[1] |
MADDEN M , LENHART A , CORTESI S ,et al. Pew internet and american life project[J]. Washington,DC:Pew Research Center, 2010
|
[2] |
DOBSON J E , FISHER P . Geoslavery[J]. Technology and Society Magazine, 2003,22(1): 47-52.
|
[3] |
ANDRéS M E , BORDENABE N E , CHATZIKOKOLAKIS K . Geo-indistinguishability:differential privacy for location-based systems[C]// Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security. New York:ACM Press, 2013: 901-914.
|
[4] |
DWORK C , MCSHERRY F , NISSIM K . Calibrating noise to sensitivity in private data analysis[C]// Theory of Cryptography Conference. Berlin:Springer, 2006: 265-284.
|
[5] |
GRUTESER M , GRUNWALD D . Anonymous usage of location-based services through spatial and temporal cloaking[C]// Proceedings of the 1st International Conference on Mobile Systems,Applications And Services. New York:ACM Press, 2003: 31-42.
|
[6] |
NIU B , LI Q , ZHU X ,et al. Achieving k-anonymity in privacy-aware location-based services[C]// The 33rd Annual IEEE International Conference on Computer Communications. Piscataway:IEEE Press, 2014: 754-762.
|
[7] |
HWANG R H , HSUEH Y L , CHUNG H W . A novel time-obfuscated algorithm for trajectory privacy protection[J]. IEEE Transactions on Services Computing, 2013,7(2): 126-139.
|
[8] |
WANG J , LI Y , YANG D ,et al. Achieving effective k-anonymity for query privacy in location-based services[J]. IEEE Access, 2017(5): 24580-24592.
|
[9] |
KIDO H , YANAGISAWA Y , SATOH T . Protection of location privacy using dummies for location-based services[C]// 21st International Conference on Data Engineering Workshops. Piscataway:IEEE Press, 2005: 1248-1248.
|
[10] |
ANDRéS M E , BORDENABE N E , CHATZIKOKOLAKIS K . Geo-indistinguishability:differential privacy for location-based systems[C]// Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security. New York:ACM Press, 2013: 901-914.
|
[11] |
XIAO Y , XIONG L . Protecting locations with differential privacy under temporal correlations[C]// ACM Sigsac Conference on Computer and Communications Security. New York:ACM Press, 2015: 1298-1309.
|
[12] |
HUA J , TONG W , XU F . A geo-indistinguishable location perturbation mechanism for location-based services supporting frequent queries[J]. IEEE Transactions on Information Forensics and Security, 2017,13(5): 1155-1168.
|
[13] |
吴云乘, 陈红, 赵素云 . 一种基于时空相关性的差分隐私轨迹保护机制[J]. 计算机学报, 2018,41(2): 309-322.
|
|
WU Y C , CHEN H , ZHAO S Y . Differentially privacy trajectory protection based on spatial and temporal correlation[J]. Chinese Journal of Computers, 2018,41(2): 309-322.
|
[14] |
CHATZIKOKOLAKIS K , PALAMIDESSI C , STRONATI M . A predictive differentially-private mechanism for mobility traces[M]// Privacy Enhancing Technologies. Berlin:Springer International Publishing, 2014.
|
[15] |
叶阿勇, 李亚成, 马建峰 ,等. 基于服务相似性的 k-匿名位置隐私保护方法[J]. 通信学报, 2014,35(11): 162-169.
|
|
YE A Y , LI Y C , MA J F ,et al. Location privacy-preserving method of k-anonymous based on service similarity[J]. Journal on Communications, 2014,35(11): 162-169.
|
[16] |
ZHENG Y , XIE X , MA W Y . GeoLife:a collaborative social networking service among user,location and trajectory[J]. IEEE Data Engineering Bulletin, 2010,33(2): 32-39.
|
[17] |
CHO E , MYERS S A , LESKOVEC J . Friendship and mobility:user movement in location-based social networks[C]// Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining. New York:ACM Press, 2011: 1082-1090.
|