[1] |
GRUTESER M , GRUNWALD D . Anonymous usage of location-based services through spatial and temporal cloaking[C]// The 1st International Conference on Mobile Systems,Applications and Services,ACM. 2003: 31-42.
|
[2] |
BAMBA B , LIU L , PESTI P ,et al. Supporting anonymous location queries in mobile environments with privacygrid[C]// The 17th International Conference on World Wide Web. 2008: 237-246.
|
[3] |
REBOLLO-MONEDERO D , FORNE J , SOLANAS A ,et al. Private location-based information retrieval through user collaboration[J]. Computer Communications, 2010,33(6): 762-774.
|
[4] |
YIU M L , JENSEN C S , MOLLER J ,et al. Design and analysis of a ranking approach to private location-based services[J]. ACM Transactions on Database Systems, 2011,36(2): 475-486.
|
[5] |
GHINITA G , KALNIS P , KHOSHGOZARAN A ,et al. Private queries in location based services:anonymizers are not necessary[C]// The 2008 ACM Sigmod International Conference on Management of Data. 2008: 121-132.
|
[6] |
AGGARWAL G , FEDER T , KENTHAPADI K ,et al. Anonymizing tables[M]. Berlin: SpringerPress, 2005: 246-258.
|
[7] |
WONG R C W , LI J , FU A W C ,et al. (α,k)-anonymity:an enhanced k-anonymity model for privacy preserving data publishing[C]// The 12th ACM Sigkdd International Conference on Knowledge Discovery and Data Mining. 2006: 754-759.
|
[8] |
LEE J G , HAN J , WHANG K Y . Trajectory clustering:a partition-and-group framework[C]// The 2007 ACM Sigmod International Conference on Management of Data. 2007: 593-604.
|
[9] |
XU Y , WANG K , FU A W C ,et al. Anonymizing transaction databases for publication[C]// The 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 2008: 767-775.
|
[10] |
ABUL O , BONCHI F , NANNI M ,et al. Never walk alone:uncertainty for anonymity in moving objects databases[C]// The 24th IEEE International Conference on Data Engineering,Cancun. 2008: 376-385.
|
[11] |
BONCHI F . Privacy preserving publication of moving object data[M]// Privacy in Location-Based Applications. Berlin: SpringerPress, 2009: 190-215.
|
[12] |
BONCHI F , LAKSHMANAN L V S , WANG H . Trajectory anonymity in publishing personal mobility data[J]. Sigkdd Explor Newsl, 2011,13(1): 30-42.
|
[13] |
潘晓, 郝兴, 孟小峰 . 基于位置服务中的连续查询隐私保护研究[J]. 计算机研究与发展, 2010,47(1): 121-129.
|
|
PAN X , HAO X , MENG X F . Privacy preserving towards continuous query in location-based services[J]. Journal of Computer Research and Development, 2010,47(1): 121-129.
|
[14] |
HASHEM T , KULIK L , ZHANG R . Countering overlapping rectangle privacy attack for moving KNN queries[J]. Information Systems, 2013,38(3): 430-453.
|
[15] |
HWANG R H , HSUEH Y L , CHUNG H W . A novel time- obfuscated algorithm for trajectory privacy protection[J]. IEEE Transactions on Services Computing, 2014,7(2): 126-139.
|
[16] |
GAO S , MA J F , SHI W S ,et al. LTPPM:a location and trajectory privacy protection mechanism in participatory sensing[J]. Wireless Communications &Mobile Computing, 2015,15(1): 155-169.
|
[17] |
WANG Y , HE L P , PENG J ,et al. Privacy preserving for continuous query in location based services[C]// The IEEE 18th International Conference on Parallel and Distributed System (ICPADS). 2012: 213-220.
|
[18] |
SKOUMAS G , SKOUTAS D , VLACHAKI A . Efficient identification and approximation of k-nearest moving neighbors[C]// The 21st ACM Sigspatial International Conference on Advances in Geographic Information Systems. 2013: 264-273.
|
[19] |
WANG E K , YE Y . A new privacy-preserving scheme for continuous query in location-based social networking services[J]. The International Journal of Distributed Sensor Networks, 2014(1): 836-839.
|
[20] |
JIA J , ZHANG F . Nonexposure accurate location k-anonymity algorithm in LBS[J]. Scientific World Journal, 2014(1): 149-168.
|
[21] |
张磊, 马春光, 杨松涛 . 基于位置关联相似性的匿名算法[J]. 中国科技论文, 2016(2): 197-201.
|
|
ZHANG L , MA C G , YANG S T . Anonymous algorithm based on position correlation similarity[J]. China Science and Technology, 2016(2): 197-201.
|
[22] |
BERESFORD A R , STAJANO F . Location privacy in pervasive computing[J]. Pervasive Computing, 2003,2(1): 46-55.
|
[23] |
FREUDIGER J , SHOKRI R , HUBAUX J P . On the optimal placement of mix zones[C]// The Privacy enhancing Technologies. 2009: 216-234.
|
[24] |
FREUDIGER J , RAYA M , FéLEGYHáZI M ,et al. Mix-zones for location privacy in vehicular networks[C]// The 1st International Workshop on Wireless Networking for Intelligent Transportation Systems (Win-ITS). 2007.
|
[25] |
PALANISAMY B , LING L . MobiMix:protecting location privacy with mix-zones over road networks[C]// 2011 IEEE 27th International Conference on Data Engineering (ICDE). 2011: 494-505.
|
[26] |
PALANISAMY B , LIU L , LEE K ,et al. Anonymizing continuous queries with delay-tolerant mix-zones over road networks[J]. Distributed and Parallel Databases, 2014,32(1): 91-118.
|
[27] |
马春光, 张磊, 杨松涛 . 位置轨迹隐私保护综述[J]. 信息网络安全, 2015(10): 24-31.
|
|
MA C G , ZHANG L , YANG S T . Track location privacy protection review[J]. Information Network Security, 2015 (10): 24-31.
|
[28] |
张磊, 马春光, 杨松涛 ,等. 基于轮廓泛化的位置隐私保护模型及方法[J]. 系统工程与电子技术, 2016,38(12): 2894-2900.
|
|
MA C G , ZHANG L , YANG S T ,et al. Location privacy protection model and method based on contour generalization[J]. Journal of Systems Engineering,and Electronics, 2016,38(12): 2894-2900.
|