Computer Science ›› 2021, Vol. 48 ›› Issue (10): 266-271.doi: 10.11896/jsjkx.200900021
• Information Security • Previous Articles Next Articles
WEI Li-qi, ZHAO Zhi-hong, BAI Guang-wei, SHEN Hang
CLC Number:
[1]SONG C,QU Z,BLUMM N,et al.Limits of predictability in human mobility[J].Science,2010,327(5968):1018-1021. [2]PELLUNGRINI R,PAPPALARDO L,PRATESI F,et al.A data mining approach to assess privacy risk in human mobility data[J].ACM Transactions on Intelligent Systems and Technology,2018,9(3):1-27. [3]YAO D,ZHANG C,HUANG J,et al.Serm:a recurrent model for next location prediction in semantic trajectories[C]//Procceding of ACM Conference on Information and Knowledge,Management (CIKM).2017:2411-2414. [4]ZHENG Y.Trajectory data mining:an overview[J].ACMTransactions on Intelligent Systems and Technology,2015,6(3):1-41. [5]BACKES M,HUMBERT M,PANG J,et al.Walk2friends:Inferring social links from mobility profiles[C]//Procceding of ACM SIGSAC Conference on Computer and Communications,Security (CCS).2017:1943-1957. [6]FAWAZ K,SHIN K G.Location privacy protection for smart-phone users[C]//Procceding of ACM SIGSAC Conference on Computer and Communications Security (CCS).2014:239-250. [7]XU Q,ZHENG R,TAHOUN E.Detecting location fraud in indoor mobile crowdsensing[C]//Procceding of the First ACM Workshop on Mobile Crowdsensing Systems and Applications (Crowd-SenSys).2017:44-49. [8]KONSTANTINIDIS A,CHATZIMILIOUDIS G,ZEINALI-POUR-YAZTI D,et al.Privacy-preserving indoor localization onsmartphones[J].IEEE Transactions on Knowledge & Data Engineering,2015,27(11):3042-3055. [9]ANDRES M E,BORDENABE N E,CHATZIKOKOLAKIS K.Geo-indistinguishability:differential privacy for location-based systems[C]//Procceding of the 20th ACM Conference on Computer and Communications Security (CCS).2013:901-914. [10]YIU M L,JENSEN C S,MOLLER J.Design and analysis of a ranking approach to private location-based services[J].ACM Transactions on Database Systems,2011,36(2):1-42. [11]PERAZZO P,DINI G.A uniformity-based approach to location privacy[J].Computer Communications,2015,64(1):21-32. [12]MARTUCCI L A,ZUCCATO A,FISCHER-HÜBNER S.Identity deployment and management in wireless mesh net-works[C]//IFIP International Summer School on the Future of Identity in the Information Society.Boston,MA:Springer,2007:223-233. [13]SCHAUB F,MA Z,KARGL F.Privacy requirements in vehicular communication systems[C]//2009 International Conference on Computational Science and Engineering.IEEE,2009,3:139-145. [14]KIDO H,YANAGISAWA Y,SATOH T.An anonymous communication technique using dummies for location-based services[C]//Procceding of IEEE International Conference on Pervasive Services (ICPS'05).2005:88-97. [15]SHOKRI R,THEODORAKOPOULOS G,TRONCOSO C.Protecting location privacy:optimal strategy against localization attacks[C]//Procceding of ACM Conference on Computer and Communications Security.2012:617-627. [16]TRIPATHY A,WANG Y,ISHWAR P.Privacy-preserving adversarial networks,CoRR,2017:abs/1712.07008 [OL].http://arxiv.org/abs/1712.07008. [17]BELGHAZI M I,BARATIN A,RAJESHWAR S,et al.Mutual information neural estimation[C]//International Conference on Machine Learning.PMLR,2018:531-540. [18]NOWOZIN S,CSEKE B,TOMIOKA R.f-GAN:training ge-nerative neural samplers using variational divergence minimization[C]//Procceding of the Annual Conference on Neural Information Processing Systems.2016:271-279. [19]GU Y M,BAI G W,SHEN H,et al.Precache Based Privacy Protection Mechanism in Continuous LBS Queries[J].Compu-ter Science,2019,46(5):122-128. |
