Computer Science ›› 2017, Vol. 44 ›› Issue (8): 124-128.doi: 10.11896/j.issn.1002-137X.2017.08.022
Previous Articles Next Articles
DONG Yu-lan and PI De-chang
[1] HUO Z,MENG X F.A Survey of Trajectory Privacy-Preserving Techniques[J].Chinese Journal of Computers,2011,4(10):1820-1830.(in Chinese) 霍峥,孟小峰.轨迹隐私保护技术研究[J].计算机学报,2011,4(10):1820-1830. [2] ZHAO J,ZHANG Y,LI X,et al.A Trajectory Privacy Protection Approach via Trajectory Frequency Suppression[J].Chinese Journal of Computers,2014,7(10):2096-2106.(in Chinese) 赵婧,张渊,李兴,等.基于轨迹频率抑制的轨迹隐私保护方法[J].计算机学报,2014,7(10):2096-2106. [3] HUO Z,MENG X F,HUANG Y.PrivateCheckIn:Trajectory Privacy-Preserving for Check-In Services in MSNS[J].Chinese Journal of Computers,2013,6(4):716-726.(in Chinese) 霍峥,孟小峰,黄毅.PrivateCheckIn:一种移动社交网络中的轨迹隐私保护方法[J].计算机学报,2013,6(4):716-726. [4] XU T,CAI Y.Exploring Historical Location Data for Anonymity Preservation in Location-Based Services[C]∥ The 27th Conference on Computer Communications.2008:547-555. [5] SHI M Y.Research on Trajectory Privacy Protection in Location Based Service[D].Nanjing:Nanjing University of Posts,2014.(in Chinese) 史敏仪.面向位置服务的轨迹隐私保护技术研究[D].南京:南京邮电大学,2014. [6] PALANISAMY B,LIU L.Attack-resilient mix-zones over roadnetworks:architecture and algorithms[J].IEEE Transactions on Mobile Computing,2015,14(3):495-508. [7] KIDO H,YANAGISAWA Y,SATOH T.An anonymous communication technique using dummies for location-basedservices[C]∥International Conference on Pervasive Services,2005(ICPS’05).2005:88-97. [8] SUZUKI A,IWATA M,ARASE Y,et al.A user location anony-mization method for location based services in a realenvironment[C]∥Sigspatial International Conference on Advances in Geographic Information Systems.ACM,2010:398-401. [9] KATO R,IWATA M,HARA T,et al.A dummy-based anonymization method based on user trajectory with pauses[C]∥International Conference on Advances in Geographic Information Systems.2012:249-258. [10] KATO R,IWATA M,HARA T,et al.User Location Anonymization Method for Wide Distribution of Dummies[M]∥Database and Expert Systems Applications.Springer Berlin Heidelberg,2013:259-273. [11] YOU T H,PENG W C,LEE W C.Protecting Moving Trajec-tories with Dummies[C]∥International Conferenceon Mobile Data Management.IEEE,2007:278-282. [12] WU X,SUN G.A Novel Dummy-Based Mechanism to Protect Privacy on Trajectories[C]∥IEEE International Conference on Data Mining Workshop.IEEE,2014:1120-1125. [13] LEI P R,PENG W C,SU I J,et al.Dummy-Based Schemes for Protecting Movement Trajectories[J].Journal ofInformation Science & Engineering,2012,28(2):335-350. [14] BRINKHOFF T.Generating Network-Based Moving Objects[C]∥International Conference on Scientific and Statistical Database Management.IEEE Computer Society,2000:253-255. [15] MONTGOMERY D C,KOWALSKI S M.Design and Analysis of Experiments:Minitab Companion[M].Wiley,2010. |
No related articles found! |
|