[1] |
潘晓, 肖珍, 孟小峰 . 位置隐私研究综述[J]. 计算机科学与探索, 2007,1(3): 268-281. PAN X , XIAO Z , MENG X F . Location privacy research review[J]. Journal of Computer Science and Exploration, 2007,1(3): 268-281.
|
[2] |
SWEENEY L . K-anonymity:a model for protecting privacy[J]. International Journal on Uncertainty,Fuzziness and Knowledge-Based Systems, 2002,10(5): 557-570.
|
[3] |
GRUTESER M , GRUNWALD D . Anonymous usage of location-based services through spatial and temporal cloaking[C]// The 1st International Conference on Mobile Systems,Applications and Services,September 11-15,2003,San Francisco,USA. New York:ACM Press, 2003: 31-42.
|
[4] |
GEDIK B , LIU L . Protecting location privacy with personalized k-anonymity:architecture and algorithms[J]. Mobile Computing, 2008,7(1): 1-18.
|
[5] |
GEDIK B , LIU L . A customizable k-anonymity model for protecting location privacy[J]. Icdcs, 2004: 620-629.
|
[6] |
GONG Z , SUN G Z , XIE X . Protecting privacy in location-based services using k-anonymity without cloaked region[C]// Eleventh International Conference on Mobile Data Management,MDM 2010,May 3-6,2010,Kanas City,Missouri,USA. New Jersey:IEEE Press, 2010: 23-26.
|
[7] |
霍峥, 孟小峰, 黄毅 . Private Check In:一种移动社交网络中的轨迹隐私保护方法[J]. 计算机学报, 2013,36(4): 716-726. HUO Z , MENG X F , HUANG Y . Private check in:a method of trajectory of mobile social network privacy protection[J]. Journal of Computers, 2013,36(4): 716-726.
|
[8] |
MOKBEL M F , CHOW C Y , AREF W G . The new casper:query processing for location services without compromising privacy[C]// The International Conference on Very Large Data Bases(VLDB’06),May 12-14,2006,Seoul,South Korea. New York:ACM Press, 2006: 763-774.
|
[9] |
张学军, 桂小林, 伍忠东 . 位置服务隐私保护研究综述[J]. 计算机学报, 2015,26(9): 2373-2395. ZHANG X J , GUI X L , WU Z D . Location privacy protection and research review[J]. Journal of computers, 2015,26(9): 2373-2395.
|
[10] |
KIDO H , YANAGISAWA Y , SATOH T . An anonymous communication technique using dummies for location-based services[C]// International Conference on Pervasive Services,2005 (ICPS’05),July 11-14,2005,Santorini,Greece. New Jersey:IEEE Press, 2005: 88-97.
|
[11] |
YIU M L , JENSEN C S , HUANG X ,et al. Spacetwist:manageing the trade-offs among location privacy,query performance,and query accuracy in mobile services[C]// IEEE 24h International Conference on Data Engineering,April 7-12,2008,Cancun,Mexico. New Jersey:IEEE Press, 2008: 366-375.
|
[12] |
胡德敏, 郑霞 . 基于SpaceTwist的 k-匿名增量近邻查询位置隐私保护算法[J]. 计算机应用研究, 2015(33): 144-162. HU D M , ZHENG X . K-anonymous incremental neighbor query based on SpaceTwist location privacy protection algorithm[J]. Computer Application Research, 2015(33): 144-162.
|
[13] |
周长利, 马春光, 李增鹏 . 一种保护用户隐私的路网兴趣点KNN查询方法[J]. 计算机应用研究, 2016,33(1): 262-265. ZHOU C L , MA C G , LI Z P . A network point of interest to protect the privacy of users KNN query methods[J]. Computer Application Research, 2016,33(1): 262-265.
|
[14] |
黄毅, 霍峥, 孟小峰 . CoPrivacy:一种用户协作无匿名区域的位置隐私保护方法[J]. 计算机学报, 2011,34(10): 1976-1985. HUANG Y , HUO Z , MENG X F . CoPrivacy:a no anonymous user collaboration area of location privacy protection method[J]. Journal of Computers, 2011,34(10): 1976-1985.
|
[15] |
王鹏飞, 李千目, 朱保平 . 基于增量近邻查询的位置隐私保护方法[J]. 计算机科学, 2015,42(3): 158-161. WANG P F , LI Q M , ZHU B P . Location privacy protection method based on incremental neighbor query[J]. Journal of Computer Science, 2015,42(3): 158-161.
|
[16] |
周长利, 马春光, 杨松涛 . 基于敏感位置多样性的 LBS位置隐私保护方法研究[J]. 通信学报, 2015,36(4): 125-136. ZHOU C L , MA C G , YANG S T . LBS location privacy protection method based on position sensitive diversity study[J]. Journal of Communications, 2015,36(4): 125-136.
|
[17] |
LIU X X , LIU K K , GUO L K ,et al. A game-theoretic approach for achieving k-anonymity in location based services[C]// INFOCOM’13,April 14-19,2013,Turin,Italy. New Jersey:IEEE Press, 2013: 2985-2993.
|
[18] |
MIURA K , SATO F . A hybrid method of user privacy protection for location based services[C]// CISIS’13,July 3-5,2013,Taichung,China. New Jersey:IEEE Press, 2008: 55-62.
|
[19] |
BRINKHOFF T . A framework for generating network based moving objects[J]. Geoingormatica, 2000,6(2): 153-180.
|