[1] Gartner G, Huang Haosheng. Progress in location-based services 2014[M]. Berlin:Springer International Publishing, 2015.
[2] Sun Yanming, Chen Min, Hu Long, et al. ASA:against statistical attacks for privacy-aware users in location based service[J]. Future Generation Computer Systems-the International Journal of eScience, 2017(70):48-58.
[3] Li Xinghua, Miao Meixia, Liu Hai, et al. An incentive mechanism for K-anonymity in LBS privacy protection based on credit mechanism[J]. Soft Computing, 2017, 21(14):3907-3917.
[4] Huo Zheng, Meng Xiaofeng. A survey of trajectory privacy-preserving techniques[J]. Chinese Journal of Computers, 2011, 34(10):1820-1830.
[5] He Wen. Research on LBS privacy protection technology in mobile social networks[C]//IEEE Advanced Information Technology, Electronic and Automation Control Conference. New York:IEEE Press, 2017:73-76.
[6] Khoshgozaran A, Shahabi C, Shirani-Mehr H. Location privacy:going beyond K-anonymity, cloaking and anonymizers[J]. Knowledge and Information Systems, 2011, 26(3):435-465.
[7] Zhang Yuan, Chen Qingjun, Zhong Sheng. Privacy-preserving data aggregation in mobile phone sensing[J]. IEEE Transactions on Information Forensics and Security, 2016, 11(5):980-992.
[8] 万盛, 李凤华, 牛犇, 等. 位置隐私保护技术研究进展[J]. 通信学报, 2016, 37(12):124-141. Wan Sheng, Li Fenghua, Niu Ben, et al. Research progress on location privacy-preserving techniques[J]. Journal on Communications, 2016, 37(12):124-141.
[9] Lee K C K, Zheng Baihua, Chen C, et al. Efficient index-based approaches for skyline queries in location-based applications[J]. IEEE Transactions on Knowledge and Data Engineering, 2013, 25(11):2507-2520.
[10] Tai F Y, Song Jiankai, Tsai Y C, et al. Cloaking sensitive patterns Td preserve location privacy for LBS applications[C]//IEEE International Conference on Consumer Electronics-Taiwan. New York:IEEE Press, 2016:1-2.
[11] Gruteser M, Liu Xuan. Protecting privacy in continuous location-tracking applications[J]. IEEE Security and Privacy, 2004, 2(2):28-34.
[12] Terrovitis M, Mamoulis N. Privacy preservation in the publication of trajectories[C]//International Conference on Mobile Data Management. New York:IEEE Press, 2008:65-72.
[13] Chen Rui, Fung B C M, Mohammed N, et al. Privacy-preserving trajectory data publishing by local suppression[J]. Information Sciences, 2013(231):83-97.
[14] 赵婧, 张渊, 李兴华, 等. 基于轨迹频率抑制的轨迹隐私保护方法[J]. 计算机学报, 2014, 37(10):2096-2106. Zhao Jing, Zhang Yuan, Li Xinghua, et al. A trajectory privacy protection approach via trajectory frequency suppression[J]. Chinese Journal of Computers, 2014, 37(10):2096-2106.
[15] Dai Jiazhu, Hua Liang. A method for the trajectory privacy protection based on the segmented fake trajectory under road networks[C]//International Conference on Information Science and Control Engineering. New York:IEEE Press, 2015:13-17.
[16] Chow C Y, Mokbel M F. Enabling private continuous queries for revealed user locations[C]//International Symposium on Advances in Spatial and Temporal Databases. Berlin:Springer, 2007:258-275.
[17] Kato R, Iwata M, Hara T, et al. A dummy-based anonymization method based on user trajectory with pauses[C]//International Conference on Advances in Geographic Information Systems. New York:ACM, 2012:249-258.
[18] Hwang R H, Hsueh Y L, Chung H W. A novel time-obfuscated algorithm for trajectory privacy protection[J]. IEEE Transactions on Services Computing, 2014, 7(2):126-139.
[19] Schlegel R, Chow C Y, Huang Qiong, et al. User-defined privacy grid system for continuous location-based services[J]. IEEE Transactions on Mobile Computing, 2015, 14(10):2158-2172.
[20] 李凤华, 张翠, 牛犇, 等. 高效的轨迹隐私保护方案[J]. 通信学报, 2015, 36(12):114-123. Li Fenghua, Zhang Cui, Niu Ben, et al. Efficient trajectory privacy protection scheme[J]. Journal of Communications, 2015, 36(12):114-123.
[21] Peng Tao, Liu Qin, Meng Dacheng, et al. Collaborative trajectory privacy preserving scheme in location-based services[J]. Information Sciences, 2017(387):165-179. |