1 |
M. Xu, H. Zhao, X. Ji, and J. Shen, "Distribution-perceptive-based spatial cloaking algorithm for location privacy in mobile peer-to-peer enviroments," Journal of Software, vol. 29, no. 7, pp. 1852-1862, 2018.
|
2 |
H. Li, X. Xue, Z. Li, L. Li, and J. Xiong, "Location privacy protection scheme for LBS in IoT," Wireless Communications and Mobile Computing, vol. 2021, pp. 1-18, Aug. 2021.
|
3 |
A. A. A. Sen, S. K. A. Nazar, N. A. Osman, N. M. Bahbouh, H. F. Aloufi, and I. M. M. Alawfi, "A new technique for managing reputation of peers in the cooperation approach for privacy protection," in Proc. of 8th INDIACom, New Delhi, India, pp. 409-412, 2021.
|
4 |
M. U. Ashraf, K. M. Jambi, R. Qayyum, and H. Ejaz, "IDP: a privacy provisioning framework for TIP attributes in trusted third party-based location-based services systems," IJACSA, vol. 11, no. 7, 2020.
|
5 |
H. Jiang, J. Li, P. Zhao, F. Zeng, Z. Xiao, and A. Iyengar, "Location privacy-preserving mechanisms in location-based services: a comprehensive survey," ACM Comput. Surv., vol. 54, no. 1, pp. 1-36, Jan. 2022.
|
6 |
E. Kim, "In-store shopping with location-based retail apps: perceived value, consumer response, and the moderating effect of flow," Inf Technol Manag, vol. 22, no. 2, pp. 83-97, Jun. 2021.
DOI
|
7 |
C. Chow, M. F. Mokbel, and X. Liu, "A peer-to-peer spatial cloaking algorithm for anonymous location-based service," in Proc. of 14th GIS, Arlington, Virginia, USA, p. 171-178, 2006.
|
8 |
W. Sui, Z. Liu, H. Lv, Z. Li, and W. Liu, "Random partition region for location privacy protection on edge computing," in Proc. of 8th CSCloud, Washington, DC, USA, pp. 155-160, Jun. 2021.
|
9 |
Z. Abubaker, N. Javaid, A. Almogren, M. Akbar, M. Zuair, and J. Ben-Othman, "Blockchained service provisioning and malicious node detection via federated learning in scalable Internet of Sensor Things networks," Computer Networks, vol. 204, p. 108691, Feb. 2022.
DOI
|
10 |
H. Li, R. Lu, and M. M. E. A. Mahmoud, "Security and privacy of machine learning assisted P2P networks," Peer-to-Peer Netw. Appl., vol. 13, no. 6, pp. 2234-2236, Nov. 2020.
DOI
|
11 |
S. Zhang, X. Li, Z. Tan, T. Peng, and G. Wang, "A caching and spatial K -anonymity driven privacy enhancement scheme in continuous location-based services," Future Generation Computer Systems, vol. 94, pp. 40-50, May. 2019.
DOI
|
12 |
R. Gupta and U. P. Rao, "An exploration to location based service and its privacy preserving techniques: a survey," Wireless Pers Commun, vol. 96, no. 2, pp. 1973-2007, Sep. 2017.
DOI
|
13 |
M. Yamin and A. A. A. Sen, "Improving privacy and security of user data in location based services:," International Journal of Ambient Computing and Intelligence, vol. 9, no. 1, pp. 19-42, Jan. 2018.
DOI
|
14 |
Y. Cui, G. Fei, W. Li, Y. Shi, H. Zhang, Q. Wen, and E. Panaousis, "Cache-based privacy preserving solution for location and content protection in location-based services," Sensors, vol. 20, no. 16, p. 4651, Aug. 2020. .
DOI
|
15 |
N. Innab and S. Alaradi, "Ensuring privacy protection in location-based services through integration of cache and dummies," IJACSA, vol. 10, no. 2, 2019.
|
16 |
S. Zhang, K. K. R. Choo, Q. Liu, and G. Wang, "Enhancing privacy through uniform grid and caching in location-based services," Future Generation Computer Systems, vol. 86, pp. 881-892, Sep. 2018.
DOI
|
17 |
J. Dong, H. Wu, D. Zhou, K. Li, Y. Zhang, H. Ji, Z. Tong, S. Lou and Z. Liu, "Application of big data and artificial intelligence in COVID-19 prevention, diagnosis, treatment and management decisions in China," J Med Syst, vol. 45, no. 9, p. 84, Sep. 2021.
DOI
|
18 |
A. R. Naik and B. N. Keshavamurthy, "Next level peer-to-peer overlay networks under high churns: a survey," Peer-to-Peer Netw. Appl., vol. 13, no. 3, pp. 905-931, May. 2020.
DOI
|
19 |
D. Seng, J. Zhang, and X. Shi, "Visual analysis of deep q-network," KSII Transactions on Internet and Information Systems, vol. 15, no. 3, pp.853-873, Mar. 2021.
|
20 |
C. Zhong, M. C. Gursoy, and S. Velipasalar, "A deep reinforcement learning-based framework for content caching," in Proc. of 52nd CISS, Princeton, NJ, USA, pp. 1-6, Mar. 2018.
|
21 |
S. Amini, J. Lindqvist, J. I. Hong, M. Mou, R. Raheja, J. Lin, N. Sadeh, and E. Tochb, "Cache: caching location-enhanced content to improve user privacy," SIGMOBILE Mob. Comput. Commun. Rev., vol. 14, no. 3, pp. 19-21, July. 2010.
|
22 |
M. Gruteser and D. Grunwald, "Anonymous usage of location-based services through spatial and temporal cloaking," in Proc. of 1st MobiSys, applications and services, San Francisco, CA, USA, pp. 31-42, 2003.
|
23 |
R. Schollmeier, "A definition of peer-to-peer networking for the classification of peer-to-peer architectures and applications," in Proc. of 1st Peer-to-Peer Computing, Sweden, pp. 101-102, 2002.
|
24 |
Y. Zhang, Q. Zhang, Y. Yan, Y. Jiang, and M. Zhang, "A k-anonymous location privacy protection method of polygon based on density distribution," International Journal of Network Security, vol. 23, no. 1, pp. 57-66, Jan. 2021.
|
25 |
Y. Zhang, Q. Zhang, Z. Li, Y. Yan, and M. Zhang, "A k-anonymous location privacy protection method of dummy based on geographical semantics," International Journal of Network Security, vol. 21, no. 6, pp. 937-946, Nov. 2019.
|
26 |
B. N. Jagdale and J. W. Bakal, "A novel authentication and authorization scheme in P2P networking using location-based privacy," Evol. Intel., Mar. 2020.
|
27 |
S. Liu, J. H. Wang, J. Wang, and Q. Zhang, "Achieving user-defined location privacy preservation using a P2P system," IEEE Access, vol. 8, pp. 45895-45912, March. 2020.
DOI
|