[1] |
JENSEN C S , 5-Database aspects of location-based services[J]. Journal of Location Based Services, 2004: 115-147.
|
[2] |
Man accused of stalking ex-girlfriend with GPS[EB/OL]. .
|
[3] |
Authorities:GPS system used to stalk woman[EB/OL]. .
|
[4] |
WICKER S B . A collaborative filtering approach to ad recommendation using the query-ad click graph[J]. Communications of the ACM, 2012, 55 (8): 60-68.
|
[5] |
王宇航, 张宏莉, 余翔湛 . 移动互联网中的位置隐私保护研究[J]. 通信学报, 2015, 36 (9): 230-243.
|
|
WANG Y H , ZHANG H L , YU X Z . Research on location privacy in mobile internet[J]. Journal of Communication, 2015, 36 (9): 230-243.
|
[6] |
王璐, 孟小峰 . 位置大数据隐私保护研究综述[J]. 软件学报, 2014, 25 (4): 693-712.
|
|
WANG L , MENG X F . Location privacy preservation in big data era: a survey[J]. Journal of Software, 2014, 25 (4): 693-712.
|
[7] |
SWEENEY L . k-anonymity: a model for protecting privacy[J]. Inter-national Journal of Uncertainty, Fuzziness and Knowledge-based Systems, 2002, 10 (05): 557-570.
|
[8] |
PIRAMUTHU, On existence proofs for multiple RFID tags[C]// The International Conference on Pervasive Services, IEEE. 2006: 317-320.
|
[2] |
KIDO H , YANAGISAWA Y , SATOH T , An anonymous communi-cation technique using dummies for location-based services[C]// The International Conference on Pervasive Services(ICPS '05). 2005: 88-97.
|
[10] |
ARDAGNA CA , CREMONINI M , DAMIANI E , et al. Location pri-vacy protection through obfuscation-based techniques[M]// Data and Applications Security XXI. Berlin Heidelberg :Springer. 2007: 47-60.
|
[11] |
PALANISAMY B , LIU L . MobiMix: protecting location privacy with mix-zones over road networks[C]// The 2011 IEEE 27th Inter-national Conference on Data Engineering. 2011: 494-505.
|
[12] |
MASCETTI S , FRENI D , BETTINI C , et al. Privacy in geo-social networks: proximity notification with untrusted service providers and curious buddies[J]. VLDB Journal, 2010, 20 (4): 541-566.
|
[13] |
LI X Y , JUNG T . Search me if you can: privacy-preserving location query service[C]// Infocom, IEEE. 2012: 2760-2768.
|
[14] |
TZ M , NATH S , GEHRKE J . MaskIt: privately releasing user context streams for personalized mobile applications[C]// The ACM Sigmod International Conference on Management of Data. 2012: 289-300.
|
[15] |
CHEN M , LIU Y , YU X . NLPMM: a next location predictor with Markov modeling[C]// Advances in Knowledge Discovery and Data Mining. 2014: 186-197.
|
[16] |
DEWRI R , THURIMELLA R . Exploiting service similarity for privacy in location-based search queries[J]. IEEE Transactions on Parallel&Distributed Systems. 2014, 25 (2): 374-383.
|
[17] |
YOU T H , PENG W C , LEE W C . Protecting moving trajectories with dummies[C]// The International Conference on Mobile Data Management. 2007: 278-282.
|