[1] YANG Jing,ZHANG Bing,ZHANG Jianpei,et al.Personalized trajectory privacy preserving method based on graph partition[J].Journal on Communications,2015,36(3):1-11.(in Chinese)杨静,张冰,张健沛,等.基于图划分的个性化轨迹隐私保护方法[J].通信学报,2015,36(3):1-11. [2] HUO Zheng,MENG Xiaofeng.A trajectory data publication method under differential privacy[J].Chinese Journal of Computers,2018,41(2):401-412.(in Chinese)霍峥,孟小峰.一种满足差分隐私的轨迹数据发布方法[J].计算机学报,2018,41(2):401-412. [3] LI Weihao,DING Sheng,MENG Jiajie,et al.Spatio-temporal aware privacy-preserving scheme in LBS[J].Journal on Communications,2018,39(5):134-142.(in Chinese)李维皓,丁晟,孟佳洁,等.基于位置服务中时空关联的隐私保护方案[J].通信学报,2018,39(5):134-142. [4] TASNIM S,CALDAS J,PISSINOU N,et al.Semantic-aware clustering-based approach of trajectory data stream mining[C]//Proceedings of 2018 International Con-ference on Computing,Networking and Communica-tions.Washington D.C.,USA:IEEE Press,2018:88-92. [5] RUHHAMMER C,BAUMANN M,PROTSCHKY V,et al.Automated intersection mapping from crowd trajectory data[J].IEEE Transactions on Intelligent Transportation Systems,2017,18(3):666-677. [6] YANG C,GIDÓFALVI G.Mining and visual exploration of closed contiguous sequential patterns in trajectories[J].International Journal of Geographical Information Science,2018,32(7):1282-1304. [7] ZHAO Jing,ZHANG Yuan,LI Xinghua,et al.A trajectory privacy protection approach via trajectory frequency suppression[J].Chinese Journal of Computers,2014,37(10):2096-2106.(in Chinese)赵婧,张渊,李兴华,等.基于轨迹频率抑制的轨迹隐私保护方法[J].计算机学报,2014,37(10):2096-2106. [8] ZHONG Jianyou,CHANG Shan,LIU Xiaoqiang,et al.De-anonymization attack method for mobile trace data[J].Computer Engineering,2016,42(12):133-138.(in Chinese)钟建友,常姗,刘晓强,等.移动轨迹数据去匿名化攻击方法[J].计算机工程,2016,42(12):133-138. [9] ZHANG Shaobo,LIU Qin,WANG Guojun.Trajectory privacy protection method based on location obfuscation[J].Journal on Communications,2018,39(7):81-91.(in Chinese)张少波,刘琴,王国军.基于位置混淆的轨迹隐私保护方法[J].通信学报,2018,39(7):81-91. [10] WU Yuncheng,CHEN Hong,ZHAO Suyun,et al.Differentially private trajectory protection based on spatial and temporal correlation[J].Chinese Journal of Computers,2018,41(2):309-322.(in Chinese)吴云乘,陈红,赵素云,等.一种基于时空相关性的差分隐私轨迹保护机制[J].计算机学报,2018,41(2):309-322. [11] HUO Zheng,MENG Xiaofeng.A survey of trajectory privacy-preserving techniques[J].Chinese Journal of Computers,2011,34(10):1820-1830.(in Chinese)霍峥,孟小峰.轨迹隐私保护技术研究[J].计算机学报,2011,34(10):1820-1830. [12] WU Yingjie,TANG Qingming,NI Weiwei,et al.A clustering hybrid based algorithm for privacy preserving trajectory data publishing[J].Journal of Computer Research and Develop-ment,2013,50(3):578-593.(in Chinese)吴英杰,唐庆明,倪巍伟,等.基于聚类杂交的隐私保护轨迹数据发布算法[J].计算机研究与发展,2013,50(3):578-593. [13] DENG Jingsong,LUO Yonglong,YU Qingying,et al.Trajectory privacy-preserving method that supports local suppression and sequence resconstruction[J].Journal of Chinese Computer Systems,2017,38(3):478-482.(in Chinese)邓劲松,罗永龙,俞庆英,等.支持局部抑制和序列重构的轨迹隐私保护方法[J].小型微型计算机系统,2017,38(3):478-482. [14] LEI Kaiyue,LI Xinghua,LIU Hai,et al.Dummy trajectory privacy protection scheme for trajectory publishing based on the spatiotemporal correlation[J].Journal on Communica-tions,2016,37(12):156-164.(in Chinese)雷凯跃,李兴华,刘海,等.轨迹发布中基于时空关联性的假轨迹隐私保护方案[J].通信学报,2016,37(12):156-164. [15] MOHAMMED N,FUNG B C M,DEBBABI M.Preserving privacy and utility in RFID data publishing[EB/OL].[2019-06-20].https://spectrum.library.concordia.ca/6850/1/RFID_Privacy.pdf. [16] CHEN R,FUNG B C M,MOHAMMED N,et al.Privacy-preserving trajectory data publishing by local suppression[J].Information Sciences,2013,231:83-97. [17] GHASEMI KOMISHANI E,ABADI M,DELDAR F.PPTD:preserving personalized privacy in trajectory data publishing by sensitive attribute generalization and trajectory local suppression[J].Knowledge-Based Systems,2016,94:43-59. [18] TERROVITIS M,POULIS G,MAMOULIS N,et al.Local suppression and splitting techniques for privacy preserving publication of trajectories[J].IEEE Transactions on Knowledge and Data Engineering,2017,29(7):1466-1479. [19] BURDICK D,CALIMLIM M,FLANNICK J,et al.MAFIA:a maximal frequent itemset algorithm[J].IEEE Transactions on Knowledge and Data Engineering,2005,17(11):1490-1504. [20] KOMISHANI E G,ABADI M.A generalization-based approach for personalized privacy preservation in trajectory data publishing[C]//Proceedings of the 6th IEEE International Symposium on Telecommunications.Washington D.C.,USA:IEEE Press,2012:1129-1135. |