[1] |
YI X , PAULET R , BERTINO E ,et al. Practical approximate k nearest neighbor queries with location and query privacy[J]. IEEE Transactions on Knowledge and Data Engineering, 2016,28(6): 1546-1559.
|
[2] |
PRIMAULT V , BOUTET A , MOKHTAR S B ,et al. Adaptive location privacy with ALP[C]// The 35th Symposium on Reliable Distributed Systems (SRDS). 2016: 269-278.
|
[3] |
雷凯跃, 李兴华, 刘海 ,等. 轨迹发布中基于时空关联性的假轨迹隐私保护方案[J]. 通信学报, 2016,37(12): 156-164.
|
|
LEI K Y , LI X H , LIU H ,et al. Dummy trajectory privacy protection scheme for trajectory publishing based on the spatiotemporal correlation[J]. Journal on Communications, 2016,37(12): 156-164.
|
[4] |
GRISSA M , YAVUZ A , HAMDAOUI B . Preserving the location privacy of secondary users in cooperative spectrum sensing[J]. IEEE Transactions on Information Forensics & Security, 2017,12(2): 418-431.
|
[5] |
张学军, 桂小林, 伍忠东 . 位置服务隐私保护研究综述[J]. 软件学报, 2015,26(9): 2373-2395.
|
|
ZHANG X J , GUI X L , WU Z D . Privacy preservation for location-based services:a survey[J]. Journal of Software, 2015,26(9): 2373-2395.
|
[6] |
万盛, 李凤华, 牛犇 ,等. 位置隐私保护技术研究进展[J]. 通信学报, 2016,37(12): 1-18.
|
|
WAN S , LI F H , NIU B ,et al. Research progress on location privacy-preserving techniques[J]. Journal on Communications, 2016,37(12): 1-18.
|
[7] |
ARDAGNA C A , CREMONINI M , VIMERCATI S D C D ,et al. An obfuscation-based approach for protecting location privacy[J]. IEEE Transactions on Dependable & Secure Computing, 2010,8(1): 13-27.
|
[8] |
霍峥, 孟小峰, 黄毅 . PrivateChechIn:一种移动社交网络中的轨迹隐私保护方法与进展[J]. 计算机学报, 2013,36(4): 716-726.
|
|
HUO Z , MENG X F , HUANG Y . PrivateChechIn:trajectory privacy-preserving for chech-in services in MSNS[J]. Chinese Journal of Computers, 2013,36(4): 716-726.
|
[9] |
CHOW C Y , MOKBEL M F , LIU X . A peer-to-peer spatial cloaking algorithm for anonymous location-based service[C]// The 14th annual ACM International Symposium on Advances in Geographic Information Systems. 2006: 171-178.
|
[10] |
SHOKRI R , THEODORAKOPOULOS G , PAPADIMITRATOS P ,et al. Hiding in the mobile crowd:location privacy through collaboration[J]. IEEE Transactions on Dependable and Secure Computing, 2014,11(3): 266-279.
|
[11] |
PENG T , LIU Q , MENG D ,et al. Collaborative trajectory privacy preserving scheme in location-based services[J]. Information Sciences, 2017,387: 165-179.
|
[12] |
ZHANG Y , TONG W , ZHONG S . On designing satisfaction- ratio-aware truthful incentive mechanisms for k-anonymity location privacy[J]. IEEE Transactions on Information Forensics and Security, 2016,11(11): 2528-2541.
|
[13] |
GEDIK B , LIU L . Protecting location privacy with personalized k-anonymous:architectrue and algorithms[J]. IEEE Transaction on Mobile Computing, 2008,7(1): 1-18.
|
[14] |
HWANG R H , HSUEH Y L , CHUNG H W . A novel time-obfuscated algorithm for trajectory privacy protection[J]. IEEE Transactions on Services Computing, 2014,7(2): 126-139.
|
[15] |
LIAO D , LI H , SUN G ,et al. Protecting user trajectory in location-based services[C]// IEEE Global Communications Conference (GLOBECOM). 2015: 1-6.
|
[16] |
周长利, 马春光, 杨松涛 . 路网环境下保护 LBS 位置隐私的连续KNN查询方法[J]. 计算机研究与发展, 2015,52(11): 2628-2644.
|
|
ZHOU C L , MA C G , YANG S T . Location privacy-preserving method for LBS continuous KNN query in road networks[J]. Journal of Computer Research and Development, 2015,52(11): 2628-2644.
|
[17] |
PENG T , LIU Q , WANG G J . Enhanced location privacy preserving scheme in location-based services[J]. IEEE Systems Journal, 2017,11(1): 219-230.
|
[18] |
GAO S , MA J F , SHI W S ,et al. TrPF:a trajectory privacy-preserving framework for participatory sensing[J]. IEEE Transactions on Information Forensics and Security, 2013,8(6): 874-887.
|
[19] |
JEUNG H Y , SHEN H T , LIU Q ,et al. A hybrid prediction model for moving objects[C]// The 24th International Conference on Data Engineering. 2008: 70-79.
|
[20] |
NIU B , ZHANG Z Y , LI X Q ,et al. Privacy-area aware dummy generation algorithms for location-based services[C]// The International Conference on Communications. 2014: 957-962.
|
[21] |
BRINKHOFF T . Generating traffic data[J]. Bulletin of the Technical Committee Data Engineering, 2003,26(2): 19-25.
|