2. Kim H. A spatial cloaking framework based on range search for nearest neighbor search. Proceedings of the 4th International Workshop on Data Privacy Management (DPM’09), and the 2nd International Workshop on Autonomous and Spontaneous Security (SETOP’09), Sept 24-25, 2009, St Malo, France. Berlin, Germany: Springer Verlag, 2010: 93-105
3. Papadopoulos S, Bakiras S, Papadias D. Nearest neighbor search with strong location privacy. Proceedings of the VLDB Endowment, 2010, 3(1): 619-629
4. Kim H I, Chang J W. k-nearest neighbor query processing algorithms for a query region in road networks. Journal of Computer Science and Technology, 2013, 28(4): 585-596
5. Zheng K, Zhou X F, Fung P C, et al. Spatial query processing for fuzzy objects. The VLDB Journal, 2012, 21(5): 729-751
6. Chow C Y, Mokbel M F, Aref W G. Casper: query processing for location services without compromising privacy. ACM Transactions on Database Systems, 2009, 34(4): 24-48
7. Li W, Liu C L. A decentralized location-query-sensitive cloaking algorithm for LBS. Proceedings of the IEEE 8th International Wireless Communications and Mobile Computing Conference (IWCMC’12), Aug 27-31, 2012, Limassol, Cyprus. Piscataway, NJ, USA: IEEE, 2012: 1040-1045
8. Pan X, Xu J L, Meng X F. Protecting location privacy against location-dependent attacks in mobile services. IEEE Transactions on Knowledge and Data Engineering, 2012, 24(8): 1506-1519
9. Kalnis P, Ghinita G, Mouratidis K, et al. Preventing location-based identity inference in anonymous spatial queries. IEEE Transactions on Knowledge and Data Engineering, 2007, 19(12): 1719-1733
10. Ghinita G, Zhao K L, Papadias D, et al. A reciprocal framework for spatial k-anonymity. Information Systems, 2010, 35(3): 299-314
11. Miyakawa S, Saji N, Mori T. Location l-diversity against multifarious inference attacks. Proceedings of the IEEE/IPSJ 12th International Symposium on Applications and the Internet (SAINT’12), Jul 16-20, 2012, Izmir, Turkey. Piscataway, NJ, USA: IEEE, 2012: 10p
12. Pingley A, Yu W, Zhang N, et al. A context-aware scheme for privacy-preserving location-based services. Computer Networks, 2012, 56(11): 2551-2568
13. Lee B, Oh J, Yu H, et al. Protecting location privacy using location semantics. Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD’11), Aug 21-24, 2011, San Diego, CA, USA. New York, NY, USA: ACM, 2011: 1289-1297
14. Ni W W, Zheng J W, Chong Z H. HilAnchor: location privacy protection in the presence of users’ preferences. Journal of Computer Science and Technology, 2012, 27(2): 413-427
15. Duckham M, Kulik L. A formal model of obfuscation and negotiation for location privacy. Proceedings of the 3rd International Conference on Pervasive Computing (PERVASIVE’05). May 8-13, 2005, Munich, Germany. LNCS 3468. Berlin, Germany: Springer-Verlag, 2005: 152-170
16. Meyerowitz J, Choudhury R R. Hiding stars with fireworks: location privacy through camouflage. Proceedings of the 15th Annual International Conference on Mobile Computing and Networking (MOBICOM’09), Sep 20-25, 2009, Beijing, China. New York, NY, USA: ACM, 2009: 345-356
17. Xu T, Cai Y. Feeling-based location privacy protection for location-based services. Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS’09), Nov 9-13, 2009, Chicago, IL, USA. New York, NY, USA: ACM, 2009: 348-357
18. Hu H B, Xu J L. Non-exposure location anonymity. Proceedings of the 25th International Conference on Data Engineering (ICDE’09), Mar 29-Apr 2, 2009, Shanghai, China. Piscataway, NJ, USA: IEEE, 2009: 1120-1131
19. Mascetti S, Bertolaja L, Bettini C. Location privacy attacks based on distance and density information. Proceedings of the 20th International Conference on Advances in Geographic Information Systems (SIGSPATIAL GIS’12), Nov 6-9, 2012. Redondo Beach, CA, USA. New York, NY, USA: ACM, 2012: 514-517
20. Ghinita G, Kalnis P, Khoshgozaran A, et al. Private queries in location based services: anonymizers are not necessary. Proceedings of the 34th ACM SIGMOD International Conference on Management of Data (SIGMOD’08), Jun 9-12, 2008, Vancouver, Canada. New York, NY, USA: ACM, 2008: 121-132
21. Khoshgozaran A, Shirani-Mehr H, Shahabi C. SPIRAL: a scalable private information retrieval approach to location privacy. Proceedings of the 9th International Conference on Mobile Data Management Workshops (MDMW’08), Apr 27-30, 2008, Beijing, China. Piscataway, NJ, USA: IEEE, 2009: 55-62
22. Khoshgozaran A, Shahabi C, Shirani-Mehr H. Location privacy: going beyond k-anonymity, cloaking and anonymizers. Knowledge and Information Systems, 2011, 26(3): 435-465 |