Computer Science ›› 2019, Vol. 46 ›› Issue (5): 122-128.doi: 10.11896/j.issn.1002-137X.2019.05.019
Previous Articles Next Articles
GU Yi-ming1,2, BAI Guang-wei1, SHEN Hang1,3, HU Yu-jia1,2
CLC Number:
[1]NIU B,LI Q,ZHU X,et al.Achieving k-anonymity in privacy-aware location-based services[C]∥INFOCOM,2014 Proceedings IEEE.IEEE,2014:754-762. [2]NIU B,ZHANG Z,LI X,et al.Privacy-area aware dummy gene-ration algorithms for location-based services[C]∥2014 IEEE International Conference on Communications (ICC).IEEE,2014:957-962. [3]SUN Y,ZHANG B,ZHAO B,et al.Mix-zones optimal deployment for protecting location privacy in VANET[J].Peer-to-Peer Networking and Applications,2015,8(6):1108-1121. [4]CICEK A E,NERGIZ M E,SAYGIN Y.Ensuring location diversity in privacy-preserving spatio-temporal data publishing[J].The VLDB Journal,2014,23(4):609-625. [5]ZHANG X,XIA Y,BAE H Y.A novel location privacy preservation method for moving object[J].International Journal of Security and ItsApplications,2015,9(2):1-12. [6]SHI W S,SUN H,CAO J,et al.Edge Computing:An Emerging Computing Model for Internet of Everything Era[J].Journal of Computing Research and Development,2017,54(5):907-924.(in Chinese)施巍松,孙辉,曹杰,等.边缘计算:万物互联时代新型计算模型[J].计算机研究与发展,2017,54(5):907-924. [7]WAN S,LI F H,NIU B,et al.Research progress on locationprivacy-preserving techniques[J].Journal of Communications,2017,37(12):124-141.(in Chinese)万盛,李凤华,牛犇,等.位置隐私保护技术研究进展[J].通信学报,2017,37(12):124-141. [8]YANG X,ZHU Y,HU Q.Improved location privacy protection method based on SpaceTwist[J].Journal of Hebei University (Natural Science Edition),2017,37(3):287-293. [9]NIU B,ZHU X,LI W,et al.Epcloak:An efficient and privacy-preserving spatial cloaking scheme for lbss[C]∥2014 IEEE 11th International Conference on Mobile Ad Hoc and Sensor Systems (MASS).IEEE,2014:398-406. [10]KIM Y K,HOSSAIN A,HOSSAIN A A,et al.Hilbert-orderbased spatial cloaking algorithm in road network[J].Concurrency and Computation:Practice and Experience,2013,25(1):143-158. [11]CHOW C Y,MOKBEL M F.Enabling private continuous queries for revealed user locations[C]∥International Symposium on Spatial and Temporal Databases.Berlin:Springer,2007:258-275. [12]ZHOU C L,MA C G,YANG S T.Location privacy-preserving method for LBS continuous KNN query in road networks[J].Journal of Computer Research and Development,2014,49(7):1001-1016.(in Chinese)周长利,马春光,杨松涛.路网环境下保护 LBS 位置隐私的连续 KNN 查询方法[J].Journal of Computer Research and Development,2014,49(7):1001-1016. [13]CHENG R,ZHANG Y,BERTINO E,et al.Preserving user location privacy in mobile data management infrastructures[C]∥International Workshop on Privacy Enhancing Technologies.Berlin:Springer,2006:393-412. [14]GHINITA G,SILVESTRI C,SILVESTRI C,et al.Preventingvelocity-based linkage attacks in location-aware applications[C]∥ACM Sigspatial International Conference on Advances in Geographic Information Systems.ACM,2009:246-255. [15]HASHEM T,KULIK L,ZHANG R.Countering overlappingrectangle privacy attack for moving knnqueries[J].Information Systems,2013,38(3):430-453. [16]NGUYEN N,HAN S,SHIN M.URALP:unreachable region aware location privacy against maximum movement boundary attack[J].International Journal of Distributed Sensor Networks,2015,11(8):246216. |
