[1]贾金营.移动计算环境下基于位置服务的位置隐私保护技术研究[D].成都:电子科技大学,2015.br/
[2]张浩.基于位置服务的信息隐私保护技术研究[D].合肥:中国科学技术大学,2014.br/
[3]LEE H,CHANG J W.Density-based k-anonymization scheme for preserving users’ privacy in location-based services[C]//Proceedings of International Conference on Grid and Pervasive Computing.Berlin,Germany:Springer-Verlag,2013:536-
545.br/
[4]PALANISAMY B,LIU Ling.Attack-resilient mix-zones over road networks:architecture and algorithms[J].IEEE Transactions on Mobile Computing,2015,14(3):495-508.br/
[5]DING Yuan,PEDDINTI S T,ROSS K W.Stalking Beijing from Timbuktu:a generic measurement approach for exploiting location-based social discovery[C]//Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile
Devices.New York,USA:ACM Press,2014:75-80.br/
[6]HOCHREINER C,HUBER M,MERZDOVNIK G,et al.Towards practical methods to protect the privacy of location information with mobile devices[C]//Proceedings of International Conference on Security of Information and Networks.Washington
D.C.,USA:IEEE Press,2014:17-24.br/
[7]MANO K,MINAMI K,MARUYAMA H.Pseudonym exchange for privacy-preserving publishing of trajectory data set[C]//Proceedings of Consumer Electronics.Washington D.C.,USA:IEEE Press,2015:691-695.br/
[8]SHEN Hang,BAI Guangwei,YANG Mei,et al.Protecting trajectory privacy:a user-centric analysis[J].Journal of Network & Computer Applications,2017,8(2):128-139.br/
[9]POULIS G,SKIADOPOULOS S,LOUKUDES G,et al.Apriori-based algorithms for km-anonymizing trajectory data[J].IEEE Transactions on Data Privacy,2014,7(2):165-194.br/
[10]NIU Ben,LI Qinghua,ZHU Xiaoyan,et al.Achieving k-anonymity in privacy-aware location-based services[C]//Proceedings of IEEE INFOCOM’14.Washington D.C.,USA:IEEE Press,2014:754-762.br/
[11]HWANG R H,HSUEH Y L,CHUNG H W.A novel time-obfuscated algorithm for trajectory privacy[C]//Proceedings of International Symposium on Pervasive Systems,Algorithms and Networks.Washington D.C.,USA:IEEE Computer Society,2012:208-
215.br/
[12]CHE Yanzhe,CHIEW K,HONG Xiaoyan,et al.SALS:semantics-aware location sharing based on cloaking zone in mobile social networks[C]//Proceedings of ACM Sigspatial International Workshop on Mobile Geographic Information Systems.New
York,USA:ACM Press,2012:49-56.br/
[13]WU Xichen,SUN Guangzhong.A novel dummy-based mechanism to protect privacy on trajectories[C]//Proceedings of IEEE International Conference on Data Mining Workshop.Washington D.C.,USA:IEEE Press,2015:1120-1125.br/
[14]HARA T,ARASE Y,YAMAMOTO A,et al.Location anonymization using real car trace data for location based services[C]//Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication.New
York,USA:ACM Press,2014:34.br/
[15]PHAN T N,KUNG J,DANG T K.K UR-algorithm:from position to trajectory privacy protection in location-based applications[C]//Proceedings of International Conference on Database and Expert Systems Applications.Berlin,Germany:Springer-Verlag,2015:82-89.br/
[16]BINDSCHAEDLER V,SHOKRI R.Synthesizing plausible privacy-preserving location traces[C]//Proceedings of IEEE Symposium on Security and Privacy.Washington D.C.,USA:IEEE Press,2016:546-563.br/
[17]李凤华,张翠,牛犇,等.高效的轨迹隐私保护方案[J].通信学报,2015,36(12):114-123.br/
[18]KATO R,IWATA M,HARA T,et al.A dummy-based anonymization method based on user trajectory with pauses[C]//Proceedings of International Conference on Advances in Geographic Information Systems.Washington D.C.,USA:IEEE Press,2012:249-258.br/ |