[1] 霍峥,孟小峰. 轨迹隐私保护技术研究[J]. 计算机学报, 2011,34(10):1820-1830.
[2] 潘晓,肖珍,孟小峰. 位置隐私研究综述[J]. 计算机科学与探索, 2007(3):268-281.
[3] Gruteser M, Grunwald D. Anonymous usage of location-based services through spatial and temporal cloaking[C]// International Conference on Mobile Systems, 2003. 2003:31-42.
[4] Xu Toby, Cai Ying. Location anonymity in continuous location based services[C]// Proceedings of the 15th ACM International Symposium on Geographic Information Systems. 2007: Article No. 39.
[5] Sweeney L. K-anonymity: A model for protecting privacy[J]. International Journal of Uncertainty, Fuzziness and Knowledge-based Systems, 2002,10(5):557-570.
[6] Abul O, Bonchi F, Nanni M. Never walk alone: Uncertainty for anonymity in moving objects databases[C]// IEEE 24th International Conference on Data Engineering, 2008. 2008:376-385.
[7] Ghinita G, Kalnis P, Khoshgozaran A, et al. Private queries in location based services: Anonymizers are not necessary[C]// Proceedings of the 2008 ACM SIGMOD International Conference on Management of Data. 2008:121-132.
[8] Kido H, Yanagisawa Y, Satoh T. Protection of location privacy using dummies for location-based services[C]// IEEE 21th International Conference on Data Engineering Workshops. 2005:1248-1254.
[9] 潘晓,郝兴,孟小峰. 基于位置服务中的连续查询隐私保护研究[J]. 计算机研究与发展, 2010,1(1):121-129.
[10]Xiao Zhen, Xu Jianliang, Meng Xiaofeng.p-Sensitivity: A semantic privacy-protection model for location-based services[C]// Proceedings of the 9th International Conference on Mobile Data Management Workshops. 2008:47-54.
[11]Zhou Bin, Pei Jian. The K-anonymity and l-diversity approaches for privacy preservation in social networks against neighborhood attacks[J]. Knowledge and Information Systems, 2011,28(1):47-77.
[12]Dondi R, Mauri G, Zoppis. The l-Diversity problem: Tractability and approximability[J]. Theoretical Computer Science, 2013,511(14):159-171.
[13]Tripathy B K, Maity A, Ranajit B, et al. A fast p-sensitive l-diversity anonymisation algorithm[C]// 2011 IEEE Recent Advances in Intelligent Computational Systems. 2011:741-744.
[14]林欣,李善平,杨朝晖. LBS中连续查询攻击算法及匿名性度量[J]. 软件学报, 2009,20(4):1058-1068.
[15]王彩梅,郭亚军,郭艳华. 位置服务中用户轨迹的隐私度量[J]. 软件学报, 2012,23(2):352-360.
[16]霍峥,孟小峰,黄毅. PrivateCheckIn:一种移动社交网络中的轨迹隐私保护方法[J]. 计算机学报, 2013,36(4):716-726.
[17]Gidofalvi G, Huang Xuegang, Pedersen T B. Privacy-preserving data mining on moving object trajectories[C]// 2007 International Conference on Mobile Data Management. 2007:60-68.
[18]Brinkhoff T. A framework for generating network-based moving objects[J]. Geoinformatica, 2002,6(2):153-180.
[19]Stenneth L, Yu P S. Global privacy and transportation mode homogeneity anonymization in location based mobile systems with continuous queries[C]// 2010 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing. 2010:1-10.〖ZK)〗〖FL)〗
|