Computer Science ›› 2016, Vol. 43 ›› Issue (4): 16-23.doi: 10.11896/j.issn.1002-137X.2016.04.003
Previous Articles Next Articles
HU Zhao-wei and YANG Jing
[1] Chow C Y,Mokbel M F,Liu Xuan.Spatial Cloaking for Anonymous Location-based Services in Mobile Peer-to-Peer Environments[J].GeoInformatica,2011,15(2):351-380 [2] Lee K C K,Zheng Bai-hua,Chen C,et al.Efficient Index-Based Approaches for Skyline Queries in Location-Based Applications[J].IEEE Transactions on Knowledge and Data Engineering (IEEE TKDE),2013,25(11):2507-2520 [3] Chow C-Y,Mokbel M,He T.A privacy preserving location monitoring system for wireless sensor networks[J].IEEE Transactions on Mobile Computing,2011,10(1):94-107 [4] Huo Zheng,Meng Xiao-feng.A Survey of Trajectory Privacy-Preserving Techniques[J].Chinese Journal of Computers,2011,34(10):1820-1830(in Chinese) 霍峥,孟小峰.轨迹隐私保护技术研究[J].计算机学报,2011,34(10):1820-1830 [5] Aslam B,Amjad F.PMTR:Privacy-enhancing Multilayer Tra-jectory-based Routing Protocol for Vehicular ad hoc Networks[C]∥Proceedings of the 2013 IEEE Military Communications Conference.2013:882-887 [6] Mano K,Minami K.Privacy-preserving Publishing of Pseudonym-based Trajectory Location Data Set[C]∥Proceedings of the 2013 International Conference on Availability,Reliability and Security.2013:615-624 [7] Yigitoglu E,Damiani M L.Privacy-preserving sharing of sensitive semantic locations under road-network constraints[C]∥Proceedings of the 2012 IEEE 13th International Conference on Mobile Data Management.2012:186-195 [8] Gao Sheng,Ma Jian-feng.Balancing trajectory privacy and data utility using a personalized anonymization model[J].Journal of Network and Computer Applications,2014,8(1):125-134 [9] Chen Rui,Fung B C M.Privacy-preserving trajectory data publishing by local suppression[J].Information Sciences,2013,231(1):83-97 [10] Sui Pei-pei,Wo Tian-yu.Privacy-Preserving Trajectory Publica-tion Against Parking Point Attacks[C]∥2013 IEEE 10th International Conference on Ubiquitous Intelligence & Computing and 2013 IEEE 10th International Conference on Autonomic & Trusted Computing.2013:569-575 [11] Ghasemzadeh M,Fung B C M.Anonymizing trajectory data for passenger flow analysis[J].Transportation Research Part C,2014,39(2):63-79 [12] Kaplan E,Pedersen T B.Discovering private trajectories usingbackground information[J].Data & Knowledge Engineering,2010,69(7):723-736 [13] Sanchez D,Castella-Roca J,Viejo A.Knowledge-Based Scheme to Create Privacy-Preserving but Semantically-Related Queries for Web Search Engines[J].Information Sciences,2013,218(1):17-30 [14] Tramp S,Frischmuth P,Arndt N.Weaving a Distributed,Se-mantic Social Network for Mobile Users[C]∥8th Extended Semantic Web Conference.2011:200-214 [15] Rowe M.Applying semantic social graphs to disambiguate identity references[C]∥6th European Semantic Web Conference.2009:461-475 [16] Ferrer J D,Rasua R T.Microaggregation and permutation-based anonymization of movement data[J].Information Sciences,2012,208(21):55-80 [17] Zhou Li-na,Li Ding,Finin T.How is the semantic web evolving? A dynamic social network perspective [J].Computers in Human Behavior,2011,27(4):1294-1302 [18] Riboni D,Pareschi L,Bettini C.Shadow attacks on users’ anonymity in pervasive computing environments[J].Pervasive and Mobile Computing,2008,4(6):819-835 [19] Sun X,Sun L,Wang H.Extended k-anonymity models againstsensitive attribute disclosure[J].Computer Communications,2011,4(4):526-535 [20] Bonchi F,Lakshmanan L V,Wang H W.Trajectory anonymity in publishing personal mobility data[J].SIGKDD Explorations Newsletter,2011,13(1):30-42 [21] Poulis G,Skiadopoulos S.Distance-based km-anonymization oftrajectory data[C]∥Proceedings of the 2013 IEEE 14th International Conference on Mobile Data Management.2013:57-62 [22] Huo Zheng,Meng Xiao-feng,Huang Yi.PrivateCheckIn:Trajectory Privacy-Preserving for Check-In Services in MSNS[J].Chinese Journal of Computers,2013,36(4):716-725(in Chinese) 霍峥,孟小峰,黄毅.PrivateCheckIn:一种移动社交网络中的轨迹隐私保护方法[J].