[1] 万盛,李凤华,牛犇,等. 位置隐私保护技术研究进展[J]. 通信学报, 2016, 37(12):124-141. (WAN S, LI F H, NIU B, et al. Research progress on location privacy-preserving techniques[J]. Journal on Communications, 2016, 37(12):124-141.) [2] GRUTESER M, GRUNWALD D. Anonymous usage of location-based services through spatial a temporal cloaking[C]//Proceedings of the 2003 International Conference on Mobile Systems, Applications and Services. New York:ACM, 2003:31-42. [3] CHOW C Y, MOKBEL M, AREF W G. Casper*:query processing for location services without compromising privacy[J]. ACM Transactions on Database Systems, 2009, 34(4):No.24. [4] BERESFORD A R, STAJANO F. Mix zones:user privacy in location-aware services[C]//Proceedings of the 2nd IEEE Annual Conference on Pervasive Computing and Communications Workshops. Piscataway:IEEE, 2004:127-131. [5] HOH B, GRUTESER M. Protecting location privacy through path confusion[C]//Proceedings of the 1st International Conference on Security and Privacy for Emerging Areas in Communications Networks. Piscataway:IEEE, 2015:194-205. [6] HONG J I, LANDAY J A. An architecture for privacy-sensitive ubiquitous computing[C]//Proceedings of the 2nd International Conference on Mobile Systems, Applications, and Services. New York:ACM, 2004:177-189. [7] JUNG K,JO S, PARK S. A game theoretic approach for collaborative caching techniques in privacy preserving location-based services[C]//Proceedings of the 2015 International Conference on Big Data and Smart Computing. Washington, DC:IEEE Computer Society, 2015, 1:59-62. [8] YIU M L, JENSEN C S, HUANG X, et al. SpaceTwist:managing the trade-offs among location privacy, query performance, and query accuracy in mobile services[C]//Proceedings of the 24th International Conference on Data Engineering. Piscataway:IEEE, 2008:366-375. [9] SUN R, XIANG G, GAO Q, et al. A study of location privacy protection about k interesting points query based on double anchors[C]//Proceedings of the 2018 Ubiquitous Positioning, Indoor Navigation and Location-Based Services. Piscataway:IEEE, 2018:1-7. [10] ZHOU C, MA C, YANG S, et al. A location privacy preserving method based on sensitive diversity for LBS[C]//Proceedings of the 11th IFIP International Conference on Network and Parallel Computing, LNCS 8707. Berlin:Springer, 2014:409-422. [11] ANDRÉS M E, BORDENABE N E, CHATZIKOKOLAKIS K, et al. Geo-indistinguishability:differential privacy for location-based systems[C]//Proceedings of the 2013 ACM Conference on Computer and Communications Security. New York:ACM, 2013:901-914. [12] 罗惠雯,龙士工. 基于用户感兴趣区域的地理不可区分性的位置扰动算法[J]. 计算机应用,2020,40(3):760-764. (LUO H W, LONG S G. Location perturbation algorithm based on geo-indistinguishability of user's region of interest[J]. Journal of Computer Applications, 2020, 40(3):760-764.) [13] DWORK C, KENTHAPADI K, MCSHERRY F, et al. Our data, ourselves:privacy via distributed noise generation[C]//Proceedings of the 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, LNCS 4004. Berlin:Springer, 2006:486-503. [14] DWORK C, MCSHERRY F, NISSIM K, et al. Calibrating noise to sensitivity in private data analysis[C]//Proceedings of the 3rd Theory of Cryptography Conference, LNCS 3876. Berlin:Springer, 2006:265-284. [15] ZHANG Z, SUN R, ZHAO C, et al. CyVOD:a novel trinity multimedia social network scheme[J]. Multimedia Tools and Applications, 2016, 76(18):18513-18529. |