[1] 王璐, 孟小峰. 位置大数据隐私保护研究综述[J]. 软件学报, 2014,25(4):693-712.(WANG L,MENG X F. Location privacy preservation in big data era:a survey[J]. Journal of Software, 2014,25(4):693-712.) [2] HWANG R H,HSUEH Y L,CHUNG H W. A novel timeobfuscated algorithm for trajectory privacy protection[J]. IEEE Transactions on Services Computing,2014,7(2):126-139. [3] XIONG P, ZHANG L, ZHU T. Reward-based spatial crowdsourcing with differential privacy preservation[J]. Enterprise Information Systems,2017,11(10):1500-1517. [4] SWEENEY L. k-anonymity:a model for protecting privacy[J]. International Journal of Uncertainty,Fuzziness and KnowledgeBased Systems,2002,10(5):557-570. [5] VU K,ZHENG R,GAO J. Efficient algorithms for k-anonymous location privacy in participatory sensing[C]//Proceedings of the 2012 IEEE International Conference on Computer Communications. Piscataway:IEEE,2012:2399-2407. [6] DATAR M,IMMORLICA N,INDYK P,et al. Locality-sensitive hashing scheme based on p-stable distributions[C]//Proceedings of the 20th Annual Symposium on Computational Geometry. New York:ACM,2004:253-262. [7] KHOSHGOZARAN A, SHAHABI C, SHIRANI-MEHR H. Location privacy:going beyond K-anonymity, cloaking and anonymizers[J]. Knowledge and Information Systems,2011,26(3):435-465. [8] 赵婧, 张渊, 李兴华, 等. 基于轨迹频率抑制的轨迹隐私保护方法[J]. 计算机学报,2014,37(10):2096-2106.(ZHAO J, ZHANG Y,LI X H,et al. A trajectory privacy protection approach via trajectory frequency suppression[J]. Chinese Journal of Computers,2014,37(10):2096-2106.) [9] 董玉兰, 皮德常. 一种基于假数据的新型轨迹隐私保护模型[J]. 计算机科学,2017,44(8):124-128,139.(DONG Y L,PI D C. Novel trajectory privacy preserving mechanism based on dummies[J]. Computer Science,2017,44(8):124-128,139.) [10] ABUL O,BONCHI F,NANNI M. Never walk alone:uncertainty for anonymity in moving objects databases[C]//Proceedings of the IEEE 24th International Conference on Data Engineering. Piscataway:IEEE,2008:376-385. [11] HUA J,GAO Y,ZHONG S. Differentially private publication of general time-serial trajectory data[C]//Proceedings of the 2015 IEEE Conference on Computer Communications. Piscataway:IEEE,2015:549-557. [12] JIA J, YAN G, XING L. Personalized sensitive attribute anonymity based on p-sensitive k-anonymity[C]//Proceedings of the 2016 International Conference. New York:ACM,2016,57:1-7. [13] TIAN F,ZHANG S,LU L,et al. A novel personalized differential privacy mechanism for trajectory data publication[C]//Proceedings of the 2017 International Conference on Networking and Network Applications. Piscataway:IEEE,2017:61-68. [14] 孙岚, 郭旭东, 王一蕾, 等. 个性化隐私保护轨迹发布算法[J]. 系统工程与电子技术,2014,36(12):2550-2555.(SUN L, GUO X D,WANG Y L,et al. Personalized privacy preserving algorithm for trajectory data publishing[J]. Systems Engineering and Electronics,2014,36(12):2550-2555.) [15] GEDIL B, LIU L. Location privacy in mobile systems:a personalized anonymization model[C]//Proceedings of the 25th IEEE International Conference on Distributed Computing Systems. Piscataway:IEEE,2005:620-629. [16] DELDAR F, ABADI M. PDP-SAG:personalized privacy protection in moving objects databases by combining differential privacy and sensitive attribute generalization[J]. IEEE Access, 2019,7:85887-85902. |