[1] |
KRUMM J . A survey of computational location privacy[J]. Personal and Ubiquitous Computing, 2009,13(6):391-399.
|
[2] |
霍峥, 孟小峰 . 轨迹隐私保护技术研究[J]. 计算机学报, 2011,34(10):1820-1830. ZHENG H , MENG X F . A survey of trajectory privacy-preserving techniques[J]. Chinese Journal of Computers, 2011,34(10):1820-1830.
|
[3] |
CHOW C Y , MOKBEL M F . Trajectory privacy in location-based services and data publication[J]. ACM SIGKDD Explorations News-letter, 2011,13(1):19-29.
|
[4] |
ZHANG Z , SUN Y , XIE X , et al. An efficient method on trajectory privacy preservation[C]// International Conference on Big Data Computing and Communications. Springer International Publishing. 2015:231-240.
|
[5] |
YOU T H , PENG W C , LEE W C . Protecting moving trajectories with dummies[C]// 2007 International Conference on Mobile Data Man-agement. IEEE, 2007:278-282.
|
[6] |
LEI P R , PENG W C , SU I J , et al. Dummy-based schemes for pro-tecting movement trajectories[J]. Journal of Information Science and Engineering, 2012,28(2):335-350.
|
[7] |
WU X , SUN G . A novel dummy-based mechanism to protect privacy on trajectories[C]// 2014 IEEE International Conference on Data Min-ing Workshop (ICDMW). IEEE, 2014:1120-1125.
|
[8] |
李凤华, 张翠, 牛犇 , 等. 高效的轨迹隐私保护方案[J]. 通信学报, 2015,36(12):114-123. LI F H , ZHANG C , NUI B , et al. Efficient scheme for user's trajectory privacy[J]. Journal on Communications, 2015,36(12):114-123.
|
[9] |
XU T , CAI Y . Exploring historical location data for anonymity preser-vation in location-based services[C]// The 27th Conference on Com-puter Communications. IEEE, 2008.
|
[10] |
王超, 杨静, 张健沛 . 基于轨迹位置形状相似性的隐私保护算法[J]. 通信学报, 2015,36(2):144-157. WANG C , YANG J , ZHANG J P . Privacy preserving algorithm based on trajectory location and shape similarity[J]. Journal on Communica-tions, 2015,36(2):144-157.
|
[11] |
王爽, 周福才, 吴丽娜 . 移动对象不确定轨迹隐私保护算法研究[J]. 通信学报, 2015,36(Z1):94-102. WANG S , ZHOU F C , WU L N . Uncertain trajectory privacy pre-serving method of moving object[J]. Journal on Communications, 2015,36(Z1):94-102.
|
[12] |
TERROVITIS M , MAMOULIS N . Privacy preservation in the publi-cation of trajectories[C]// 9th International Conference on Mobile Data Management. IEEE, 2008:65-72.
|
[13] |
赵婧, 张渊, 李兴华 , 等. 基于轨迹频率抑制的轨迹隐私保护方法[J]. 计算机学报, 2014,37(10):2096-2106. ZHAO J , ZHANG Y , LI X H , et al. A trajectory privacy protection approach via trajectory frequency suppression[J]. Chinese Journal of Computers, 2014,37(10):2096-2106.
|
[14] |
KIDO H , YANAGISAWA Y , SATOH T . An anonymous communication technique using dummies for location-based services[C]// International Conference on Pervasive Services. IEEE, 2005:88-97.
|
[15] |
KIDO H , YANAGISAWA Y , SATOH T . Protection of location privacy using dummies for location-based services[C]// 21st International Confer-ence on Data Engineering Workshops. IEEE, 2005:1248-1248.
|
[16] |
LU H , JENSEN C S , YIU M L . Pad: privacy-area aware, dummy-based location privacy in mobile services[C]// The Seventh ACM In-ternational Workshop on Data Engineering for Wireless and Mobile Access. ACM, 2008:16-23.
|
[17] |
NIU B , LI Q , ZHU X , et al. Achieving k-anonymity in privacy-aware location-based services[C]// IEEE INFOCOM 2014-IEEE Conference on Computer Communications. IEEE, 2014:754-762.
|
[18] |
HUO Z , HUANG Y , MENG X . History trajectory privacy-preserving through graph partition[C]// The 1st International Workshop on Mobile Location-Based Service. ACM, 2011:71-78.
|