[1] |
Bao J, He T, Ruan S, et al. Planning bike lanes based on sharing-bikes' trajectories[C]. Halifax: Proceedings of the Twenty-third ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2017.
|
[2] |
李凤华, 张翠, 牛犇, 等. 高效的轨迹隐私保护方案[J]. 通信学报, 2015, 36(12):114-123.
|
|
Li Fenghua, Zhang Cui, Niu Ben, et al. Efficient scheme for user's trajectory privacy[J]. Journal on Communication, 2015, 36(12):114-123.
|
[3] |
赵婧, 张渊, 李兴华, 等. 基于轨迹频率抑制的轨迹隐私保护方法[J]. 计算机学报, 2014, 37(10):2096-2106.
|
|
Zhao Jing, Zhang Yuan, Li Xinghua, et al. A trajectory privacy protection via trajectory frequency suppression[J]. Chinese Journal of Computers, 2014, 37(10):2096-2106.
|
[4] |
朱维军, 游庆光, 杨卫东, 等. 基于统计差分的轨迹隐私保护[J]. 计算机研究与发展, 2017, 54(12):2825-2832.
|
|
Zhu Weijun, You Qingguang, Yang Weidong, et al. Trajectory privacy preserving based on statistical differential privacy[J]. Journal of Computer Research and Development, 2017, 54(12):2825-2832.
|
[5] |
Nergiz M E, Atzori M, Saygin Y. Towards trajectory anonymization: A generalization-based approach[J]. Transactions on Data Privacy, 2008, 2(1):52-61.
|
[6] |
Domingo-Ferrer J, Trujillo-Rasua R. Microaggregation and permutation-based anonymization of movement data[J]. Information Sciences, 2012, 20(8):55-80.
|
[7] |
Feng Y, Liu P, Zhang J. A mobile terminal based trajectory preserving strategy for continuous querying LBS users[C]. Hangzhou: Proceedings of IEEE the Eighth International Conference on Distributed Computing in Sensor Systems, 2012.
|
[8] |
Dwork C. Differential privacy: A survey of results[C]. Heidelberg: Proceedings of the International Conference on Theory and Applications of Models of Computation, 2008.
|
[9] |
Hua J, Gao Y, Zhong S. Differentially private publication of general time-serial trajectory data[C]. Hong Kong: Proceedings of the IEEE Conference on Computer Communications, 2015.
|
[10] |
徐启元, 陈珍萍, 付保川, 等. 基于差分隐私的混合位置隐私保护[J]. 计算机应用与软件, 2019, 36(6):296-301.
|
|
Xu Qiyuan, Chen Zhenping, Fu Baochuan, et al. Hybrid location privacy protection based on differential privacy[J]. Computer Applications and Software, 2019, 36(6):296-301.
|
[11] |
Yan Y, Hao X, Zhang L. Hierarchical differential privacy hybrid decomposition algorithm for location big data[J]. Cluster Computing, 2019, 22(4):9269-9280.
doi: 10.1007/s10586-018-2125-z
|
[12] |
杨理皓, 谷科, 李威. 基于差分隐私机制的位置数据隐私保护策略[J]. 计算机应用研究, 2018, 35(3):895-900.
|
|
Yang Lihao, Gu Ke, Li Wei. Location data privacy protection strategy based on differential privacy mechanism[J]. Application Research of Computer, 2018, 35(3):895-900.
|
[13] |
霍峥, 孟小峰. 轨迹隐私保护技术研究[J]. 计算机学报, 2011, 34(10):1820-1830.
doi: 10.3724/SP.J.1016.2011.01820
|
|
Huo Zheng, Meng Xiaofeng. A survey of trajectory privacy-preserving techniques[J]. Chinese Journal of Computer, 2011, 34(10):1820-1830.
doi: 10.3724/SP.J.1016.2011.01820
|
[14] |
王晓滨. 基于差分隐私的位置信息隐私保护研究[D]. 北京: 北京交通大学, 2019.
|
|
Wang Xiaobin. Research on location information privacy protection based on differential privacy[D]. Beijing: Beijing Jiaotong University, 2019.
|
[15] |
胡柳, 王梅, 邓杰, 等. 大数据环境下的隐私保护研究[J]. 电子科技, 2017, 30(7):159-161.
|
|
Hu Liu, Wang Mei, Deng Jie, et al. Research on big data privacy protection[J]. Electronic Science and Technology, 2017, 30(7):159-161.
|
[16] |
杨飞, 朱志祥. 基于特征和空间信息的核模糊C-均值聚类算法[J]. 电子科技, 2016, 29(2):16-19.
|
|
Yang Fei, Zhu Zhixiang. Kernelized fuzzy C-means clustering algorithm based on features and spatial information[J]. Electronic Science and Technology, 2016, 29(2):16-19.
|
[17] |
Khanlari M, Ehsanian M. An improved KFCM clustering method used for multiple fault diagnosis of analog circuits[J]. Circuits, Systems, and Signal Processing, 2017, 36(9):3491-3513.
doi: 10.1007/s00034-016-0479-0
|
[18] |
Wang Q, Zhang Y, Xiao Y, et al. Kernel-based fuzzy C-means clustering based on fruit fly optimization algorithm[C]. Stockholm: Proceedings of the International Conference on Grey Systems and Intelligent Services, 2017.
|