Journal on Communications ›› 2017, Vol. 38 ›› Issue (6): 85-96.doi: 10.11959/j.issn.1000-436x.2017119
• Papers • Previous Articles Next Articles
Hao WANG1,2,Zheng-quan XU1,2,Li-zhi XIONG3,Tao WANG1,2
Revised:
2017-04-12
Online:
2017-06-25
Published:
2017-06-30
Supported by:
CLC Number:
Hao WANG,Zheng-quan XU,Li-zhi XIONG,Tao WANG. CLM:differential privacy protection method for trajectory publishing[J]. Journal on Communications, 2017, 38(6): 85-96.
[1] | ZHENG Y . Trajectory data mining:an overview[J]. ACM Transactions on Intelligent Systems &Technology, 2015,6(3): 1-41. |
[2] | 张扶桑, 金蓓弘, 汪兆洋 ,等. 基于轨迹挖掘的公交车自组织网络路由机制[J]. 计算机学报, 2015,38(3): 648-662. |
ZHANG F S , JIN B H , WANG Z Y ,et al. Routing mechanism of ad hoc network for bus based on trajectory mining[J]. Chinese Journal of Computers, 2015,38(3): 648-662. | |
[3] | 宋雪涛, 蒲英霞, 刘大伟 ,等. 利用行人轨迹挖掘城市区域功能属性[J]. 测绘学报, 2015,44(s1): 82-88. |
SONG X T , PU Y X , LIU D W ,et al. Mining urban regional functional attributes by pedestrian trajectory[J]. Acta Geodaetica et Cartographica Sinica, 2015,44(s1): 82-88. | |
[4] | HUA J , GAO Y , ZHONG S . Differentially private publication of general time-serial trajectory data[C]// Computer Communications. 2015: 549-557. |
[5] | CAO Y . Differentially private real-time data release over infinite trajectory streams[J]. IEICE Transactions on Information &Systems, 2016,E99-D(No.1): 68-73. |
[6] | CHEN R , FUNG B C M , MOHAMMED N ,et al. Privacy-preserving trajectory data publishing by local suppression[J]. Information Sciences, 2013,231(1): 83-97. |
[7] | CHOW C Y , MOKBEL M F . Privacy of spatial trajectories[M]// Computing with Spatial Trajectories, 2011: 109-141. |
[8] | GEDIK B , LIU L . Protecting location privacy with personalized k-anonymity:architecture and algorithms[J]. IEEE Transactions on Mobile Computing, 2008,7(1): 1-18. |
[9] | 王璐, 孟小峰 . 位置大数据隐私保护研究综述[J]. 软件学报, 2014,25(4): 693-712. |
WANG L , MENG X F . A survey of the research on privacy preserving for location data[J]. Journal of Software, 2014,25(4): 693-712. | |
[10] | MAGLOGIANNIS I , KAZATZOPOULOS L , DELAKOURIDIS K ,et al. Enabling location privacy and medical data encryption in patient telemonitoring systems[J]. IEEE Transactions on Information Technology in Biomedicine a Publication of the IEEE Engineering in Medicine &Biology Society, 2009,13(6): 946-954. |
[11] | DWORK C . Differential privacy[M]// Automata,Languages and Programming. Springer Berlin Heidelberg, 2006: 1-12. |
[12] | SHEN E , YU T . Mining frequent graph patterns with differential privacy[C]// The 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 2013: 545-553. |
[13] | YANG B , SATO I , NAKAGWA H . Bayesian differential privacy on correlated data[C]// SIGMOD/PODS. 2015: 747-762. |
[14] | XIAO X . Differentially private data release:improving utility with wavelets and Bayesian networks[M]// Springer International Publishing, 2014: 25-35. |
[15] | SHORKRI R . Privacy games:optimal protection mechanism design for Bayesian and differential privacy[J]. IEEE Transactions on Dependable &Secure Computing, 2014,11(3): 266-279. |
[16] | ZHU T , XIONG P , LI G ,et al. Correlated differential privacy:hiding information in non-IID data set[J]. IEEE Transactions on Information Forensics &Security, 2015,10(2): 229-242. |
[17] | RASTOGI V , NATH S . Differentially private aggregation of distributed time series with transformation and encryption[C]// The ACM SIGMOD International Conference on Management of Data. 2010: 735-746. |
[18] | XIAO X , . Differentially private data release:improving utility with wavelets and Bayesian networks[C]// Springer International Publishing. 2014: 25-35. |
[19] | XIAO X ,et al. Differential privacy via wavelet transforms[J]. IEEE Transactions on Knowledge &Data Engineering, 2009,23(8): 23-30. |
[20] | JIANG W , XIE C , ZHANG Z . Wishart mechanism for differentially private principal components analysis[J]. Computer Science, 2015,9285(2): 458-473. |
[21] | GEHRKE J , HAY M , LUI E ,et al. Crowd-blending privacy[C]// Cryptology Conference on Advances in Cryptology.Springer-Verlag New York. 2012: 479-496. |
[22] | GEHRKE J , LUI E , PASS R . Towards privacy for social networks:a zero-knowledge based definition of privacy[C]// Theory of Cryptography - 8th Theory of Cryptography Conference. 2011: 432-449. |
[23] | KIFER D , MACHANAVAJJHALA A . Pufferfish:a framework for mathematical privacy definitions[J]. ACM Transactions on Database Systems, 2014,39(1): 1-36. |
