[1] 霍峥, 孟小峰. 轨迹隐私保护技术研究[J]. 计算机学报,2011, 34(10):1820-1830. (HUO Z,MENG X F. A survey of trajectory privacy-preserving techniques[J]. Chinese Journal of Computers, 2011,34(10):1820-1830.) [2] ZHU T,LI G,ZHOU W,et al. Differential Privacy and Applications[M]. Berlin:Springer,2017:151-157. [3] 王璐, 孟小峰. 位置大数据隐私保护研究综述[J]. 软件学报, 2014,25(4):693-712. (WANG L,MENG X F. Location privacy preservation in big data era:a survey[J]. Journal of Software, 2014,25(4):693-712.) [4] CHATZIKOKOLAKIS K,PALAMIDESSI C,STRONATI M. Location privacy via geo-indistinguishability[J]. ACM SIGLOG News, 2015,2(3):46-69. [5] DWORK C. Differential privacy[C]//Proceedings of the 33rd International Conference on Automata,Languages and Programming, LNCS 4052. Berlin:Springer,2006:1-12. [6] 熊平, 朱天清, 王晓峰. 差分隐私保护及其应用[J]. 计算机学报,2014,37(1):101-122. (XIONG P,ZHU T Q,WANG X F. A survey on differential privacy and applications[J]. Chinese Journal of Computers,2014,37(1):101-122.) [7] HO S S,RUAN S. Differential privacy for location pattern mining[C]//Proceedings of the 4th ACM International Workshop on Security and Privacy in GIS and LBS. New York:ACM,2011:17-24. [8] YIN C,XI J,SUN R,et al. Location privacy protection based on differential privacy strategy for big data in industrial Internet of things[J]. IEEE Transactions on Industrial Informatics,2018,14(8):3628-3636. [9] NGO H, KIM J. Location privacy via differential private perturbation of cloaking area[C]//Proceedings of the IEEE 28th Computer Security Foundations Symposium. Piscataway:IEEE, 2015:63-74. [10] DEWRI R. Local differential perturbations:location privacy under approximate knowledge attackers[J]. IEEE Transactions on Mobile Computing,2013,12(12):2360-2372. [11] 张琳, 刘彦, 王汝传. 位置大数据服务中基于差分隐私的数据发布技术[J]. 通信学报,2016,37(9):46-54. (ZHANG L, LIU Y,WANG R C. Location publishing technology based on differential privacy-preserving for big data services[J]. Journal on Communications,2016,37(9):46-54.) [12] ANDRÉS M E,BORDENABE N E,CHATZIKOKOLAKIS K,et al. Geo-indistinguishability:differential privacy for location-based systems[C]//Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security. New York:ACM, 2013:901-914. [13] BORDENABE N E. Measuring privacy with distinguishability metrics:definitions,mechanisms and application to location privacy[D]. Palaiseau:École Polytechnique,2014. [14] CHATZIKOKOLAKIS K,PALAMIDESSI C,STRONATI M. Geoindistinguishability:a principled approach to location privacy[C]//Proceedings of the 11th International Conference on Distributed Computing and Internet Technology,LNCS 8956. Cham:Springer,2015:49-72. [15] BORDENABE N E,CHATZIKOKOLAKIS K,PALAMIDESSI C. Optimal geo-indistinguishable mechanisms for location privacy[C]//Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. New York:ACM, 2014:251-262. [16] HUA J,TONG W,XU F,et al. A geo-indistinguishable location perturbation mechanism for location-based services supporting frequent queries[J]. IEEE Transactions on Information Forensics and Security,2018,13(5):1155-1168. |