[1] |
李家印, 郭文忠, 李小燕 ,等. 基于智能交通的隐私保护道路状态实时监测方案[J]. 通信学报, 2020,41(7): 73-83.
|
|
LI J Y , GUO W Z , LI X Y ,et al. Privacy-preserving real-time road conditions monitoring scheme based on intelligent traffic[J]. Journal on Communications, 2020,41(7): 73-83.
|
[2] |
陈思, 付安民, 柯海峰 ,等. MCDP:基于神经网络的多集群分布式差分隐私数据发布方法[J]. 电子学报, 2020,48(12): 2297-2303.
|
|
CHEN S , FU A M , KE H F ,et al. MCDP:multi-cluster differential privacy data publishing method based on neural network[J]. Acta Electronica Sinica, 2020,48(12): 2297-2303.
|
[3] |
ZHOU C Y , FU A M , YU S ,et al. Privacy-preserving federated learning in fog computing[J]. IEEE Internet of Things Journal, 2020,7(11): 10782-10793.
|
[4] |
叶阿勇, 孟玲玉, 赵子文 ,等. 基于预测和滑动窗口的轨迹差分隐私保护机制[J]. 通信学报, 2020,41(4): 123-133.
|
|
YE A Y , MENG L Y , ZHAO Z W ,et al. Trajectory differential privacy protection mechanism based on prediction and sliding window[J]. Journal on Communications, 2020,41(4): 123-133.
|
[5] |
CHEN S , FU A M , SHEN J ,et al. RNN-DP:a new differential privacy scheme base on recurrent neural network for dynamic trajectory privacy protection[J]. Journal of Network and Computer Applications, 2020,168: 102736.
|
[6] |
WU S , WANG X L , WANG S ,et al. K-anonymity for crowdsourcing database[J]. IEEE Transactions on Knowledge and Data Engineering, 2014,26(9): 2207-2221.
|
[7] |
HE X F , JIN R C , DAI H Y . Leveraging spatial diversity for privacy-aware location-based services in mobile networks[J]. IEEE Transactions on Information Forensics and Security, 2018,13(6): 1524-1534.
|
[8] |
王洁, 王春茹, 马建峰 ,等. 基于位置语义和查询概率的假位置选择算法[J]. 通信学报, 2020,41(3): 53-61.
|
|
WANG J , WANG C R , MA J F ,et al. Dummy location selection algorithm based on location semantics and query probability[J]. Journal on Communications, 2020,41(3): 53-61.
|
[9] |
DWORK C , LEI J . Differential privacy and robust statistics[C]// Proceedings of the 41st Annual ACM Symposium on Theory of Computing. New York:ACM Press, 2009: 371-380.
|
[10] |
DWORK C , MCSHERRY F , NISSIM K ,et al. Calibrating noise to sensitivity in private data analysis[C]// Conference on Theory of Cryptography. Berlin:Springer, 2006: 265-284.
|
[11] |
KE H F , FU A M , YU S ,et al. AQ-DP:a new differential privacy scheme based on quasi-identifier classifying in big data[C]// 2018 IEEE Global Communications Conference. Piscataway:IEEE Press, 2018: 1-6.
|
[12] |
WANG Y , YANG L , CHEN X Y ,et al. Enhancing social network privacy with accumulated non-zero prior knowledge[J]. Information Sciences, 2018,445/446: 6-21.
|
[13] |
丁红发, 彭长根, 田有亮 ,等. 基于演化博弈的隐私风险自适应访问控制模型[J]. 通信学报, 2019,40(12): 9-20.
|
|
DING H F , PENG C G , TIAN Y L ,et al. Privacy risk adaptive access control model via evolutionary game[J]. Journal on Communications, 2019,40(12): 9-20.
|
[14] |
CHEN R , FUNG B C M , DESAI B C . Differentially private trajectory data publication[J]. arXiv Preprint,arXiv:1112.2020, 2011.
|
[15] |
HE X , CORMODE G , MACHANAVAJJHALA A ,et al. DPT:differentially private trajectory synthesis using hierarchical reference systems[C]// Proceedings of the VLDB Endowment. New York:ACM Press, 2015: 1154-1165.
|
[16] |
CAO Y , YOSHIKAWA M . Differentially private real-time data release over infinite trajectory streams[C]// 2015 16th IEEE International Conference on Mobile Data Management. Piscataway:IEEE Press, 2015: 68-73.
|
[17] |
GURSOY M E , LIU L , TRUEX S ,et al. Utility-aware synthesis of differentially private and attack-resilient location traces[C]// Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. New York:ACM Press, 2018: 196-211.
|
[18] |
DRAKONAKIS K , ILIA P , IOANNIDIS S ,et al. Please forget where I was last summer:the privacy risks of public location (meta)data[C]// Proceedings 2019 Network and Distributed System Security Symposium. VA:Internet Society, 2019: 1-17.
|
[19] |
YANG M M , ZHU T Q , LIANG K T ,et al. A blockchain-based location privacy-preserving crowdsensing system[J]. Future Generation Computer Systems, 2019,94: 408-418.
|
[20] |
HUA J Y , GAO Y , ZHONG S . Differentially private publication of general time-serial trajectory data[C]// 2015 IEEE Conference on Computer Communications. Piscataway:IEEE Press, 2015: 549-557.
|
[21] |
LI M , ZHU L H , ZHANG Z J ,et al. Achieving differential privacy of trajectory data publishing in participatory sensing[J]. Information Sciences, 2017,400/401: 1-13.
|
[22] |
SHAN H M , ZHANG J P , KRUGER U . Learning linear representation of space partitioning trees based on unsupervised kernel dimension reduction[J]. IEEE Transactions on Cybernetics, 2016,46(12): 3427-3438.
|
[23] |
YUAN J , ZHENG Y , XIE X ,et al. Driving with knowledge from the physical world[C]// Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. New York:ACM Press, 2011: 316-324.
|
[24] |
YUAN J , ZHENG Y , ZHANG C Y ,et al. T-drive:driving directions based on taxi trajectories[C]// Proceedings of the 18th SIGSPATIAL International Conference on Advances in Geographic Information Systems. New York:ACM Press, 2010: 99-108.
|
[25] |
彭长根, 丁红发, 朱义杰 ,等. 隐私保护的信息熵模型及其度量方法[J]. 软件学报, 2016,27(8): 1891-1903.
|
|
PENG C G , DING H F , ZHU Y J ,et al. Information entropy models and privacy metrics methods for privacy protection[J]. Journal of Software, 2016,27(8): 1891-1903.
|