1. DOBSON J E, FISHER PF. Geoslavery [J]. IEEE Technology and Society Magazine, 2003, 22:47–52.
2. NIELSEN. Privacy please! U.S. smartphone app users concerned with privacy when it comes to location [OL]. http://www.prepaidmvno.com/2011/04/21/privacy-please-u-s-smartphone-app-users-concerned-with-privacy-when-it-comes-to-location-nielsen/.[2013-11].
3. TERROVITIS M., LIAGOURIS J., MAMOULIS N., SKIADOPOULOS S. Privacy preservation by disassociation [J]. Proceedings of the VLDB endowment (PVLDB), 2012, 5(10): 944-955.
4. HUO Z., MENG X., ZHANG R. Feel free to check-in: privacy alert against hidden location inference attacks in GeoSNs[C]. Proceedings of 18th International Conference on Database Systems for Advanced Applications (DASFAA) 2013: 377-391.
5. PAN X, MENG X. Location privacy preserving without exact locations in mobile Services [J]. Frontiers of Computer Science, 2013, 7(3): 317-340.
6. PAN X., XU J., MENG X. Protecting location privacy against Location-Dependent Attacks in Mobile Services [J]. IEEE Transaction Knowledge Data Engineer, 2012: 24(8): 1506-1519.
7. HUO Z., MENG X., HU H., HUANG Y. You can walk alone: trajectory privacy-preserving through significant stays protection[C]. Proceedings of 17th International Conference on Database Systems for Advanced Applications (DASFAA). 2012: 351-366.
8. LEE B, OH J, YU H, and et al. Protecting location privacy using location semantics[C]. Proceedings. of the 17th ACM International Conference on Knowledge Discovery and Data mining (SIGKDD). New York:ACM, 2011: 1289-1297.
9. XIAO Z, XU J, MENG X. P-sensitivity: a semantic privacy-protection model for location-based services[C]. Proceedings of 2nd Int Workshop on Privacy-Aware Location-based Mobile Services(PALMS). Beijing,China, 2008:47–54.
10. 薛姣, 刘向宇, 杨晓春,王斌.一种面向公路网络的位置隐私保护方法[J].计算机学报. 2011, 34(5):865-878.
Xue J, Liu XY, Yang XC, Wang B. A location privacy preserving approach on road network [J]. Chinese Journal of Computers. 2011, 34(5):865-878
11. 彭志宇, 李善平. 移动环境下LBS位置隐私保护[J]. 电子与信息学报, 2011, 33(5): 1211-1216.
PENG ZY, LI SP. Protecting location privacy in location-based services in mobile environments. Journal of Electronics & Information Technology[J], 2011, 33(5): 1211-1216.
12. MACHANAVAJJHALA A, GEHRKE J, KIFER D, AND VENKITASUBRAMANIAM M. l-diversity: Privacy beyond k-anonymity [C]. Proceedings. of the 22nd IEEE International Conference on Data Engineering (ICDE). 2006:24–35.
13. ROUSSOPOULOS N, KELLEY S, AND VINCENT F. Nearest neighbor queries [C]. Proceedings Of the International Conference on Management of data (ACM SIGMOD), San Jose, California, 1995: 71-79.
14. THOMAS BRINKHOFF. Thomas Brinkhoff Network-based Generator of Moving Objects [OL]. http://www.fh-oow.de/institute/iapg/personen/brinkhoff/generator/. [2012-5].
15. R-tree portal. Trucks data [OL], http://www.chorochronos.org/?q=node/5, [2012-6].
|