[1] |
HUO Z , MENG X F , HU H B ,et al. You can walk alone:trajectory privacy-preserving through significant stays protection[C]// Proceedings of International Conference on Database Systems for Advanced Applications. Heidelberg:Springer, 2012: 351-366.
|
[2] |
ZHANG X L , YANG W J . Trajectory anonymous algorithm based on k-means++ against similarity attack[J]. Computer Science and Application, 2020,10(4): 610-618.
|
[3] |
俞望年, 宣占祥, 马小明 ,等. 轨迹数据发布中基于敏感语义位置的隐私保护算法[J]. 现代计算机, 2020(27): 3-9.
|
|
YU W N , XUAN Z X , MA X M ,et al. Privacy protection algorithm based on sensitive semantic location in trajectory data publishing[J]. Modern Computer, 2020(27): 3-9.
|
[4] |
俞庆英, 王燕飞, 叶梓彤 ,等. 基于优化局部抑制的轨迹数据发布隐私保护算法[J]. 计算机工程, 2020,46(8): 112-118.
|
|
YU Q Y , WANG Y F , YE Z T ,et al. Privacy protection algorithm based on optimized local suppression for trajectory data publication[J]. Computer Engineering, 2020,46(8): 112-118.
|
[5] |
王辉, 朱国宇, 申自浩 ,等. 基于用户偏好和位置分布的假位置生成方法[J]. 计算机科学, 2021,48(7): 164-171.
|
|
WANG H , ZHU G Y , SHEN Z H ,et al. Dummy location generation method based on user preference and location distribution[J]. Computer Science, 2021,48(7): 164-171.
|
[6] |
DWORK C . Calibrating noise to sensitivity in private data analysis[J]. Lecture Notes in Computer Science, 2012,3876(8): 265-284.
|
[7] |
HAN Q , XIONG Z , ZHANG K . Research on trajeetory data releasing method via differential privacy based on spetial partition[J]. Security and Communication Networks, 2018: 1-14.
|
[8] |
ZHAO X , PI D , CHEN J . Novel trajectory privacy-preserving method based on prefix tree using differential privacy[J]. Knowledge-based Systems, 2020,198:105940.
|
[9] |
霍峥, 孟小峰 . 一种满足差分隐私的轨迹数据发布方法[J]. 计算机学报, 2018,41(2): 400-412.
|
|
HUO Z , MENG X F . A trajectory data publication method under differential privacy[J]. Chinese Journal of Computers, 2018,41(2): 400-412.
|
[10] |
刘向宇, 刘竹丰, 夏秀峰 ,等. 一种保持轨迹数据高可用性的隐式位置访问隐私保护技术[J]. 沈阳航空航天大学学报, 2019,36(2): 66-75.
|
|
LIU X Y , LIU Z F , XIA X F ,et al. An algorithm of protecting hidden location visit privacy with high trajectory utility[J]. Journal of Shenyang Aerospace University, 2019,36(2): 66-75.
|
[11] |
彭长根, 丁红发, 朱义杰 ,等. 隐私保护的信息熵模型及其度量方法[J]. 软件学报, 2016,27(8): 1891-1903.
|
|
PENG C G , DING H F , ZHU Y J.et al . Information entropy models and privacy protection[J]. Joumal of Software. 2016,27(8): 1891-1903.
|
[12] |
VISVALINGAM M , WHYATT J D . Line generalisation by repeated elimination of points[J]. The Cartographic Journal, 1993,30(1): 46-51.
|
[13] |
MCSHERRY F , TALWAR K . Mechanism design via differential privacy[C]// Proceedings of the 48th Annual IEEE Symposium on Foundations of Computer Science. Piscataway:IEEE Press, 2007: 94-103.
|
[14] |
MYERS C S , RABINER L R . A comparative study of several dynamic time warping algorithms for speech recognition[J]. Bell Labs Technical Journal, 2013,60(7): 1389-1409.
|
[15] |
马明杰, 杜跃进, 李凤华 ,等. 基于语义的位置服务隐私保护综述[J]. 网络与信息安全学报, 2016,2(12): 1-11.
|
|
MA M J , DU Y J , LI F H ,et al. Review of semantic-based privacy-preserving approaches in LBS[J]. Chinese Journal of Network and Information Security, 2016,2(12): 1-11.
|
[16] |
JIANG K F , SHAO D X , BRESSAN S ,et al. Publishing trajectories with differential privacy guarantees[C]// Proceedings of the 25th International Conference on Scientific and Statistical Database Management.[S.l.:s.n.], 2013: 1-12.
|
[17] |
兰微, 林英, 包聆言 ,等. 融入兴趣区域的差分隐私轨迹数据保护方法[J]. 计算机科学与探索, 2020,14(1): 59-72.
|
|
LAN W , LIN Y , BAO L Y ,et al. Trajectory-differential privacyprotection method with interest region[J]. Journal of Frontiers of Computer Science and Technology, 2020,14(1): 59-72.
|
[18] |
LEE J G , HAN J W , WHANG K Y . Trajectory clustering:a partition-and-group framework[C]// Proceedings of 2007 ACM SIGMOD international conference on Management of data.[S.l.:s.n.], 2007: 593-604.
|