[1] Zhang W,Wu L,et al.A trajectory privacy model for radio-frequency[J].Wireless Personal Communications,2016,90(3):1121-1134.
[2] Memon I,Memon H,Chen G.Pseudonym changing strategy with multiple mix zones for trajectory privacy protection in road networks[J].International Journal of Communication Systems,2018,31(1):1-44.
[3] Ye H,Cheng X,Yuan M,et al.A survey of security and privacy in big data[A].Proceedings of the International Symposium on Communications and Information Technologies[C].Piscataway:IEEE,2016.268-272.
[4] 霍峥,孟小峰.轨迹隐私保护技术研究[J].计算机学报,2011,34(10):1820-1830. HUO Zheng,MENG Xiao-feng.A survey of trajectory privacy-preserving techniques[J].Chinese Journal of Computers,2011,34(10):1820-1830.(in Chinese)
[5] Hu Z,Yang J,Zhang J.Trajectory privacy protection method based on the time interval divided[J].Computers & Security,2018,77:488-499.
[6] Hwang R H,Hsueh Y L,Chung H W.A novel time-obfuscated algorithm for trajectory privacy protection[J].IEEE Transactions on Services Computing,2013,7(2):126-139.
[7] Huo Z,Meng X,Hu H,et al.You can walk alone:Trajectory privacy-preserving through significant stays protection[A].Proceedings of the International Conference on Database Systems for Advanced Applications[C].Berlin:Springer,2012.351-366.
[8] Li M,Zhu L,Zhang Z,et al.Differentially private publication scheme for trajectory data[A].Proceedings of the 1st International Conference on Data Science in Cyberspace[C].Piscataway:IEEE,2016.596-601.
[9] 王丽娜,彭瑞卿,赵雨辰,等.个人移动数据收集中的多维轨迹匿名方法[J].电子学报,2013,41(8):1653-1659. WANG Li-na,PENG Rui-qing,ZHAO Yu-chen,et al.Multi-dimensional trajectory anonymity in collecting personal mobility data[J].Acta Electronica Sinica,2013,41(8):1653-1659.(in Chinese)
[10] Terrovitis M,Poulis G,Mamoulis N,et al.Local suppression and splitting techniques for privacy preserving publication of trajectories[J].IEEE Transactions on Knowledge and Data Engineering,2017,29(7):1466-1479.
[11] Komishani E G,Abadi M,Deldar F.PPTD:Preserving personalized privacy in trajectory data publishing by sensitive attribute generalization and trajectory local suppression[J].Knowledge-Based Systems,2016,94:43-59.
[12] Lei P R,Peng W C,Su I J,et al.Dummy-based schemes for protecting movement trajectories[J].Journal of Information Science and Engineering,2012,28(2):335-350.
[13] Shen H,Bai G,Yang M,et al.Protecting trajectory privacy:A user-centric analysis[J].Journal of Network and Computer Applications,2017,82:128-139.
[14] 赵婧,张渊,李兴华,等.基于轨迹频率抑制的轨迹隐私保护方法[J].计算机学报,2014,37(10):2096-2106. ZHAO Jing,ZHANG Yuan,LI Xing-hua,et al.A trajectory privacy protection approach via trajectory frequency suppression[J].Chinese Journal of Computers,2014,37(10):2096-2106.(in Chinese)
[15] Chen R,Fung B C M,Mohammed N,et al.Privacy-preserving trajectory data publishing by local suppression[J].Information Sciences,2013,231:83-97. |