[1] |
马春光, 张磊, 杨松涛 . 位置轨迹隐私保护综述[J]. 信息网络安全, 2015(10): 24-31.
|
|
MA C G , ZHANG L , YANG S T . Review on location trajectory privacy protection[J]. Netinfo Security, 2015(10): 24-31.
|
[2] |
WANG Y , XIA Y , HOU J ,et al. A fast privacy-preserving framework for continuous location-based queries in road networks[J]. Journal of Network and Computer Applications, 2015,53: 57-73.
|
[3] |
LIN C , WU G W , YU C W . Protecting location privacy and query privacy:a combined clustering approach[J]. Concurrency and Computation-Practice & Experience, 2015,27(12): 3021-3043.
|
[4] |
周长利, 马春光, 杨松涛 . 基于敏感位置多样性的LBS位置隐私保护方法研究[J]. 通信学报, 2015,36(4): 129-140.
|
|
ZHOU C L , MA C G , YANG S T . Research of LBS privacy preserving based on sensitive location diversity[J]. Journal on Communications, 2015,36(4): 129-140.
|
[5] |
NIU B , GAO S , LI F H ,et al. Protection of location privacy in continuous LBSs against adversaries with background information[C]// 2016 International Conference on Computing,Networking and Communications (ICNC). 2016.
|
[6] |
GAO S , MA J F , SHI W S ,et al. LTPPM:a location and trajectory privacy protection mechanism in participatory sensing[J]. Wireless Communications & Mobile Computing, 2015,15(1): 155-169.
|
[7] |
HWANG R H , HSUEH Y L , CHUNG H W . A novel time-obfuscated algorithm for trajectory privacy protection[J]. IEEE Transactions on Services Computing, 2014,7(2): 126-139.
|
[8] |
NI W , GU M , CHEN X . Location privacy-preserving k nearest neighbor query under user's preference[J]. Knowledge-Based Systems, 2016,103: 19-27.
|
[9] |
张磊, 马春光, 杨松涛 ,等. 基于轮廓泛化的位置隐私保护模型及方法[J]. 系统工程与电子技术, 2016,38(12): 2894-900.
|
|
ZHANG L , MA C G , YANG S T ,et al. Location privacy protection model and algorithm based on profiles generalization[J]. Systems Engineering and Electronics, 2016,38(12): 2894-2900.
|
[10] |
GRUTESER M , GRUNWALD D . Anonymous usage of location-based services through spatial and temporal cloaking[C]// 1st International Conference on Mobile Systems,Applications and Services. San Francisco,California,F, 2003:1189037.
|
[11] |
XIAO Z , XU J , MENG X . P-sensitivity:a semantic privacy-protection model for location-based services[C]// International Conference on Mobile Data Management Workshops. 2008.
|
[12] |
FUYU L , HUA K A , YING C . Query l-diversity in location-based services[C]// Mobile Data Management:Systems,Services and Middleware. 2009.
|
[13] |
CHOW C Y , MOKBEL M F , LIU X . A peer-to-peer spatial cloaking algorithm for anonymous location-based service[C]// 14th Annual ACM International Symposium on Advances in Geographic Information Systems. 2006: 171-178.
|
[14] |
MA C , ZHANG L , YANG S ,et al. Achieve personalized anonymity through query blocks exchanging[J]. China Communications, 2016,13(11): 106-18.
|
[15] |
GHINITA G , KALNIS P , KHOSHGOZARAN A ,et al. Private queries in location based services:anonymizers are not necessary[C]// 2008 ACM SIGMOD International Conference on Management of data. 2008: 121-32.
|
[16] |
KATO R , IWATA M , HARA T ,et al. A dummy-based anonymization method based on user trajectory with pauses[C]// 20th International Conference on Advances in Geographic Information Systems. 2012.
|
[17] |
GHASEMZADEH M , FUNG B C M , CHEN R ,et al. Anonymizing trajectory data for passenger flow analysis[J]. Transportation Research Part C-Emerging Technologies, 2014,39(2014): 63-79.
|
[18] |
PALANISAMY B , LIU L , LEE K ,et al. Anonymizing continuous queries with delay-tolerant mix-zones over road networks[J]. Distributed and Parallel Databases, 2014,32(1): 91-118.
|
[19] |
张磊, 马春光, 杨松涛 . 基于位置关联相似性的匿名算法[J]. 中国科技论文, 2016,11(2): 197-201,13.
|
|
ZHANG L , MA C G , YANG S T . Location association similar based anonymus algorithm[J]. China Sciencepaper, 2016,11(2): 197-201,13.
|
[20] |
马春光, 周长利, 杨松涛 ,等. 基于 Voronoi 图预划分的 LBS 位置隐私保护方法[J]. 通信学报, 2015,36(5): 5-16.
|
|
MA C G , ZHOU C L , YANG S T ,et al. Location privacy-preserving method in LBS based on Voronoi division[J]. Journal on Communications, 2015,36(5): 5-16.
|
[21] |
RODRIGUEZ-CARRION A , REBOLLO-MONEDERO D , FORNE J ,et al. Entropy-based privacy against profiling of user mobility[J]. Entropy, 2015,17(6): 3913-3946.
|
[22] |
BETHENCOURT J , SAHAI A , WATERS B . Ciphertext-policy attribute-based encryption[C]// IEEE Symposium on Security and Privacy. 2007.
|