Computer Science ›› 2019, Vol. 46 ›› Issue (8): 212-216.doi: 10.11896/j.issn.1002-137X.2019.08.035
• Information Security • Previous Articles Next Articles
ZHOU Yi-hua, LI Guang-hui, YANG Yu-guang, SHI Wei-min
CLC Number:
[1]WANG L,MENG X F.Location privacy preservation in big data era:A survey[J].Journal of Software,2014,25(4):693-712.(in Chinese) 王璐,孟小峰.位置大数据隐私保护研究综述[J].软件学报,2014,25(4):693-712. [2]ZHANG X J,GUI X L,WU Z D.Privacy preservation for location-based services:A survey[J].Journal of Software,2015,26(9):2373-2395.(in Chinese) 张学军,桂小林,伍忠东.位置服务隐私保护研究综述[J].软件学报,2015,26(9):2373-2395. [3]GEDIK B,LIU L.Protecting location privacy with personalized k-anonymity:Architecture and algorithms[J].IEEE Transaction on Mobile Computing,2008,7(1):1-18. [4]GEDIK B,LIU L.A customizable k-anonymity model for protecting location privacy[C]∥Proceedings of the IEEE International conference on Distributed Computing System(ICDS’05).2005:620-629. [5]GKOULALASDIVANIS A,KALNIS P,VERYKIOS V S.Providing K-Anonymity in location based services[M].ACM,2010. [6]BAMBA B,LIU L,PESTI P,et al.Supporting anonymous location queries in mobile environments with privacy grid[C]∥International World Wide Web Conference WWW.2008:237-246. [7]CHOW C Y , MOKBEL M F , LIU X . A peer-to-peer spatial cloaking algorithm for anonymous location-based service∥Acm International Symposium on Advances in Geographic Information Systems. ACM,2006. [8]PARK G G.MobiHide:A Mobilea Peer-to-Peer System for Anonymous Location-Based Queries[M]∥Advances in Spatial and Temporal Databases.DBLP,2007. [9]KIDO H,YANAGISAWA Y,SATOH T.An anonymous communication technique using dummies for location-based services∥ICPS’05. Proceedings. International Conference on Pervasive Services,2005.IEEE,2005. [10]YIU M L,JENSEN C S,HUANG X,et al.SpaceTwist:Managing the Trade-Offs Among Location Privacy,Query Performance,and Query Accuracy in Mobile Services[C]∥IEEE 24th International Conference on Data Engineering,2008.ICDE 2008.IEEE,2008. [11]MOKBEL M F,CHOW C Y,AREF W G.The New Casper:Query Processing for Location Services without Compromising Privacy[C]∥Proceedings of the 32nd International Conference on Very Large Data Bases.Seoul,Korea,2006. [12]KHOSHGOZARAN A,SHAHABI C,SHIRANI-MEHR H. Location privacy:going beyond K-anonymity,cloaking and anonymizers[M].Springer-Verlag New York,Inc.2011. [13]KHOSHGOZARAN A,SHAHABI C.Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy[C]∥SSTD’07 Proceedings of the 10th international conference on Advances in spatial and temporal databases.2007:239-257. [14]GHINITA G,KALNIS P,KHOSHGOZARAN A,et al.Private queries in location based services:Anonymizers are not necessary∥Proceedings of the ACM SIGMOD International Conference on Management of Data.Canada:ACM,2008. |
[1] | WANG Lei, LI Xiao-yu. LBS Mobile Privacy Protection Scheme Based on Random Onion Routing [J]. Computer Science, 2022, 49(9): 347-354. |
[2] | NIE Xiu-shan, PAN Jia-nan, TAN Zhi-fang, LIU Xin-fang, GUO Jie, YIN Yi-long. Overview of Natural Language Video Localization [J]. Computer Science, 2022, 49(9): 111-122. |
[3] | ZHU Cheng-zhang, HUANG Jia-er, XIAO Ya-long, WANG Han, ZOU Bei-ji. Deep Hash Retrieval Algorithm for Medical Images Based on Attention Mechanism [J]. Computer Science, 2022, 49(8): 113-119. |
[4] | YU Jia-qi, KANG Xiao-dong, BAI Cheng-cheng, LIU Han-qing. New Text Retrieval Model of Chinese Electronic Medical Records [J]. Computer Science, 2022, 49(6A): 32-38. |
[5] | HAN Hong-qi, RAN Ya-xin, ZHANG Yun-liang, GUI Jie, GAO Xiong, YI Meng-lin. Study on Cross-media Information Retrieval Based on Common Subspace Classification Learning [J]. Computer Science, 2022, 49(5): 33-42. |
[6] | ZHANG Xin-feng, SONG Bo. A Person Re-identification Method Based on Improved Triple Loss and Feature Fusion [J]. Computer Science, 2021, 48(9): 146-152. |
[7] | LIU Li-bo, GOU Ting-ting. Cross-modal Retrieval Combining Deep Canonical Correlation Analysis and Adversarial Learning [J]. Computer Science, 2021, 48(9): 200-207. |
[8] | YANG Hui-min, MA Ting-huai. Compound Conversation Model Combining Retrieval and Generation [J]. Computer Science, 2021, 48(8): 234-239. |
[9] | ZHANG Xue-jun, YANG Hao-ying, LI Zhen, HE Fu-cun, GAI Ji-yang, BAO Jun-da. Differentially Private Location Privacy-preserving Scheme withSemantic Location [J]. Computer Science, 2021, 48(8): 300-308. |
[10] | FENG Xia, HU Zhi-yi, LIU Cai-hua. Survey of Research Progress on Cross-modal Retrieval [J]. Computer Science, 2021, 48(8): 13-23. |
[11] | WANG Chun-jing, LIU Li, TAN Yan-yan, ZHANG Hua-xiang. Image Retrieval Method Based on Fuzzy Color Features and Fuzzy Smiliarity [J]. Computer Science, 2021, 48(8): 191-199. |
[12] | SUN Sheng-zi, GUO Bing-hui , YANG Xiao-bo. Embedding Consensus Autoencoder for Cross-modal Semantic Analysis [J]. Computer Science, 2021, 48(7): 93-98. |
[13] | WANG Hui, ZHU Guo-yu, SHEN Zi-hao, LIU Kun, LIU Pei-qian. Dummy Location Generation Method Based on User Preference and Location Distribution [J]. Computer Science, 2021, 48(7): 164-171. |
[14] | FENG Jiao, LU Chang-yu. Cross Media Retrieval Method Based on Residual Attention Network [J]. Computer Science, 2021, 48(6A): 122-126. |
[15] | LUO Jing-jing, TANG Wei-zhen, DING Ji-ting. Research of ATC Simulator Training Values Independence Based on Pearson Correlation Coefficient and Study of Data Visualization Based on Factor Analysis [J]. Computer Science, 2021, 48(6A): 623-628. |
|