[1] ZHENG Y. Trajectory data mining:an overview[J]. ACM Transactions on Intelligent Systems and Technology, 2015, 6(3):1-41. [2] PARENT C, SPACCAPICTRA S, RENSO C, et al. Semantic trajectories modeling and analysis[J]. ACM Computing Surveys, 2013, 45(4):42. [3] DAI J, HUA L. A method for the trajectory privacy protection based on the segmented fake trajectory under road networks[C]//Proceedings of the 2nd International Conference on Information Science and Control Engineering. Piscataway, NJ:IEEE, 2015:13-17. [4] 赵婧,张渊,李兴华,等.基于轨迹频率抑制的轨迹隐私保护方法[J].计算机学报,2014,37(10):2096-2106.(ZHAO J, ZHANG Y, LI X H, et al. A trajectory privacy protection approach via trajectory frequency suppression[J]. Chinese Journal of Computers, 2014, 37(10):2096-2196.) [5] HUO Z, MENG X, HU H, et al. You can walk alone:trajectory privacy-preserving through significant stays protection[C]//Proceedings of the 17th International Conference on Database Systems for Advanced Applications. Berlin:Springer, 2012:351-366. [6] CAI Z F, YANG H X, SHUANH W, et al. A clustering-based privacy-preserving method for uncertain trajectory data[C]//Proceedings of the 2014 International Conference on Trust, Security and Privacy in Computing and Communications. Piscataway, NJ:IEEE, 2014:1-8. [7] ABUL O. BONCHI F. NANNI M. Anonymization of moving objects databases by clustering and perturbation[J]. Information Systems, 2010, 35(8):884-910. [8] 霍峥,孟小峰,黄毅.PrivateCheckIn:一种移动社交网络中的轨迹隐私保护方法[J].计算机学报,2013:36(4):716-726.(HUO Z, MENG X F, HUANG Y. PrivateCheckIn:trajectory privacy-preserving for check-in services in MSNS[J]. Chinese Journal of Computers, 2013, 36(4):716-726.) [9] HUA J, GAO Y, ZHONG S. Differentially private publication of general time-serial trajectory data[C]//Proceedings of the 2015 IEEE Conference on Computer Communications. Piscataway, NJ:IEEE, 2015:549-557. [10] PAN X, XU J, MENG X. Protecting location privacy against location-dependent attacks in mobile services[J]. IEEE Transactions on Knowledge and Data Engineering, 2012, 24(8):1506-1519. [11] CHOI T Y. A linear-time heuristic algorithm for k-way network partitioning[J]. Journal of the Korea Safety Management and Science, 2004, 7(8):1183-1194. [12] YAROVOY R, BONCHI F, LAKSHMANAN L, et al. Anonymizing moving objects:how to hide a MOB in a crowd?[C]//Proceedings of the 12th International Conference on Extending Database Technology:Advances in Database Technology. New York:ACM, 2009:72-83. [13] CHEN R, LI H, QIN K A, et al. Private spatial data aggregation in local setting[C]//Proceedings of the 32nd IEEE International Conference on Data Engineering. Piscataway, NJ:IEEE, 2016:289-300. [14] SU S, TANG P, CHENG X, et al. Differentially private multi-party high-dimensional data publishing[C]//Proceedings of the 2016 International Conference on Data Engineering. Piscataway, NJ:IEEE, 2016:205-216. [15] QIN Z, YANG Y, YU T, et al. Heavy hitter estimation over set-valued data with local differential privacy[C]//Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. New York:ACM, 2016:192-203. [16] 孟小峰,张啸剑.大数据隐私管理[J].计算机研究与发展,2016,52(2):265-281.(MENG X F, ZHANG X J. Big data privacy management[J]. Journal of Computer Research and Development, 2016, 52(2):265-281.) |