|
[1]
|
Zhang, S.B., Mao, X.J., Choo, K.K.R., Peng, T. and Wang, G.J. (2020) A Trajectory Privacy-Preserving Scheme Based on a Dual-K Mechanism for Continuous Location-Based Services. Information Sciences, 527, 406-419. [Google Scholar] [CrossRef]
|
|
[2]
|
Feng, Z.N. and Zhu, Y.M. (2017) A Survey on Trajectory Data Mining: Techniques and Applications. IEEE Access, 4, 2056-2067. [Google Scholar] [CrossRef]
|
|
[3]
|
Guo, L.M., Huang, G.Y., Gao, X., He, J., Wu, B. and Guo, H.M. (2015) DoSTra: Discovering Common Behaviors of Objects Using the Duration of Staying on Each Location of Trajectories. Radiation Research, 161, 137-142.
|
|
[4]
|
Huang, G.Y., He, J., Zhou, W.L., et al. (2016) Discovery of Stop Regions for Understanding Repeat Travel Behaviors of Moving Objects. Journal of Computer & System Sciences, 82, 582-593. [Google Scholar] [CrossRef]
|
|
[5]
|
Shen, Y., Zhao, L.G. and Fan, J. (2015) Analysis and Visualization for Hot Spot Based Route Recommendation Using Short-Dated Taxi GPS Traces. Information, 6, 134-151. [Google Scholar] [CrossRef]
|
|
[6]
|
Chun-Guang, M.A., Zhang, L. and Yang, S.T. (2015) Review on Location Trajectory Privacy Protection. Netinfo Security, 10, 24-31.
|
|
[7]
|
Wernke, M., Skvortsov, P., Duerr, F., et al. (2014) A Classification of Location Privacy Attacks and Approaches. Personal & Ubiquitous Computing, 18, 163-175. [Google Scholar] [CrossRef]
|
|
[8]
|
霍峥, 孟小峰. 轨迹隐私保护技术研究[J]. 计算机学报, 2011, 34(10): 1820-1830.
|
|
[9]
|
雷凯跃, 李兴华, 刘海, 裴卓雄, 马建峰, 李晖. 轨迹发布中基于时空关联性的假轨迹隐私保护方案[J]. 通信学报, 2016, 37(12): 156-164.
|
|
[10]
|
Gruteser, M. and Grunwald, D. (2003) Anonymous Usage of Location-Based Services through Spatial and Temporal Cloaking. Proceedings of the 1st International Conference on Mobile Systems, Applications and Services, San Francisco, 5-8 May 2003, 31-42. [Google Scholar] [CrossRef]
|
|
[11]
|
Abul, O., Bonchi, F. and Nanni, M. (2008) Never Walk Alone: Uncertainty for Anonymity in Moving Objects Databases. 2008 IEEE 24th International Conference on Data Engi-neering, Cancun, 7-12 April 2008, 376-385. [Google Scholar] [CrossRef]
|
|
[12]
|
Poulis, G., Skiadopoulos, S., Loukides, G. and Gkou-lalas-Divanis, A. (2013) Distance-Based k^m-Anonymization of Trajectory Data. 2013 IEEE 14th International Con-ference on Mobile Data Management, Milan, 3-6 June 2013, 57-62. [Google Scholar] [CrossRef]
|
|
[13]
|
Wu, X.C. and Sun, G.Z. (2015) A Novel Dummy-Based Mechanism to Protect Privacy on Trajectories. 2014 IEEE International Conference on Data Mining Workshop, Shenzhen, 14 De-cember 2014, 1120-1125. [Google Scholar] [CrossRef]
|
|
[14]
|
雷凯跃, 李兴华, 刘海, 裴卓雄, 马建峰, 李晖. 轨迹发布中基于时空关联性的假轨迹隐私保护方案[J]. 通信学报, 2016, 37(12): 156-164.
|
|
[15]
|
Terrovitis, M., Poulis, G., Mamoulis, N., et al. (2017) Local Suppression and Splitting Techniques for Privacy Preserving Publication of Trajec-tories. IEEE Transactions on Knowledge & Data Engineering, 29, 1466-1479. [Google Scholar] [CrossRef]
|
|
[16]
|
刘向宇, 陈金梅, 夏秀峰, Singh, M., 宗传玉, 朱睿. 防止暴露位置攻击的轨迹隐私保护[J]. 计算机应用, 2020, 40(2): 479-485.
|
|
[17]
|
Zhao, Y.N., Luo, Y.L., Yu, Q.Y., et al. (2020) A Privacy-Preserving Trajectory Publication Method Based on Secure Start-Points and End-Points. Mobile In-formation Systems, 2020, Article ID: 3429256. [Google Scholar] [CrossRef]
|
|
[18]
|
许华杰, 吴青华, 胡小明. 基于轨迹多特性的隐私保护算法[J]. 计算机科学, 2019, 46(1): 190-195.
|
|
[19]
|
陈传明, 林文诗, 俞庆英, 罗永龙. 一种基于单点收益的轨迹隐私保护方法[J]. 电子学报, 2020, 48(1): 143-152.
|