[1] 张学军, 桂小林, 伍忠东. 位置服务隐私保护研究综述[J]. 软件学报, 2015, 9:2373-2395. Zhang Xuejun, Gui Xiaolin, Wu Zhongdong. Privacy preservation for location-based services:a survey[J]. Journal of Software, 2015, 9:2373-2395.
[2] Ni W, Gu M, Chen X. Location privacy-preserving k nearest neighbor query under user's preference[J]. Knowledge-Based Systems, 2016, 103:19-27.
[3] Pan X, Xu J, Meng X. Protecting location privacy against location-dependent attacks in mobile services[J]. Knowledge and Data Engineering, IEEE Transactions on, 2012, 24(8):1506-1519.
[4] Yi X, Paulet R, Bertino E, et al. Practical approximate k nearest neighbor queries with location and query privacy[J]. IEEE Transactions on Knowledge and Data Engineering, 2016, 28(6):1546-1559.
[5] Man Lung Yiu, Jensen C S, Xuegang Huang, et al SpaceTwist:Managing the trade-offs among Location Privacy, Query Performance, and Query accuracy in mobile services[C]//2008 IEEE 24th International Conference on Data Engineering. (ICDE 2008). Mexico:IEEE Press, 2008:366-375.
[6] 黄毅, 霍峥, 孟小峰. CoPrivacy:一种用户协作无匿名区域的位置隐私保护方法[J]. 计算机学报, 2011, 34(10):1976-1985. Hang Yi, Huo Zheng, Meng Xiaofeng. CoPrivacy:A collaborative location privacy-preserving method without cloaking region[J]. Chinese Journal of Computers, 2011, 34(10):1976-1985.
[7] Gong Z, Sun G Z, Xie X. Protecting privacy in location-based services using k-anonymity without cloaked region[C]//2010 Eleventh International Conference on Mobile Data Management (MDM 2010). Kansas City:IEEE Press, 2010:366-371.
[8] Niu B, Zhang Z, Li X, et al. Privacy-area aware dummy generation algorithms for Location-Based Services[C]//2014 IEEE International Conference on Communications (ICC 2014). Sydney:IEEE Press, 2014:957-962.
[9] Zhou C, Ma C, Yang S, et al. A location privacy preserving method based on sensitive diversity for LBS[C]//2014 IFIP International Conference on Network and Parallel Computing (NPC 2014). Berlin Heidelberg:Springer Press, 2014:409-422.
[10] Ghinita G. Privacy for location-based services[J]. Synthesis Lectures on Information Security, Privacy, & Trust, 2013, 4(1):1-85.
[11] Yi X, Paulet R, Bertino E, et al. Practical k nearest neighbor queries with location privacy[C]//2008 IEEE 30th International Conference on Data Engineering (ICDE 2014). Chicago:IEEE Press, 2014:640-651.
[12] 周长利, 田晖, 马春光, 等. 路网环境下基于伪随机置换的LBS隐私保护方法研究[J]. 通信学报, 2017(6):19-29. Zhou Changli, Tian Hui, Ma Chunguang, et al. Research on LBS privacy preservation based on pseudorandom permutation in road network[J]. Journal on Communications, 2017(6):19-29.
[13] 杨松涛, 马春光, 周长利. NCoP:无用户协作的LBS隐私保护方法[J]. 北京邮电大学学报, 2014, 37(6):86-90. Yang Songtao, Ma Chunguang, Zhou Changli. NCoP:A non-Cooperative location privacy-preserving method[J]. Journal of Beijing University of Posts and Telecommunications, 2014, 37(6):86-90. |