Trajectory Privacy Preserving for LBS in P2P Environment
暂无分享,去创建一个
[1] Nikos Mamoulis,et al. Local Suppression and Splitting Techniques for Privacy Preserving Publication of Trajectories , 2017, IEEE Transactions on Knowledge and Data Engineering.
[2] Tanzima Hashem,et al. "Don't trust anyone": Privacy protection for location-based services , 2011, Pervasive Mob. Comput..
[3] Ming-Syan Chen,et al. Developing Data Allocation Schemes by Incremental Mining of User Moving Patterns in a Mobile Computing System , 2003, IEEE Trans. Knowl. Data Eng..
[4] Tetsuji Satoh,et al. An anonymous communication technique using dummies for location-based services , 2005, ICPS '05. Proceedings. International Conference on Pervasive Services, 2005..
[5] Ying Cai,et al. Exploring Historical Location Data for Anonymity Preservation in Location-Based Services , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[6] Meng Xiao. A Survey of Trajectory Privacy-Preserving Techniques , 2011 .
[7] Yücel Saygin,et al. Towards trajectory anonymization: a generalization-based approach , 2008, SPRINGL '08.
[8] John Krumm,et al. Inference Attacks on Location Tracks , 2007, Pervasive.
[9] Javam C. Machado,et al. A Distributed Approach for Privacy Preservation in the Publication of Trajectory Data , 2015, GeoPrivacy@SIGSPATIAL.
[10] Wang-Chien Lee,et al. Protecting Moving Trajectories with Dummies , 2007, 2007 International Conference on Mobile Data Management.
[11] Tao Peng,et al. Collaborative trajectory privacy preserving scheme in location-based services , 2017, Inf. Sci..
[12] Xiaofeng Meng,et al. History trajectory privacy-preserving through graph partition , 2011, MLBS '11.
[13] Marco Gruteser,et al. USENIX Association , 1992 .
[14] Xiao-Feng Meng,et al. A Survey of Trajectory Privacy-Preserving Techniques: A Survey of Trajectory Privacy-Preserving Techniques , 2011 .
[15] Francesco Bonchi,et al. Never Walk Alone: Uncertainty for Anonymity in Moving Objects Databases , 2008, 2008 IEEE 24th International Conference on Data Engineering.
[16] Xiaofeng Meng,et al. You Can Walk Alone: Trajectory Privacy-Preserving through Significant Stays Protection , 2012, DASFAA.
[17] Wang-Chien Lee,et al. On Mining Moving Patterns for Object Tracking Sensor Networks , 2006, 7th International Conference on Mobile Data Management (MDM'06).