Computer Science ›› 2023, Vol. 50 ›› Issue (11A): 221000036-9.doi: 10.11896/jsjkx.221000036
• Information Security • Previous Articles Next Articles
ZHANG Xuejun1, YANG Yixing1, LI Jiale1, TIAN Feng2, HUANG Haiyan1, HUANG Shan3
CLC Number:
[1]ZHANG X J,GUI X L,WU Z D.Overview of Research on Privacy Protection of Location Services[J].Journal of Software,2015,26(9):2373-2395. [2]YAN G H,LIU T,ZHANG X J,et al.Service Similarity Location k Anonymous Privacy Protection Scheme against Background Knowledge Inference Attack[J].Journal of Xi’an Jiaotong University,2020,54(1):8-18. [3]ZHANG Y B,ZHANG Q Y,LI Z Y,et al.A k-anonymous Loca-tion Privacy Protection Method of Dummy Based on Geographical Semantics[J].International Journal of Network Security,2019,21(6):937-946. [4]ZHANG X J,GUI X L,JIANG J H.User Centered Privacy Protection Method for Differential Disturbance Location[J].Journal of Xi’an Jiaotong University,2016,50(12):79-86. [5]ZHANG X J,YANG H Y,LI Z,et al.Differentially Private Location Privacy-preserving Scheme with Semantic Location[J].Journal of Computer Science,2022,48(2):147-155. [6]HUANG G,DENG K,XIE Z,et al.Intelligent Pseudo-location Recommendation for Protecting Personal Location Privacy[J].Concurrency and Computation:Practice and Experience,2020,32(2):5435-5446. [7]ZHU X Y,CHI H T,NIU B,et al.MobiCache:When k-anonymity meets cache[C]//2013 IEEE Global Communications Conference(GLOBECOM).IEEE,2013:820-825. [8]SUN G,CAI S,YU H,et al.Location Privacy Preservation for Mobile Users in Location-Based Services[J].IEEE Access,2019,7:87425-87438. [9]CHEN S,SHEN H.Semantic-Aware Dummy Selection for Location Privacy Preservation[C]//2016 IEEE Trust-com/BigDataSE/ISPA.IEEE,2016:752-759. [10]ZHAO P,LIU W,ZHANG G,et al.Preserving Privacy in WiFi Localization With Plausible Dummy Locations[J].IEEE Transactions on Vehicular Technology,2020,69(10):11909-11925. [11]DEWRI R,THURIMELLA R.Exploiting Service Similarity for Privacy in Location-Based Search Queries[J].IEEE Transactions on Parallel and Distributed Systems,2014,25(2):374-383. [12]ZHENG L J,YUE H H,LI Z X,et al.k-Anonymity Location Privacy Algorithm Based on Clustering[J].IEEE Access,2018,6:28328-28338. [13]ZHAO Z M,HU H D,ZHANG F,et al.K-anonymous Location Privacy Protection Method Based on Circular Region Partition[J].Journal of Beijing Jiaotong University,2013,37(5):13-18. [14]WANG J,LI Y,YANG D,et al.Achieving Effective $k$-Anonymity for Query Privacy in Location-Based Services[J].IEEE Access,2017,5:24580-24592. [15]GEDIK B,LIU L.Protecting Location Privacy with Personalized k-Anonymity:Architecture and Algorithms[J].IEEE Transactions on Mobile Computing,2008,7(1):1-18. [16]NIU B,LI Q,ZHU X,et al.Achieving k-anonymity in Privacy-aware Location-based Services[C]//IEEE INFOCOM 2014-IEEE Conference on Computer Communications.NJ:IEEE,2014:754-762. [17]SUN G,CHANG V,RAMACHANDRAN M,et al.Efficient location privacy algorithm for Internet of Things(IoT) services and applications[J].Journal of Network & Computer Applications,2016,89(7):3-13. [18]DU Y,CAI G,ZHANG X,et al.An Efficient Dummy-Based Location Privacy-Preserving Scheme for Internet of Things Ser-vices[J].Information(Switzerland),2019,10(9):1-15. [19]XIA X Y,BAI Z H,LI J,et al.A Location Cloaking Algorithm Based on Dummy and Stackelberg Game[J].Journal of Compu-ter Science,2019,442(10):92-108. [20]WANG