|
基于k-means++的抗相似性攻击轨迹匿名算法
|
Abstract:
[1] | 哈吉德玛. 基于位置服务(LBS)的应用研究[J]. 现代信息科技, 2019, 3(4): 61-62. |
[2] | Xiao, Z., Yang, J.J., Huang, M., et al. (2017) QLDS: A Novel Design Scheme for Trajectory Privacy Protection with Utility Guarantee in Partici-patory Sensing. IEEE Transactions on Mobile Computing, 17, 1397-1410. https://doi.org/10.1109/TMC.2017.2768360 |
[3] | He, X., Jin, R. and Dai, H. (2018) Leveraging Spatial Diversity for Privacy-Aware Location Based Services in Mobile Networks. IEEE Transactions on Information Forensics & Se-curity, 13, 1524-1534. https://doi.org/10.1109/TIFS.2018.2797023 |
[4] | Xiao, P., Chen, W., Sun, Y., et al. (2017) Continuous Queries Privacy Protection Algorithm Based on Spatial-Temporal Similarity Over Road Networks. Journal of Computer Re-search & Development, 54, 2092-2101. |
[5] | 张学军, 桂小林, 伍忠东. 位置服务隐私保护研究综述[J]. 软件学报, 2015, 26(9): 2373-2395. |
[6] | 魏兴民, 杜鹏懿. 基于位置服务的隐私保护综述[J]. 现代信息科技, 2019(8): 154-157. |
[7] | Machanavajjhala, A., Kifer, D., Gehrke, J., et al. (2006) L-Diversity: Privacy beyond Kanonymity. ACM Transactions on Knowledge Discovery from Data, 1, 3. https://doi.org/10.1145/1217299.1217302 |
[8] | Gao, S., Ma, J.F., Sun, C., et al. (2014) Balancing Trajectory Privacy and Data Utility Using a Personalized Anonymization Model. Journal of Network and Computer Applications, 38, 125-134. https://doi.org/10.1016/j.jnca.2013.03.010 |
[9] | 杨静, 张冰, 张健沛, 等. 基于图划分的个性化轨迹隐私保护方法[J]. 通信学报, 2015(3): 1-11. |
[10] | Abul, O., Bonchi, F. and Nanni, M. (2008) Never Walk alone: Uncertainty for Anonymity in Moving Objects Databases. In: Proceedings of the International Conference on Data Engineering, 376-385. https://doi.org/10.1109/ICDE.2008.4497446 |
[11] | Cai, H.-F., Yang, H.-X. and Wang, S. (2014) A Cluster-ing-Based Privacy-Pre-Serving Method for Uncertain Trajectory Data. 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Beijing, China, 49-62. https://doi.org/10.1109/TrustCom.2014.5 |
[12] | Dai, J. and Liang, H. (2015) A Method for the Trajectory Privacy Protection Based on the Segmented Fake Trajectory under Road Networks. |
[13] | 吴英杰, 唐庆明, 倪巍伟. 基于聚类杂交的隐私保护轨迹数据发布算法[J]. 计算机研究与发展, 2013, 50(3): 578-593. |
[14] | Huo, Z., Huang, Y. and Meng, X.F. (2011) History Trajectory Privacy-Preserving through Graph Partition. In: Proceedings of the 1st Interna-tional Workshop on Mobile Location-Based Service, ACM Press, New York, 71-78. https://doi.org/10.1145/2025876.2025891 |
[15] | Agarwal, P.K., Avraham, R.B., Kaplan, H., et al. (2014) Compu-ting the Discrete Fréchet Distance in Subquadratic Time. SIAM Journal on Computing, 43, 429-449. https://doi.org/10.1137/130920526 |
[16] | Brinkhoff, T. (2003) Generating Traffic Data. IEEE Data Engineering Bulletin, 26, 19-25. |