Duckham M, Kulik F. Location Privacy and Location-Aware Computing in Dynamic & Mobile GIS: Investigating Change in Space and Time[M]. Boca Raton: CRC Press, 2006: 1-16.
[4]
Gruteser M, Grunwald D. Anonymous usage of locationbased services through spatial and temporal cloaking[C]. In Proceedings of MobiSys, 2003.
[5]
Krumm J. A survey of computational location privacy[C]. In Proceedings of Personal and Ubiquitous Computing, 2009: 391-399.
Hu H, Xu J, Lee D L. PAM: An efficient and privacyaware monitoring framework for continuously moving objects[C]. In Proceedings of IEEE Transaction on Knowledge and Data Engineering, 2010: 404-419.
[8]
Chen J, Cheng R, Mokbel M F, et al. Scalable processing of snapshot and continuous nearest-neighbor queries overone-dimensional uncertain data[C]. In Proceedings ofVLDB J, 2009: 1219-1240.
[9]
Pan X, Meng X, Xu J. Distortion-based anonymity for continuous queries in location-based mobile services[C]. In Proceedings of GIS, 2009: 256-265.
[10]
Fournier-Viger P, Nkambou R, Tseng V S. RuleGrowth: Mining sequential rules common to several sequences by pattern-growth[C]. In Proceedings of SAC, 2011: 956-961.
[11]
Fournier-Viger P, Tseng V S. Mining top-K sequential rules[C]. In Proceedings of Hf-Based High-k Dielectrics, 2011: 180-194.
[12]
Fournier-Viger P, Faghihi U, Nkambou R, et al. CMRules: Mining sequential rules common to several sequences[J]. Knowledge-based Systems, Elsevier, 2012, 25(1): 63-76.
[13]
Fournier-Viger P, Tseng V S. TNS: Mining top-K non-redundant sequential rules[C]. In Proceedings of 28th Symposium on Applied Computing, 2013: 164-166.
Gao S S. Research on association rules and sequential patterns mining of spatial-temporal K-anonymity dataset[D]. Nanjing: Nanjing University of Posts & Telecommunications, 2013.
[20]
Cheng J, Greiner R. Learning Bayesian belief network classifiers: Algorithms and system[C]. In Proceedings ofCanadian Conference on AI, 2001: 141-151.