1. Sun Y M, Chen M, Hu L, et al. ASA: Against statistical attacks for privacy-aware users in location based service. Future Generation Computer Systems, 2017, 70: 48–58.
2. Zhang S B, Wang G J, Liu Q, et al. A trajectory privacy-preserving scheme based on query exchange in mobile social networks. Soft Computing, 2017, DOI: 10.1007/s00500-017-2676-6.
3. Li X H, Miao M X, Liu H, et al. An incentive mechanism for K-anonymity in LBS privacy protection based on credit mechanism. Soft Computing, 2017, 21(14): 3907–3917.
4. Xin M J, Lu M L, Li W M. An adaptive collaboration evaluation model and its algorithm oriented to multi-domain location-based services. Expert Systems with Applications, 2015, 42(5): 2798–2807.
6. Talukder N, Ahamed S I. Preventing multi-query attack in location-based services. Proceedings of the 3rd ACM Conference on Wireless Network Security (WISEC’10), Mar 22-24, 2010, Hoboken, NJ, USA. New York, NY, USA: ACM, 2010: 25–36.
7. Mascetti S, Freni D, Bettini C, et al. Privacy in geo-social networks: Proximity notification with untrusted service providers and curious buddies. The International Journal on Very Large Data Bases, 2011, 20(4): 541–566.
8. Gao S, Ma J F, Shi W S, et al. TrPF: A trajectory privacy-preserving framework for participatory sensing. IEEE Transactions on Information Forensics and Security, 2013, 8(6): 874–887.
9. Sun G, Liao D, Li H, et al. L2P2: A location-label based approach for privacy preserving in LBS. Future Generation Computer Systems, 2017, 74: 375–384.
10. Ye A, Li Y C, Xu L. A novel location privacy-preserving scheme based on l-queries for continuous LBS. Computer Communications, 2017, 98: 1–10.
11. He W. Research on LBS privacy protection technology in mobile social networks. Proceedings of the IEEE 2nd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC'17), Mar 25-26, 2017, Chongqing, China. Piscataway, NJ, USA: IEEE, 2017: 73–76.
12. Liu X X, Liu K K, Guo L K, et al. A game-theoretic approach for achieving k-anonymity in location based services. Proceedings of the 32nd IEEE Conference on Computer Communications (INFOCOM’13), Apr 14-19, 2013, Turin, Italy. Piscataway, NJ, USA: IEEE, 2013: 2985–2993.
14. Lu H, Jensen C S, Yiu M L. PAD:privacy-area aware, dummy-based location privacy in mobile services. Proceedings of the 7th ACM International Workshop on Data Engineering for Wireless and Mobile Access (Mobide’08), Jun 13, 2008, Vancouver, Canada. New York, NY, USA: ACM, 2008: 16–23.
15. Niu B, Li Q H, Zhu X Y, et al. Achieving k-anonymity in privacy-aware location-based services. Proceedings of the 2014 IEEE Conference on Computer Communications (INFOCOM’14), Apr 1-2, 2014, Toronto, Canada. Piscataway, NJ, USA: IEEE, 2014: 754–762.
16. Wang Y, Xu D B, He X, et al. L2P2: Location-aware location privacy protection for location-based services. Proceedings of the 31stAnnual Joint Conference of the IEEE Computer and Communications (INFOCOM’12), Mar 25-30, 2012, Orlando, FL, USA. Piscataway, NJ, USA: IEEE,2012: 1996–2004.
17. Li X H, Wang E M, Yang W D, et al. DALP: A demand-aware location privacy protection scheme in continuous location-based services. Concurrency and Computation Practice and Experience, 2016, 28(4): 1219–1236.
18. Schlegel R, Chow C Y, Huang Q, et al. User-defined privacy grid system for continuous location-based services. IEEE Transactions on Mobile Computing, 2015, 14(10): 2158–2172. |