References
- D. Song, J. Sim, K. Park, and M. Song, "A Privacy-Preserving Continuous Location Monitoring System for Location-Based Services," International Journal of Distributed Sensor Networks, Vol. 2015, pp. 1-10, 2015.
- K. Park and P. Valduriez, "A Hierarchical Grid Index (HGI), spatial queries in wireless data broadcasting," Springer Distributed and Parallel Databases, Vol. 31, No. 3, pp. 413-446, 2013. https://doi.org/10.1007/s10619-013-7121-y
- C. Y. Chow and M. F. Mokbel, “Trajectory Privacy in Location-based Services and Data Publication,” ACM SIGKDD Explorations Newsletter, Vol. 13, No. 1, pp. 19-29, 2011. https://doi.org/10.1145/2031331.2031335
- J. Youn, D. Song, T. Cai, and K. Park, “Grid-based Trajectory Cloaking Method for protecting Trajectory privacy in Location-based Services,” Korean Society for Internet Information, Vol. 18, No. 5, pp. 1-6, 2017.
- D. Liao, H. Li, G. Sun, and V. Anand, "Protecting User Trajectory in Location-Based Services," IEEE Global Communications Conference, 2015.
- M. E. Nergiz, M. Atzori, Y. Saygin, and B. Guc, "Towards trajectory anonymization : a generalization-based approach," SIGSPATIAL ACM GIS Transactions on Data Privacy 2, pp. 47-75, 2008.
- R. H. Hwang, Y. L. Hsueh, and H. Chung, “A Novel Time-Obfuscated Algorithm for Trajectory Privacy Protection,” IEEE Transactions on Services Computing, Vol. 7, No. 2, pp. 126-139, 2014. https://doi.org/10.1109/TSC.2013.55
- H. Zhao, J. Wan, and Z. Chen, “A Novel Dummy-Based KNN Query Anonymization Method in Mobile Services,” International Journal of Smart Home, Vol. 10, No. 6, pp. 137-154, 2016.
- P. R. Lei, W. C. Peng, I. J. Su, and C. P. Chang, “Dummy-Based Schemes for Protecting Movement Trajectories,” Journal of Information Science and Engineering, Vol. 28, No. 2, pp. 335-350, 2012.
- J. Dai and L. Hua, "A method for the trajectory privacy protection based on the segmented fake trajectory under road networks," IEEE International Conference on Information Science and Control Engineering, pp. 13-17, 2015.
- P. P. Lindenberg, B. C. Cheng, and Y. L. Hsueh, "Novel Location Privacy protection strategies for location-based services," IEEE International Conference on Ubiquitous and Future Networks, pp. 866-870, 2015.
- Z. Huo, X. Meng, H. Hu, and Y. Huang, "You Can Walk Alone Trajectory Privacy-preserving through Significant Stays Protection," Springer International Conference on DASFAA, Vol. 7238, pp. 351-366, 2012.
- V. Primault, S. B. Mokhtar, C. Lauradoux, and L. Brunie, "Time Distortion Anonymization for the Publication of Mobility Data with High Utility," IEEE Turstcom/ BigDataSE/ISPA, pp. 539-546, 2015.
- Y. Xin, Z. Q. Xie, and J. Yang, "The privacy preserving method for dynamic trajectory releasing based on adaptive clustering," ELSEVIER Information Sciences, Vol. 378, pp. 131-143, 2017. https://doi.org/10.1016/j.ins.2016.10.038
- T. lmielinski, S. Viswanathan, and B. R. Badrinath, “Data on air : organization and access,” IEEE Transactions on Knowledge and Data Engineering, Vol. 9, No. 3, pp. 353-372, 1997. https://doi.org/10.1109/69.599926
- B. Zheng, W. C. Lee, and D. L. Lee, "Spatial queries in wireless broadcast systems," ACM Jornal Wireless Networks-Special issue: Pervasive Computing and Communications, Vol. 10, No. 6 pp. 723-736. 2004.
- D. Song and K. Park, "A partial index for distributed broadcasting in wireless mobile networks," ELSEVIER Information Sciences, Vol. 348, pp. 142-152, 2016. https://doi.org/10.1016/j.ins.2016.02.011
- W. Sun, C. Chen, B. Zheng, C. Chen, and P. Liu, “An Air Index for Spatial Query Processing in Road Networks,” IEEE Transaction on Knowledge and Data Engineering, Vol. 27, No. 2, pp. 382-395, 2015. https://doi.org/10.1109/TKDE.2014.2330836
- Y. Ten, W. Wang, J. Wu, Q. Kou, Z. Song, and E. C.-H. Nagi, “Privacy-Preserving Social Tie Discovery Based on Cloaked Human Trajectories,” IEEE Transactions on Vehicular Technology, Vol. 66, No. 2, pp. 1619-1630, 2017. https://doi.org/10.1109/TVT.2016.2554608
- H. Yin, W. Wang, H. Wang, L. Chen, and X. Zhou, “Spatial-Aware Hierarchical Collaborative Deep Learning for POI Recommendation,” IEEE Transactions on Knowledge and Data Engineering, Vol. 29, No. 11, pp. 2537-2551, 2017. https://doi.org/10.1109/TKDE.2017.2741484
- M. Terroviti, G. Poulis, N. Mamoulis, and S. Skiadopoulos, “Local Suppression and Splitting Techniques for Privacy Preserving Publication of Trajectorie,” IEEE Transactions on Knowledge and Data Engineering, Vol. 29, No. 7, pp. 1466-1479, 2017. https://doi.org/10.1109/TKDE.2017.2675420
- B. Niu, S. Gao, F. Li, H. Li, and Z. Lu, "Protection of location privacy in continuous LBSs against adversaries with background information," IEEE International Conference on Computing Networking and Communications, 2016.
- W. C. Hu, S. H. Mousavinezhad, N. Kaabouch, and H. J. Yang, "Privacy-Preserving Spatial Trajectory Prediction," IEEE Conference Wireless Research Collaboration Symposium, pp. 69-73, 2014.