1 |
T. Allard, G. Hebrail, F. Masseglia, and E. Pacitti, "A new privacy-preserving solution for clustering massively distributed personal times-series," in International Conference on Data Engineering, pp.1370-1373, 2016.
|
2 |
R. Yu, Z. Bai, L. Yang, P. Wang, O. A. Move, and Y. Liu, "A location cloaking algorithm based on combinatorial optimization for location-based services in 5G networks," IEEE Access, Vol.4, pp.6515-6527, 2016.
DOI
|
3 |
M. H. Afifi, K. Zhou, and J. Ren, "Privacy characterization and quantification in data publishing," IEEE Transactions on Knowledge and Data Engineering, Vol.30, No.9, pp.1756-1769, 2018.
DOI
|
4 |
H. Liu, X. Li, H. Li, J. Ma, and X. Ma, "Spatiotemporal correlation-aware dummy-based privacy protection scheme for location-based services," in IEEE Conference on Computer Communications, pp.1-9, 2017.
|
5 |
D. Liao, H. Li, G. Sun, and V. Anand, "Protecting user trajectory in location-based services," IEEE Global Communications Conference, 2015.
|
6 |
J. Youn, D. Song, T. Cai, and K. Park, "Grid-based Trajectory cloaking method for protecting trajectory privacy in location-based services," Korean Society for Internet Information, Vol.18, No.5, pp.1-6, 2017.
|
7 |
B. Niu, Z. Zhang, X. Li, and H. Li, "Privacy-area aware dummy generation algorithms for location-based services," in IEEE International Conference on Communications, pp.957-962, 2014.
|
8 |
D. Song, M. Song, and K. Park, "A privacy-preserving spatial index for spatial query processing," Wireless Communications and Mobile Computing, pp.1-10, 2018.
|
9 |
C. Y. Chow and M. F. Mokbel, "Trajectory privacyin locationbased services and data publication," ACM SIGKDD Explorations Newsletter, Vol.13, No.1, pp.19-29, 2011.
DOI
|
10 |
D. Wu, Y. Zhang, and Y. Liu, "Dummy location selection scheme for k-anonymity in location based services," in IEEE Trustcom/BigDataSE/ICESS, pp.441-448, 2017.
|