[1] | LU Chen-yang, DENG Su, MA Wu-bin, WU Ya-hui, ZHOU Hao-hao. Federated Learning Based on Stratified Sampling Optimization for Heterogeneous Clients [J]. Computer Science, 2022, 49(9): 183-193. |
[2] | SUN Hui-ting, FAN Yan-fang, MA Meng-xiao, CHEN Ruo-yu, CAI Ying. Dynamic Pricing-based Vehicle Collaborative Computation Offloading Scheme in VEC [J]. Computer Science, 2022, 49(9): 242-248. |
[3] | YU Bin, LI Xue-hua, PAN Chun-yu, LI Na. Edge-Cloud Collaborative Resource Allocation Algorithm Based on Deep Reinforcement Learning [J]. Computer Science, 2022, 49(7): 248-253. |
[4] | LI Meng-fei, MAO Ying-chi, TU Zi-jian, WANG Xuan, XU Shu-fang. Server-reliability Task Offloading Strategy Based on Deep Deterministic Policy Gradient [J]. Computer Science, 2022, 49(7): 271-279. |
[5] | YUAN Hao-nan, WANG Rui-jin, ZHENG Bo-wen, WU Bang-yan. Design and Implementation of Cross-chain Trusted EMR Sharing System Based on Fabric [J]. Computer Science, 2022, 49(6A): 490-495. |
[6] | FANG Tao, YANG Yang, CHEN Jia-xin. Optimization of Offloading Decisions in D2D-assisted MEC Networks [J]. Computer Science, 2022, 49(6A): 601-605. |
[7] | LIU Zhang-hui, ZHENG Hong-qiang, ZHANG Jian-shan, CHEN Zhe-yi. Computation Offloading and Deployment Optimization in Multi-UAV-Enabled Mobile Edge Computing Systems [J]. Computer Science, 2022, 49(6A): 619-627. |
[8] | XIE Wan-cheng, LI Bin, DAI Yue-yue. PPO Based Task Offloading Scheme in Aerial Reconfigurable Intelligent Surface-assisted Edge Computing [J]. Computer Science, 2022, 49(6): 3-11. |
[9] | WANG Mei-shan, YAO Lan, GAO Fu-xiang, XU Jun-can. Study on Differential Privacy Protection for Medical Set-Valued Data [J]. Computer Science, 2022, 49(4): 362-368. |
[10] | ZHANG Hai-bo, ZHANG Yi-feng, LIU Kai-jian. Task Offloading,Migration and Caching Strategy in Internet of Vehicles Based on NOMA-MEC [J]. Computer Science, 2022, 49(2): 304-311. |
[11] | LIN Chao-wei, LIN Bing, CHEN Xing. Study on Scientific Workflow Scheduling Based on Fuzzy Theory Under Edge Environment [J]. Computer Science, 2022, 49(2): 312-320. |
[12] | JIN Hua, ZHU Jing-yu, WANG Chang-da. Review on Video Privacy Protection [J]. Computer Science, 2022, 49(1): 306-313. |
[13] | LEI Yu-xiao , DUAN Yu-cong. AI Governance Oriented Legal to Technology Bridging Framework for Cross-modal Privacy Protection [J]. Computer Science, 2021, 48(9): 9-20. |
[14] | LIANG Jun-bin, ZHANG Hai-han, JIANG Chan, WANG Tian-shu. Research Progress of Task Offloading Based on Deep Reinforcement Learning in Mobile Edge Computing [J]. Computer Science, 2021, 48(7): 316-323. |
[15] | XUE Yan-fen, GAO Ji-mei, FAN Gui-sheng, YU Hui-qun, XU Ya-jie. Energy-aware Fault-tolerant Collaborative Task Execution Algorithm in Edge Computing [J]. Computer Science, 2021, 48(6A): 374-382. |
|