[1] KRUMM J. Inference attacks on location tracks[C]//Proceedings of the 5th International Conference on Pervasive Computing, LNCS 4480. Berlin: Springer, 2007: 127-143. [2] SWEENEY L. k-anonymity: a model for protecting privacy[J]. International Journal of Uncertainty Fuzziness and Knowledge-Based Systems, 2012, 10(5): 557-570. [3] GRUTESER M, GRUNWALD D. Anonymous usage of location-based services through spatial and temporal cloaking[C]//Proceedings of the 1st International Conference on Mobile Systems, Applications and Services. New York: ACM, 2003: 31-42. [4] 霍峥,孟小峰.轨迹隐私保护技术研究[J].计算机学报,2011,34(10):1820-1830. (HUO Z, MENG X F. A survey of trajectory privacy-preserving techniques[J]. Chinese Journal of Computers, 2011, 34(10): 1820-1830.) [5] MACHANAVAJJHALA A, KIFER D, GEHRKE J, et al. l-diversity: privacy beyond k-anonymity[J]. ACM Transactions on Knowledge Discovery from Data, 2007, 1(1): Article No. 3. [6] LUPER D, CAMERON D, MILLER J, et al. Spatial and temporal target association through semantic analysis and GPS data mining[C]//IKE 2007: Proceedings of the 2007 International Conference on Information & Knowledge Engineering. Las Vegas:[s.n.]. 2007: 251-257. [7] TERROVITIS M, MAMOULIS N. Privacy preservation in the publication of trajectories[C]//MDM'08: Proceedings of the 2008 IEEE 9th International Conference on Mobile Data Management. Washington, DC: IEEE Computer Society, 2008: 65-72. [8] GRUTESER M, LIU X. Protecting privacy, in continuous location-tracking applications[J]. IEEE Security & Privacy Magazine, 2004, 2(2): 28-34. [9] NERGIZ M E, ATZORI M, SAYGIN Y. Towards trajectory anonymization: a generalization-based approach[C]//Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS. New York: ACM, 2008: 52-61. [10] NERGIZ M E, ATZORI M, SAYGIN Y. Towards trajectory anonymization: a generalization-based approach[C]//SPRINGL 2008: Proceedings of the 2008 SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS. New York: ACM, 2008: 52-61. [11] ABUL O, BONCHI F, NANNI M. Never walk alone: uncertainty for anonymity in moving objects databases[C]//ICDE 2008: Proceedings of the 2008 IEEE 24th International Conference on Data Engineering. Piscataway, NJ: IEEE, 2008: 376-385. [12] ABUL O, BONCHI F, NANNI M. Anonymization of moving objects databases by clustering and perturbation[J]. Information Systems, 2010, 35(8): 884-910. [13] CHEN L, ÖZSU M T, ORIA V. Robust and fast similarity search for moving object trajectories[C]//Proceedings of the 2005 ACM SIGMOD International Conference on Management of Data. New York: ACM, 2005: 491-502. [14] YAROVOY R, BONCHI F, LAKSHMANAN L V S, et al. Anonymizing moving objects: how to hide a MOB in a crowd?[C]//Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology. New York: ACM, 2009: 72-83. [15] ANDRIENKO G, ANDRIENKO N, GIANNOTTI F, et al. Movement data anonymity through generalization[C]//Proceedings of the 2nd SIGSPATIAL ACM GIS 2009 International Workshop on Security and Privacy in GIS and LBS. New York: ACM, 2009: 27-31. [16] 王超,杨静,张健沛.基于轨迹位置形状相似性的隐私保护算法[J].通信学报,2015,36(2):144-157. (WANG C, YANG J, ZHANG J P. Privacy preserving algorithm based on trajectory location and shape similarity[J]. Journal on Communications, 2015, 36(2): 144-157.) [17] HUO Z, HUANG Y, MENG X F. History trajectory privacy-preserving through graph partition[C]//Proceedings of the 1st International Workshop on Mobile Location-Based Service. New York: ACM, 2011: 71-78. [18] GAO S, MA J, SUN C, et al. Balancing trajectory privacy and data utility using a personalized anonymization model[J]. Journal of Network & Computer Applications, 2014, 38(1): 125-134. [19] 杨静,张冰,张健沛,等.基于图划分的个性化轨迹隐私保护方法[J].通信学报,2015,36(3):1-11.(YANG J, ZHANG B, ZHANG J P, et al. Personalized trajectory privacy preserving method based on graph partition[J]. Journal on Communications, 2015, 36(3): 1-11.) [20] HUO Z, Meng X F, HU H B, et al. You can walk alone: trajectory privacy-preserving through significant stays protection[C]//Proceedings of the 17th International Conference on Database Systems for Advanced Applications, LNCS 7238. Berlin: Springer, 2012:351-366. [21] DOMINGO-FERRER J, TRUJILLO-RASUA R. Microaggregation- and permutation-based anonymization of movement data[J]. Information Sciences, 2012, 208: 55-80. [22] 吴英杰,唐庆明,倪巍伟,等.基于聚类杂交的隐私保护轨迹数据发布算法[J].计算机研究与发展,2013,50(3):578-593.(WU Y J, TANG Q M, NI W W, et al. A clustering hybrid based algorithm for privacy preserving trajectory data publishing[J]. Journal of Computer Research and Development, 2013, 50(3): 578-593.) [23] 王波,杨静.一种基于逆聚类的个性化隐私匿名方法[J].电子学报,2012,40(5):883-890.(WANG B, YANG J. A personalized privacy anonymous method based on inverse clustering[J]. Acta Electronica Sinica, 2012, 40(5): 883-890.) [24] 郭旭东,吴英杰,杨文进,等.隐私保护轨迹数据发布的l-差异性算法[J].计算机工程与应用,2015,51(2):125-130.(GUO X D, WU Y J, YANG W J, et al. l-diversity algorithm for privacy preserving trajectory data publishing[J]. Computer Engineering and Applications, 2015,51(2): 125-130.) [25] 袁冠,夏士雄,张磊,等.基于结构相似度的轨迹聚类算法[J].通信学报,2011,32(9):103-110.(YUAN G, XIA S X, ZHANG L, et al. Trajectory clustering algorithm based on structural similarity[J]. Journal on Communications, 2011, 32(9): 103-110.) [26] CHOW C Y, MOKBEL M F. Trajectory privacy in location-based services and data publication[J]. ACM SIGKDD Explorations Newsletter, 2011, 13(1): 19-29. [27] XIAO X, YI K, TAO Y. The hardness and approximation algorithms for l-diversity[C]//Proceedings of the 13th International Conference on Extending Database Technology. New York: ACM, 2010: 135-146. [28] BRINKHOFF T. A framework for generating network-based moving objects[J]. GeoInformatica, 2002, 6(2): 153-180. |