[1] 董玉兰, 皮德常. 一种基于假数据的新型轨迹隐私保护模型[J]. 计算机科学, 2017, 44(8):125-139.(DONG Y L, PI D C. Novel trajectory privacy preserving mechanism based on dummies[J]. Computer Science, 2017, 44(8):125-139.) [2] 雷凯跃, 李兴华, 刘海, 等. 轨迹发布中基于时空关联性的假轨迹隐私保护方案[J]. 通信学报, 2016, 37(12):156-164. (LEI K Y, LI X H, LIU H, et al. Dummy trajectory privacy protection scheme for trajectory publishing based on the spatiotemporal correlation[J]. Journal on Communications, 2016, 37(12):156-164.) [3] DAI J, HUA L. A method for the trajectory privacy protection based on the segmented fake trajectory under road networks[C]//Proceedings of the 2nd International Conference on Information Science and Control Engineering. Piscataway, NJ:IEEE, 2015:13-17. [4] 赵婧, 张渊, 李兴华, 等. 基于轨迹频率抑制的轨迹隐私保护方法[J]. 计算机学报, 2014, 37(10):2097-2105. (ZHAO J, ZHANG Y, LI X H, et al. A trajectory privacy protection approach via trajectory frequency suppression[J]. Chinese Journal of Computers, 2014, 37(10):2097-2105.) [5] KOMISHANI E G, ABADI M, DELDAR F. Preserving personalized privacy in trajectory data publishing by sensitive attribute generalization and trajectory local suppression[J]. Knowledge-Based Systems, 2016, 94:43-59. [6] TERROVITIS M, POULIS G, MAMOULIS N, et al. Local suppression and splitting techniques for privacy preserving publication of trajectories[J]. IEEE Transactions on Knowledge & Data Engineering, 2017, 29(7):1466-1479. [7] CHEN R, FUNG B C M, MOHAMMED N, et al. Privacy-preserving trajectory data publishing by local suppression[J]. Information Sciences, 2013, 231(1):83-97. [8] OUAZZANI Z E, BAKKALI H E. A new technique ensuring privacy in big data:K-anonymity without prior value of the threshold k[J]. Procedia Computer Science, 2018, 127:52-59. [9] GRAMAGLIA M, FIORE M, TARABLE A, et al. Preserving mobile subscriber privacy in open datasets of spatiotemporal trajectories[C]//Proceedings of the 2017 IEEE Conference on Computer Communications. Piscataway, NJ:IEEE, 2017:1-9. [10] 霍峥, 孟小峰, 黄毅. PrivateCheckIn:一种移动社交网络中的轨迹隐私保护方法[J]. 计算机学报, 2013, 36(4):716-726. (HUO Z, MENG X F, HUANG Y. PrivateCheckIn:trajectory privacy-preserving for check-in services in MSNs[J]. Chinese Journal of Computers, 2013, 36(4):716-726.) [11] WU X, LI S, YANG J, et al. A cost sharing mechanism for location privacy preservation in big trajectory data[C]//Proceedings of the 2017 IEEE International Conference on Communications. Piscataway, NJ:IEEE, 2017:1-6. [12] PENG T, LIU Q, MENG D C, et al. Collaborative trajectory privacy preserving scheme in location-based services[J]. Information Sciences, 2017, 387(C):165-179. [13] 胡德敏, 郑霞. 基于连续查询的用户轨迹k-匿名隐私保护算法[J]. 计算机应用研究, 2017, 34(11):3422-3427. (HU D M, ZHENG X. K-anonymous privacy protection algorithm for user trajectory protection based on continuous query[J]. Application Research of Computers, 2017, 34(11):3422-3427.) [14] LIAO D, SUN G, LI H, et al. The framework and algorithm for preserving user trajectory while using location-based services in IoT-cloud systems[J]. Cluster Computing, 2017, 20(2):2283-2297. [15] HWANG R H, HSUEH Y L, CHUNG H W. A novel time-obfuscated algorithm for trajectory privacy protection[J]. IEEE Transactions on Services Computing, 2014, 7(2):126-139. [16] ZHANG S, WANG G, LIU Q, et al. A trajectory privacy-preserving scheme based on query exchange in mobile social networks[J]. Soft Computing, 2017(7):1-13. [17] ZHU L, XU C, GUAN J, et al. A preference-aware trajectory privacy-preserving scheme in location-based social networks[C]//Proceedings of the 2017 IEEE Conference on Computer Communications Workshops. Piscataway, NJ:IEEE, 2017:820-825. [18] 周凯, 彭长根, 何建琼, 等. 可证明安全的LBS中连续查询的轨迹隐私保护方案[J]. 信息网络安全, 2017(1):43-47. (ZHOU K, PENG C G, HE J Q, et al. Provable secure trajectory privacy preserving scheme for continuous queries in location-based services[J]. Netinfo Security, 2017(1):43-47.) |