[1] Peng Tao, Liu Qin, Wang Guojun, et al.Multidimensional privacy preservation in location-based services[J].Future Generation Computer Systems,2019,93:312-326. [2] 王洁, 王春茹, 马建峰, 等.基于位置语义和查询概率的假位置选择算法[J].通信学报, 2020, 41(3):53-61.Wang Jie, Wang Chunru, Ma Jianfeng, et al.Dummy location selection algorithm based on location semantics and query probability[J].Journal on Communications, 2020, 41(3):53-61. [3] Li Weihao, Li Chen, Geng Yeli.APS:attribute-aware privacy-preserving scheme in location-based services[J].Information Sciences, 2020, 527:460-476. [4] Guo Xueying, Wang Wenming, Huang Haiping, et al.Location privacy-preserving method based on historical proximity location[J].Wireless Communications and Mobile Computing, 2020(8):1-16. [5] Ni Lina, Tian Fulong, Ni Qinghang, et al.An anonymous entropy-based location privacy protection scheme in mobile social networks[J].EURASIP Journal on Wireless Communications and Networking, 2019(1):93-96. [6] 李璐璐, 华佳烽, 万盛, 等.基于高效信息缓存的位置隐私保护方案[J].通信学报, 2017, 38(6):148-157.Li Lulu, Hua Jiafeng, Wan Sheng, et al.Achieving efficient location privacy protection based on cache[J].Journal on Communications, 2017, 38(6):148-157. [7] Zhang Shaobo, Mao Xinjun, Choo K K R, et al.A trajectory privacy-preserving scheme based on a dual-K mechanism for continuous location-based services[J].Information Sciences, 2020, 527:406-419. [8] Memon I, Mirza H T, Arain Q A, et al.Multiple mix zones decorrelation trajectory privacy model for road network[J].Telecommunication Systems, 2019, 70(4):557-582. [9] Terrovitis M, Poulis G, Mamoulis N, et al.Local suppression and splitting techniques for privacy preserving publication of trajectories[J].IEEE Transactions on Knowledge and Data Engineering, 2017, 29(7):1466-1479. [10] Zhao Xiaodong, Pi Dechang, Chen Junfu.Novel trajectory privacy-preserving method based on prefix tree using differential privacy[J].Knowledge-Based Systems, 2020:105940. |