[1] | LU Chen-yang, DENG Su, MA Wu-bin, WU Ya-hui, ZHOU Hao-hao. Federated Learning Based on Stratified Sampling Optimization for Heterogeneous Clients [J]. Computer Science, 2022, 49(9): 183-193. |
[2] | LENG Dian-dian, DU Peng, CHEN Jian-ting, XIANG Yang. Automated Container Terminal Oriented Travel Time Estimation of AGV [J]. Computer Science, 2022, 49(9): 208-214. |
[3] | NING Han-yang, MA Miao, YANG Bo, LIU Shi-chang. Research Progress and Analysis on Intelligent Cryptology [J]. Computer Science, 2022, 49(9): 288-296. |
[4] | JIANG Yang-yang, SONG Li-hua, XING Chang-you, ZHANG Guo-min, ZENG Qing-wei. Belief Driven Attack and Defense Policy Optimization Mechanism in Honeypot Game [J]. Computer Science, 2022, 49(9): 333-339. |
[5] | HE Qiang, YIN Zhen-yu, HUANG Min, WANG Xing-wei, WANG Yuan-tian, CUI Shuo, ZHAO Yong. Survey of Influence Analysis of Evolutionary Network Based on Big Data [J]. Computer Science, 2022, 49(8): 1-11. |
[6] | LI Yao, LI Tao, LI Qi-fan, LIANG Jia-rui, Ibegbu Nnamdi JULIAN, CHEN Jun-jie, GUO Hao. Construction and Multi-feature Fusion Classification Research Based on Multi-scale Sparse Brain Functional Hyper-network [J]. Computer Science, 2022, 49(8): 257-266. |
[7] | ZHANG Guang-hua, GAO Tian-jiao, CHEN Zhen-guo, YU Nai-wen. Study on Malware Classification Based on N-Gram Static Analysis Technology [J]. Computer Science, 2022, 49(8): 336-343. |
[8] | CHEN Ming-xin, ZHANG Jun-bo, LI Tian-rui. Survey on Attacks and Defenses in Federated Learning [J]. Computer Science, 2022, 49(7): 310-323. |
[9] | LI Ya-ru, ZHANG Yu-lai, WANG Jia-chen. Survey on Bayesian Optimization Methods for Hyper-parameter Tuning [J]. Computer Science, 2022, 49(6A): 86-92. |
[10] | ZHAO Lu, YUAN Li-ming, HAO Kun. Review of Multi-instance Learning Algorithms [J]. Computer Science, 2022, 49(6A): 93-99. |
[11] | XU Guo-ning, CHEN Yi-peng, CHEN Yi-ming, CHEN Jin-yin, WEN Hao. Data Debiasing Method Based on Constrained Optimized Generative Adversarial Networks [J]. Computer Science, 2022, 49(6A): 184-190. |
[12] | FANG Tao, YANG Yang, CHEN Jia-xin. Optimization of Offloading Decisions in D2D-assisted MEC Networks [J]. Computer Science, 2022, 49(6A): 601-605. |
[13] | XIAO Zhi-hong, HAN Ye-tong, ZOU Yong-pan. Study on Activity Recognition Based on Multi-source Data and Logical Reasoning [J]. Computer Science, 2022, 49(6A): 397-406. |
[14] | YAO Ye, ZHU Yi-an, QIAN Liang, JIA Yao, ZHANG Li-xiang, LIU Rui-liang. Android Malware Detection Method Based on Heterogeneous Model Fusion [J]. Computer Science, 2022, 49(6A): 508-515. |
[15] | WANG Fei, HUANG Tao, YANG Ye. Study on Machine Learning Algorithms for Life Prediction of IGBT Devices Based on Stacking Multi-model Fusion [J]. Computer Science, 2022, 49(6A): 784-789. |
|