(上接第185页) 参考文献 [1]Abul O,Bonchi F,Nanni M.Never Walk Alone:Uncer-tainty for Anonymity in Moving Objects Databases[C]//Proceedings of the 24th International Conference on Data Engineering.Washington D.C.,USA:IEEE Computer Society,2008:720-733. [2]Abul O,Bonchi F,Nanni M.Anonymization of Moving Objects Databases by Clustering and Perturbation[J].Information Systems,2010,35(8):884-910. [3]Mohammed N,Fung B C M,Debbabi M.Walking in the Crowd:Anonymizing Trajectory Data for Pattern Analy-sis[C]//Proceedings of the 18th ACM Conference on In-formation and Knowledge Management.Hong Kong,China:Association for Computing Machinery,2009:1441-1444. [4]Nergiz M E,Atzori M,Saygin Y.Towards Trajectory Anonymization:A Generalization-based Approach[J].Transactions on Data Privacy,2009,2(1):47-75. [5]Mohammed N,Chen Rui,Fung B C,et al.Privacy-preserving Trajectory Data Publishing by Local Sup-pression[J].Information Science,2013,231(1):83-97. [6]Monreale A,Andrienko G,Andrienko N,et al.Move-ment Data Anonymity Through Generalization[J].Transactions on Data Privacy,2010,3(2):91-121. [7]Poulis G,Skiadopoulos S,Loukides G,et al.Distance-based km-anonymization of Trajectory Data[C]//Pro-ceedings of the 14th International Conference on Mobile Data Management.Milan,Italy:[s.n.],2013:57-62. [8]霍峥,孟小峰.轨迹隐私保护技术研究[J].计算机学报,2011,34(10):1829-1830. [9]Brinkhoff T.A Framework for Generating Network-based Moving Objects[J].Geo Informatica,2002,6(2):153-180. [10]Yarovoy R,Bonchi F,Lakshmanan L V S,et al.Ano-nymizing Moving Objects:How to Hide a Mob in a Crowd?[C]//Proceedings of the 12th International Con-ference on Extending Database Technology.Saint Peters-burg,Russia:[s.n.],2009:72-83. [11]赵婧,张渊,李兴,等.基于轨迹频率抑制的轨迹隐私保护方法[J] 计算机学报,2014,37(10):2096-2106. 编辑顾逸斐 |