiming CONG, Mahmood Adnan, Quanzheng SHENG. Statistics release and privacy protection method of location big data based on deep learning [J]. Journal on Communications, 2022, 43(1): 203-216. |
[10] | Si CHEN, Anmin FU, Mang SU, Huaijiang SUN. Trajectory privacy protection scheme based on differential privacy [J]. Journal on Communications, 2021, 42(9): 54-64. |
[11] | Jie CUI, Xuefeng CHEN, Jing ZHANG, Lu WEI, Hong ZHONG. Bus cache-based location privacy protection scheme in the Internet of vehicles [J]. Journal on Communications, 2021, 42(7): 150-161. |
[12] | Jianping CAI, Ximeng LIU, Jinbo XIONG, Zuobin YING, Yingjie WU. Approximation method of multiple consistency constraint under differential privacy [J]. Journal on Communications, 2021, 42(6): 107-117. |
[13] | Suxia ZHU, Shulun LIU, Guanglu SUN. Shape similarity differential privacy trajectory protection mechanism based on relative entropy and K-means [J]. Journal on Communications, 2021, 42(2): 113-123. |
[14] | Yang LIU, Jun LI, Wenyun CHEN, Mugen PENG. Research on endogenous security data sharing mechanism of F-RAN for 6G [J]. Journal on Communications, 2021, 42(1): 67-78. |
[15] | Ayong YE,Lingyu MENG,Ziwen ZHAO,Yiqing DIAO,Jiaomei ZHANG. Trajectory differential privacy protection mechanism based on prediction and sliding window [J]. Journal on Communications, 2020, 41(4): 123-133. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|