[24] | HE X , MACHANAVAJJHALA A , DING B . Blowfish privacy:tuning privacy-utility trade-offs using policies[C]// The 2014 ACM SIGMOD International Conference on Management of Data. 2014: 1447-1458. |
[25] | CAO L , OU Y , YU P S . Coupled behavior analysis with applications[J]. IEEE Transactions on Knowledge &Data Engineering, 2012,24(8): 1378-1392. |
[26] | ZHOU Z H , SUN Y Y , LI Y F . Multi-instance learning by treating instances as non-IID samples[C]// The 26th Annual International Conference on Machine Learning. 2009: 1249-1256. |
[27] | RASTOGI V , HAY M , MILLAU G ,et al. Relationship privacy:output perturbation for queries with joins[C]// The 28th ACM Sigmod-Sigact-sigart Symposium on Principles of Database Systems. 2009: 107-116. |
[28] | DWORK C , ROTH A . The algorithmic foundations of differential privacy[J]. Foundations and Trends in Theoretical Computer Science, 2014,9(3-4): 211-407. |
[29] | BOJAN , BASRAK . The sample autocorrelation function of non-linear time series[M]// University of Groningen, 2000. |
[30] | WANG H , XU Z Q . CTS-DP:publishing correlated time-series data via differential privacy[J]. Knowledge-Based Systems, 2017,122: 167-179. |
[31] | ZHENG Y , XIE X , MA W Y . GeoLife:a collaborative social networking service among user,location and trajectory[J]. Bulletin of the Technical Committee on Data Engineering, 2010,33(2): 32-39. |
[32] | YUAN J , ZHENG Y , ZHANG C ,et al. T-drive:driving directions based on taxi trajectories[C]// ACM SIGSPATIAL International Symposium on Advances in Geographic Information Systems. 2010: 99-108. |
[33] | WANG H , TERROVITIS M , MAMOULIS N . Location recommendation in location-based social networks using user check-in data[C]// ACM Sigspatial International Conference on Advances in Geographic Information Systems. 2013: 374-383. |
[1] | Shengxing YU, Zekai CHEN, Zhong CHEN, Ximeng LIU. DAGUARD: distributed backdoor attack defense scheme under federated learning [J]. Journal on Communications, 2023, 44(5): 110-122. |
[2] | Tao FENG, Liqiu CHEN, Junli FANG, Jianming SHI. Blockchain data sharing scheme based on localized difference privacy and attribute-based searchable encryption [J]. Journal on Communications, 2023, 44(5): 224-233. |
[3] | Shufen ZHANG, Yanling DONG, Jingcheng XU, Haoshi WANG. AdaBoost algorithm based on target perturbation [J]. Journal on Communications, 2023, 44(2): 198-209. |
[4] | Lingtao TANG, Di WANG, Shengyun LIU. Data augmentation scheme for federated learning with non-IID data [J]. Journal on Communications, 2023, 44(1): 164-176. |
[5] | Chengsheng YUAN, Qiang GUO, Zhangjie FU. Copyright protection algorithm based on differential privacy deep fake fingerprint detection model [J]. Journal on Communications, 2022, 43(9): 181-193. |
[6] | Hanyi WANG, Xiaoguang LI, Wenqing BI, Yahong CHEN, Fenghua LI, Ben NIU. Multi-level local differential privacy algorithm recommendation framework [J]. Journal on Communications, 2022, 43(8): 52-64. |
[7] | Yong ZHANG, Dandan LI, Lu HAN, Xiaohong HUANG. Privacy-protected crowd-sensed data trading algorithm [J]. Journal on Communications, 2022, 43(5): 1-13. |
[8] | Haiyan KANG, Yuanrui JI. Research on federated learning approach based on local differential privacy [J]. Journal on Communications, 2022, 43(10): 94-105. |
[9] | Yan YAN, Yiming CONG, Mahmood Adnan, Quanzheng SHENG. Statistics release and privacy protection method of location big data based on deep learning [J]. Journal on Communications, 2022, 43(1): 203-216. |
[10] | Si CHEN, Anmin FU, Mang SU, Huaijiang SUN. Trajectory privacy protection scheme based on differential privacy [J]. Journal on Communications, 2021, 42(9): 54-64. |
[11] | Lichuan MA, Jiayi PENG, Qingqi PEI, Haojin ZHU. Efficient privacy-preserving decision tree classification protocol [J]. Journal on Communications, 2021, 42(8): 80-89. |
[12] | Hongtao LI, Xiaoyu REN, Jie WANG, Jianfeng MA. Continuous location privacy protection mechanism based on differential privacy [J]. Journal on Communications, 2021, 42(8): 164-175. |
[13] | Jianping CAI, Ximeng LIU, Jinbo XIONG, Zuobin YING, Yingjie WU. Approximation method of multiple consistency constraint under differential privacy [J]. Journal on Communications, 2021, 42(6): 107-117. |
[14] | Suxia ZHU, Shulun LIU, Guanglu SUN. Shape similarity differential privacy trajectory protection mechanism based on relative entropy and K-means [J]. Journal on Communications, 2021, 42(2): 113-123. |
[15] | Yang LIU, Jun LI, Wenyun CHEN, Mugen PENG. Research on endogenous security data sharing mechanism of F-RAN for 6G [J]. Journal on Communications, 2021, 42(1): 67-78. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|