J,WANG C R,MA J F,et al.Dummy Location Selection Algorithm Based on Location Semantics and Query Probability[J].Journal of Communication,2020,41(3):53-61. [21]SHI X J,ZHANG J R,GONG Y.A Dummy Location Generation Algorithm Based on the Semantic Quantification of Location[C]//2021 IEEE International Conference on Artificial Intelligence and Computer Applications(ICAICA),NJ:IEEE,2021:172-176. [22]WANG S,LI F H,NIU B,et al.Research Progress on Location Privacy-preserving Techniques[J].Journal of Communication,2016,37(12):124-141. [23]MACHANAVAJJHALA A,KIFER D,GEHRKE J,et al.L-diversity:Privacy Beyond k-anonymity[J].ACM Transactions on Knowledge Discovery from Data,2007,1(1):3-5. [24]ZHENG Y,ZHANG R,XIE X,et al.GeoLife:Managing andUnderstanding Your Past Life over Maps[C]//The Ninth International Conference on Mobile Data Management.IEEE,2008:211-212. |
[1] | TU Sipan, ZHANG Lin, LIU Xiping. Double Dummy Location Selection Algorithm Based on Behavior Correlation [J]. Computer Science, 2023, 50(5): 348-354. |
[2] | SHAO Zi-hao, YANG Shi-yu, MA Guo-jie. Foundation of Indoor Information Services:A Survey of Low-cost Localization Techniques [J]. Computer Science, 2022, 49(9): 228-235. |
[3] | ZHANG Xue-jun, YANG Hao-ying, LI Zhen, HE Fu-cun, GAI Ji-yang, BAO Jun-da. Differentially Private Location Privacy-preserving Scheme withSemantic Location [J]. Computer Science, 2021, 48(8): 300-308. |
[4] | ZHOU Yi-hua, LI Guang-hui, YANG Yu-guang, SHI Wei-min. Location Privacy Preserving Nearest Neighbor Querying Based on GeoHash [J]. Computer Science, 2019, 46(8): 212-216. |
[5] | WU Zhong-zhong, LV Xin and LI Xin. Query Probability Based Dummy Location Selection Algorithm [J]. Computer Science, 2018, 45(5): 143-146. |
[6] | DONG Yu-lan and PI De-chang. Novel Trajectory Privacy Preserving Mechanism Based on Dummies [J]. Computer Science, 2017, 44(8): 124-128. |
[7] | HU Zhao-wei and YANG Jing. Survey of Trajectory Privacy Preserving Techniques [J]. Computer Science, 2016, 43(4): 16-23. |
[8] | LI Xiang and SUN Hua-zhi. New k-anonymization Algorithm for Preventing Historical Attacks [J]. Computer Science, 2015, 42(8): 194-197. |
[9] | CHEN Ye-gang and XU Ze-tong. Real-time Positioning Algorithm Based on Clustering,Spatial Diversity and Continuous Trajectory [J]. Computer Science, 2015, 42(8): 283-287. |
[10] | LIU Shu-bo, LI Yan-min and LIU Meng-jun. Privacy-preserving for Location-based Service over Encrypted Data Search [J]. Computer Science, 2015, 42(4): 101-105. |
[11] | WANG Peng-fei, LI Qian-mu and ZHU Bao-ping. Location Privacy Protection Method Based on Incremental Nearest Neighbor Query [J]. Computer Science, 2015, 42(3): 158-161. |
[12] | ZHAO Yun-hua, BAI Guang-wei, SHEN Hang, DI Hai-yang and LI Rui-yao. Collaborate Privacy Protection Based on Virtual Tracks in Position Privacy Protection [J]. Computer Science, 2015, 42(10): 147-153. |
[13] | HU Wen-ling and WANG Yong-li. QR-TCM:A Privacy Protection Model with Quality Guarantee for Location-based Services [J]. Computer Science, 2014, 41(4): 95-98. |
[14] | WANG Jia-hui and CHENG Jiu-jun. Spatial Cloaking Algorithm Based on Grid Expansion in P2P Mode [J]. Computer Science, 2014, 41(4): 90-94. |
[15] | CAI Zhao-hui,ZHANG Jian-pei and YANG Jing. Optimized Query Method of Location-based Service with Polymorphic Association Mining [J]. Computer Science, 2014, 41(1): 286-289. |
|