Journal on Communications ›› 2015, Vol. 36 ›› Issue (Z1): 94-102.doi: 10.11959/j.issn.1000-436x.2015286
• Academic paper • Previous Articles Next Articles
Shuang WANG,Fu-cai ZHOU,Li-na WU
Online:
2015-11-25
Published:
2015-12-29
Supported by:
Shuang WANG,Fu-cai ZHOU,Li-na WU. Uncertain trajectory privacy-preserving method of moving object[J]. Journal on Communications, 2015, 36(Z1): 94-102.
[1] | 霍峥, 孟小峰 . 轨迹隐私保护技术研究[J]. 计算机学报, 2011,34(10): 1820-1830. HUO Z , MENG X F . A survey of trajectory privacy-preserving techniques[J]. Chinese Journal of Computers, 2011,34(10): 1820-1830. |
[2] | 霍峥, 孟小峰, 黄毅 . PrivateCheckIn:一种移动社交网络中的轨迹隐私保护方法[J]. 计算机学报, 2013,36(4): 716-726. HUO Z , MENG X F , HUANG Y . PrivateCheckIn:trajectory privacy-preserving for check-in services in MSNS[J]. Chinese Journal of Computers, 2013,36(4): 716-726. |
[3] | EMRICH T , KRIEGEL H-P , MAMOULIS N , et al. Querying uncertain spatio-temporal data[A]. Proc of the 2012 IEEE 28th International Conference on Data Engineering[C]. 2012. 354-365. |
[4] | CHUNYANG M , HUA L , LI D S , et al. KSQ:top-k similarity query on uncertain trajectories[J]. IEEE Transactions on Knowledge and Data Engineering, 2013,25(9): 2049-2062. |
[5] | SHENG G , JIAN F M , WEI S S , et al. a trajectory privacy-preserving framework for participatory sensing[J]. IEEE Transactions on Information Forensics and Security, 2013,8(6): 874-887. |
[6] | GHASEMZADEH M , FUNG BCM , CHEN R , et al. Anonymizing trajectory data for passenger flow analysis[J]. Transportation Research Part C:Emerging Technologies, 2014,39(2): 63-79. |
[7] | CHEN R , FUNG BCM , MOHAMMED N , et al. Privacy-preserving trajectory data publishing by local suppression[J]. Information Sciences, 2013,231(9): 83-97. |
[8] | MARCO GRUTESER , Dirk GRUNWALD . Anonymous usage of location-based services through spatial and temporal cloaking[A]. Proc of the First International Conference on Mobile Systems,Applications,and Services.San Francisco[C]. USA, 2003. 277-286. |
[9] | WEENEY S L . K-anonymity:a model for protecting privacy[J]. International Journal of Uncertainty on Fuzziness and Knowledge-based System 200210(5): 557-570. |
[10] | ABUL O , BONCHI F , NANNI M . Anonymization of moving objec d tsatabases by clustering and perturbation[J]. Information Systems, 2010,35(8): 884-910. |
[11] | FRENTZOS E , GRATSIAS K , THEODORIDIS Y . On the effect of location uncertainty in spatial querying[J]. IEEE Transactions on Knowledge and Data Engineering, 2009,21(3): 366-383. |
[12] | KUIJPERS B , OTHMAN W . Trajectory databases:data models,uncertainty and complete query languages[J]. Journal of Computer and System Sciences, 2010,76(7): 538-560. |
[13] | LIU H , SCHNEIDER M . Querying moving objects with uncertainty in spatio-temporal databases[A]. Proc of the 16th Database Systems for Advanced Applications[C]. 2011. 357-371 |
[14] | JEUNG H , LU H , SATHE S , et al. IEEE Transactions on Knowledge and Data Engineering (TKDE) Journal of Computer and System Sciences, 2014 26(7): 1692-1705. |
