[1] HUO Z, MENG X. A survey of trajectory privacy-preserving techniques[J]. Chinese Journal of Computers, 2011, 34(10):1820-1830.(霍峥,孟小峰.轨迹隐私保护技术研究[J].计算机学报, 2011,34(10):1820-1830) [2] SWEENEY L. K-anonymity:a model for protecting privacy[J]. International Journal on Uncertainty, Fuzziness and Knowledge-based System, 2002, 10(5):557-570. [3] GAO S, MA J, SUN C, et al. Balancing trajectory privacy and data utility using a personalized anonymization model[J]. Journal of Network and Computer Applications, 2014, 38(1):125-134. [4] LEE C, YIN L-H, DONG L. A modified k-anonymity towards spatial-temporal historical data in location-based social network service[C]//Proceedings of the APWeb 2014 Workshops on Web Technologies and Applications, LNCS 8710. Berlin:Springer, 2014:301-311. [5] NERGIZ M E, ATZORI M, SAYGIN Y, et al. Towards trajectory anonymization:a generalization-based approach[J]. Transactions on Data Privacy, 2009, 2(1):47-75. [6] ZHOU B, PEI J. The k-anonymity and l-diversity approaches for privacy preservation in social networks against neighborhood attacks[J]. Knowledge and Information Systems, 2011, 28(1):47-77. [7] SHIN H, VAIDYA J, ATLURI V, et al. Ensuring privacy and security for LBS through trajectory partitioning[C]//Proceedings of the 11th International Conference on Mobile Data Management. Piscataway:IEEE, 2010:224-226. [8] TRUJILLO-RASUA R, DOMINGO-FERRER J. Privacy in spatio-temporal databases:a microaggregation-based approach[M]//Advanced Research in Data Privacy, Studies in Computational Intelligence. Zurich:Springer International Publishing, 2015, 567:197-214. [9] TRAJCEVSKI G, WOLFSON O, HINRICHS K, et al. Managing uncertainty in moving objects databases[J]. ACM Transactions on Database Systems, 2004, 29(3):463-507. [10] JEH G, WIDOM J. SimRank:a measure of structural-context similarity[C]//Proceedings of the 8th ACM SIGKDD Internet Conference on Knowledge discovery and Data Mining. New York:ACM, 2002:538-543. [11] TRUJILLO-RASUA R, DOMINGO-FERRER J. On the privacy offered by (k,δ)-anonymity[J]. Information Systems, 2014, 38(4):491-494. [12] AI-HUSSAENI K, FUNG B C M, CHEUNG W K. Privacy-preserving trajectory stream publishing[J]. Data & Knowledge Engineering, 2014, 94:89-109. [13] HAO Z. The theoretical basis of spatial database[M]. Beijing:Sicence Press, 2013:52-54. (郝忠孝.空间数据库理论基础[M].北京:科学出版社,2013:52-54.) [14] FREDRIKSSON K, BRAITHWAITE B. Quicker range and KNN joins in metric spaces[J]. Information Systems, 2015, 52:189-204. [15] ABUL O, BONCHIF, NANNI M. Never walk alone:uncertainty for anonymity in moving objects databases[C]//Proceedings of the 24th IEEE International Conference on Data Engineering. Piscataway:IEEE, 2008:215-226. [16] BAYARDO R J, AGRAWAL R. Data privacy through optimal k-anonymity[C]//Proceedings of the 21st IEEE International Conference on Data Engineering. Piscataway:IEEE, 2005:217-228. |