计算机学报,2013,36(4):716-725 [23] Geng Ji.Trajectory Privacy Protection Starategy Based on Semantic Anonymity Proxy[J].Computer Applications and Software,2014,31(7):307-310(in Chinese) 耿技.基于语义匿名代理的轨迹隐私保护方法[J].计算机应用与软件,2014,31(7):307-310 [24] Guo Xu-dong,Wu Ying-jie,Yang Wen-jin.l-diversity algorithm for privacy preserving tra-jectory data publishing[J].Computer Engineering and Applications,2015,51(2):125-130(in Chinese) 郭旭东,吴英杰,杨文进.隐私保护轨迹数据发布的l-差异性算法[J].计算机工程与应用,2015,51(2):125-130 [25] Hwang R H,Hsueh Y-L.A Novel Time-Obfuscated Algorithm for Trajectory Privacy[J].Proceedings of the 2012 International Symposium on Pervasive Systems,Algorithms and Networks.2012:208-215 [26] Weng Guo-qing.A perturbation-based privacy preserving trajectory publication method[J].Journal of Southeast University (Natural Science Edition),2014,44(1):51-57(in Chinese) 翁国庆.一种基于扰动的轨迹数据隐藏发布方法[J].东南大学学报(自然科学版),2014,44(1):51-57 [27] Zhao Jing,Zhang Yuan,Li Xing-hua.A Trajectory Privacy Protection Approach via Trajectory Frequency Suppression[J].Chinese Journal of Computers,2014,37(10):2096-2106(in Chinese) 赵婧,张渊,李兴华.基于轨迹频率抑制的轨迹隐私保护方法[J].计算机学报,2014,37(10):2096-2106 [28] Gao Sheng,Ma Jian-feng.TrPF:A Trajectory Privacy-Preser-ving Framework for Participatory Sensing[J].IEEE Transactions on Information Forensics and Security,2013,8(6):874-887 [29] Feng Yun-xia,Liu Peng.A Mobile Terminal Based TrajectoryPreserving Strategy for Continuous Querying LBS Users[C]∥Proceedings of the 2012 8th IEEE International Conference on Distributed Computing in Sensor Systems.2012:92-98 [30] Wu Ying-jie.A Clustering Hybrid Based Algorithm for Privacy Preserving Trajectory Data Publishing[J].Journal of Computer Research and Development,2013,50(3):578-593(in Chinese) 吴英杰.基于聚类杂交的隐私保护轨迹数据发布算法[J].计算机研究与发展,2013,50(3):578-593 [31] Cao J N,Karras P,Kalins P,et al.SABRE:a Sensitive Attribute Bucketization and REdistribution framework for t-closeness[J].The VLDB Journal,2011,0(1):50-81 [32] Sweeney L.K-anonymity:a model for protecting privacy[J].International Journal on Uncertainty,Fuzziness and Knowledge-based Systems,2002,10(5):557-570 [33] Gruteser M,Grunwald D.Anonymous usage of location-based services through spatial and temporal cloaking[C]∥Proceedings of the International Conference on Mobile System,Applications and Services.San Francisco,USA,2003:163-168 [34] Terrovitis M,Mamoulis N,Kalnis P.Local and global recoding methods for anonymizing set-valued data[J].VLDB J,2011,0(1):83-106 [35] Chow C Y,Mokbel M F,Liu X.A Peer-to-Peer Spatial Cloaking Algorithm for Anonymous Location-based Services[C]∥ACM International Symposium on Advances in Geographic Information Systems.New York,ACM Press,2006 [36] Beresford A R,Stajano F.Mix zones:user privacy in location-aware Services[C]∥Proceedings of the 2th IEEE Annual Confe-rence on Pervasive Computing and Communications Workshops.2004:127-131 [37] Machanavajjhala A,Gehrke J,Kifer D,et al.L-Diversity:Privacy Beyond k-Anonymity[C]∥Proceedings of the 22nd InternationalConference on Dat Engineering,2006.Atlanta,GA,USA,2006:24 [38] Pingley N,Zhang Z,Fu X,et al.Protection of Query Privacy for Continuous Location Based Services[C]∥Proc.IEEE INFOCOM.2011:1710-1718 [39] Shokri R,Theodorakopoulos G,Troncoso C,et al.ProtectingLocation Privacy:Optimal Strategy Against Localization Attacks[C]∥Proceeding ACM Conference Computer Communcations Security.2012:617-627 [40] Yao L,Lin C,Kong X,et al.A Clustering-Based Location Privacy Protection Scheme for Pervasive Computing[C]∥Proc.CoRR.2010:719-726 [41] Meng Xiao-feng,Zhang Xiao-jian.Big Data Privacy Management[J].Journal of Computer Research and Develoment,2015,2(2):3-18(in Chinese) 孟小峰,张啸剑.大数据隐私管理[J].计算机研究与发展,2015,2(2):3-18 |
No related articles found! |
|