[15] | FAROOKH K H , ELIZABETH C , THARAM S D . Markov model for modelling and managing dynamic trust[A]. Proc of the 3rd IEEE International Conference on Industrial Informatics[C]. India, 2005. 725-733. |
[16] | CHEN C , YAN L . Remarks on the intersection local time of fractional Brownian motions[J]. Statistics & Probability Letters, 2011,81(5): 1003-1012. |
[1] | Yingjie XIA, Siyu ZHU, Xuejiao LIU. Research on efficient cross trust-domain group authentication with conditional privacy of vehicle platoon under blockchian architecture [J]. Journal on Communications, 2023, 44(4): 111-123. |
[2] | Shengxing YU, Zhong CHEN. Efficient secure federated learning aggregation framework based on homomorphic encryption [J]. Journal on Communications, 2023, 44(1): 14-28. |
[3] | Haining YU, Hongli ZHANG, Xiangzhan YU, Jiaxing QU, Mengmeng GE. Privacy-preserving trajectory similarity computation method [J]. Journal on Communications, 2022, 43(11): 1-13. |
[4] | Tao PENG, Wentao ZHONG, Guojun WANG, Entao LUO, Jinbo XIONG, Yining LIU, Wang Hao. Privacy-preserving precise profile matching in mobile social network [J]. Journal on Communications, 2022, 43(11): 90-103. |
[5] | Rui SHI, Huamin FENG, Huiqin XIE, Guozhen SHI, Biao LIU, Yang YANG. Privacy-preserving attribute ticket scheme based on mobile terminal with smart card [J]. Journal on Communications, 2022, 43(10): 26-41. |
[6] | Jinbo XIONG, Yongjie ZHOU, Renwan BI, Liang WAN, Youliang TIAN. Towards edge-collaborative, lightweight and privacy-preserving classification framework [J]. Journal on Communications, 2022, 43(1): 127-137. |
[7] | Jie CUI, Xuefeng CHEN, Jing ZHANG, Lu WEI, Hong ZHONG. Bus cache-based location privacy protection scheme in the Internet of vehicles [J]. Journal on Communications, 2021, 42(7): 150-161. |
[8] | Jiaqi WANG,Ning LU,Qingfeng CHENG,Zhaoxia WU,Wenbo SHI. Privacy-preserving multi-attribute reverse spectrum auction scheme [J]. Journal on Communications, 2020, 41(9): 77-91. |
[9] | Yousheng ZHOU,Chang TAN,Fei TANG. Multi-dimensional secure query scheme for fog-enhanced IIoT [J]. Journal on Communications, 2020, 41(8): 175-186. |
[10] | Jiayin LI,Wenzhong GUO,Xiaoyan LI,Ximeng LIU. Privacy-preserving real-time road conditions monitoring scheme based on intelligent traffic [J]. Journal on Communications, 2020, 41(7): 73-83. |
[11] | Ming LI,Xiaopeng YANG,Hui ZHU,Fengwei WANG,Qi LI. Efficient and privacy-preserving online face authentication scheme [J]. Journal on Communications, 2020, 41(5): 205-214. |
[12] | Xinyu WANG,Ben NIU,Fenghua LI,Kun HE. Risk assessing and privacy-preserving scheme for privacy leakage in APP [J]. Journal on Communications, 2019, 40(5): 13-23. |
[13] | Weihao LI,Jin CAO,Hui LI. Privacy self-correlation privacy-preserving scheme in LBS [J]. Journal on Communications, 2019, 40(5): 57-66. |
[14] | Xiangyu WANG,Jianfeng MA,Yinbin MIAO. Efficient privacy-preserving image retrieval scheme over outsourced data with multi-user [J]. Journal on Communications, 2019, 40(2): 31-39. |
[15] | Weihao LI,Sheng DING,Jiajie MENG,Hui LI. Spatio-temporal aware privacy-preserving scheme in LBS [J]. Journal on Communications, 2018, 39(5): 134-142. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|