[1]〖ZK(#〗ZHENG Y, LIU L, WANG L, et al. Learning transportation mode from raw GPS data for geographic applications on the web[C]Proceedings of the 17th International Conference on World Wide Web. New York: ACM, 2008: 247256.[2]ZHENG Y, CHEN Y, XIE X, et al. Understanding transportation modes based on GPS data for Web applications [J]. ACM Transactions on the Web, 2010, 4(1): 495507.[3]REDDY S, MUN M, BURKE J, et al. Using mobile phones to determine transportation modes[J]. ACM Transactions on Sensor Networks (TOSN), 2010, 6(2): article 13.[4]STENNETH L, WOLFSON O, YU P S, et al. Transportation mode detection using mobile phones and GIS information [C]Proceedings of the 19th ACM SIGSPATIAC International Conference on Advances in Geographic Information Systems. New York: ACM, 2011: 5463.[5]BETTINI C, WANG X S, JAJODIA S. Protecting privacy against locationbased personal identification[C]2nd VLDB Workshop Secure Data Management. Berlin: SpringerVerlag, 2005: 185199.[6]薛娇,刘向宇,杨晓春,等. 一种面向公路网络的位置隐私保护方法[J].计算机学报,2011,34(5): 865878.[7]霍峥,孟小峰.轨迹隐私保护技术研究[J].计算机学报;2011,34(10):18201930.[8]田秀霞,王晓玲,高明,等.数据库服务—安全与隐私保护[J].软件学报,2010,21(5):9911006.[9]CICEK A E, NERGIZ M E, SAYGIN Y. Ensuring location diversity in privacypreserving spatiotemporal data publishing[J]. the VLDB J, 2014, 23(4): 609625.[10]XU J, GTING R H. A generic data model for moving objects[J]. Geoinformatica, 2013, 17(1): 125172.[11]XU J, GTING R H, QIN X. et al. Benchmarking generic moving objects [J]. Geoinformatica, 2015, 19(2): 227276.[12]LIU L. From data privacy to location privacy: Models and algorithms[C]Proceedings of the 33rd International Conference on Very Large Data Bases. Seoul: VLDB Endowment.2007: 14291430.[13]MOKBEL M F, CHOW C Y, AREF W G. The new casper: Query processing for location services without compromising privacy[C]Proceeding of the 32nd International Conference on Very Large Data Bases. Seoul: VLDB Endowment, 2006: 763774.[14]SAMARATI P. Protecting respondent’s privacy in microdata release[J]. IEEE Trans. on Knowl. and Data Eng, 2011, 13(6): 10101027.[15]GHINITA G, DAMIANI M L, BERTINO E, et al. Interactive location cloaking with the PROBE obfuscator[C]Mobile Data Management: System, Services and Middleware. Tenth International Conference on IEEE. [s. l.]: IEEE, 2009: 355356.[16]GKOULALASDIVANIS A, VERYKIOS V S. A Free Terrain Model for Trajectory KAnonymity[M]Database and Expert Systems Applications. New York: Springer, 2008: 4956.[17]GRUTESER M, GRUNWALD D. Anonymous usage of locationbased services through spatial and temporalcloaking [C]Proceedings of the 1st International Conference on Mobile Systems, Applications and Services. New York: ACM, 2003: 3142.[18]KHOSHGOZARAN A, SHAHABI C, MEHR H S. Location privacy: Going beyond kanonymity, cloaking and anonymizers[J]. Knowl. and Inf. Syst, 2011, 26(3): 43546.[19]GONG Z Q, SUN G Z, XIE X. Protecting privacy in locationbased services using kanonymity without cloaked region[C]11th International Conference on Mobile Data Management. USA: DBLP, 2010: 366371.[20]YUNG D, LO E, YIU M L. Authentication of moving range queries[C]Proceedings of the 21st ACM International Conference on Information and Knowledge Management. New York: ACM, 2012: 13721381.[21]XU J L, CHEN Q, HU H B. VERDICT: Privacypreserving authentication of range queries in locationbased services[C]Proceedings of the 2013 IEEE International Conference on Data Engineering. Washington, DC: IEEE, 2013: 13121315.[22]HU H B, XU J L, CHEN Q, et al. Authenticating locationbased services without compromising location privacy [C] Proceedings of the 2012 ACM SIGMOD International Conference on Management of Data. New York: ACM, 2012: 301312.[23]YAO B, LI F F, XIAO X K. Secure nearest neighbor revisited[M]29th International Conference on Data Engineering (ICDE).[s. l.]: IEEE, 2013: 733744.[24]YI X, PAULET R, BERTINO E, et al. Practical k nearest neighbor queries with location privacy[M]30th International Conference on Data Engineering (ICDE)[s. l.]: IEEE, 2014: 640651.[25]SHAO D X, JIANG K F, KISTER T, et al. Publishing trajectory with differential privacy: A priori vs. A posteriori sampling mechanisms[M]Database and Expert Systems Applications. New York: Springer, 2013: 357365.[26]PELEKIS N, DIVANIS A G, VODAS M, et al. Privacyaware querying over sensitive trajectory data[C]Proceedings of the 20th ACM International Conference on Information and Knowledge Management. New York: ACM, 2011: 895904. |