X. Pan, Z. Huo, and X. F. Meng, Location Big Data Privacy Management, (in Chinese). Beijing, China: Machine Press, 2017.
J. Li, X. Pei, X. J. Wang, D. Y. Yao, Y. Zhang, and Y. Yue, Transportation mode identification with GPS trajectory data and GIS information, Tsinghua Science and Technology, vol. 26, no. 4, pp. 403–416, 2021.
M. Azrour, J. Mabrouki, A. Guezzaz, and Y. Farhaoui, New enhanced authentication protocol for internet of things, Big Data Mining and Analytics, vol. 4, no. 1, pp. 1–9, 2021.
L. Y. Qi, C. H. Hu, X. Y. Zhang, M. R. Khosravi, S. Sharma, S. N. Pang, and T. Wang, Privacy-aware data fusion and prediction with spatial-temporal context for smart city industrial environment, IEEE Trans. Industr. Inform., vol. 17, no. 6, pp. 4159–4167, 2021.
Y. L. Chen, J. Sun, Y. X. Yang, T. Li, X. X. Niu, and H. Y. Zhou, PSSPR: A source location privacy protection scheme based on sector phantom routing in WSNs, Int. J. Intell. Syst., vol. 37, no. 2, pp. 1204–1221, 2022.
J. Mabrouki, M. Azrour, D. Dhiba, Y. Farhaoui, and S. El Hajjaji, IoT-based data logger for weather monitoring using arduino-based wireless sensor networks with remote graphical application and alerts, Big Data Mining and Analytics, vol. 4, no. 1, pp. 25–32, 2021.
Y. Khazbak, J. Y. Fan, S. C. Zhu, and G. H. Cao, Preserving personalized location privacy in ride-hailing service, Tsinghua Science and Technology, vol. 25, no. 6, pp. 743–757, 2020.
Y. W. Liu, A. X. Pei, F. Wang, Y. H. Yang, X. Y. Zhang, H. Wang, H. N. Dai, L. Y. Qi, and R. Ma, An attention-based category-aware GRU model for the next poi recommendation, Int. J. Intell. Syst., vol. 36, no. 7, pp. 3174–3189, 2021.
P. Nitu, J. Coelho, and P. Madiraju, Improvising personalized travel recommendation system with recency effects, Big Data Mining and Analytics, vol. 4, no. 3, pp. 139–154, 2021.
R. Kumari, S. Kumar, R. C. Poonia, V. Singh, L. Raja, V. Bhatnagar, and P. Agarwal, Analysis and predictions of spread, recovery, and death caused by covid-19 in India, Big Data Mining and Analytics, vol. 4, no. 2, pp. 65–75, 2021.
H. S. Chen, Y. P. Zhang, Y. R. Cao, and J. Xie, Security issues and defensive approaches in deep learning frameworks, Tsinghua Science and Technology, vol. 26, no. 6, pp. 894–905, 2021.
S. Y. Xu, X. Chen, and Y. H. He, EVchain: An anonymous blockchain-based system for charging-connected electric vehicles, Tsinghua Science and Technology, vol. 26, no. 6, pp. 845–856, 2021.
C. Dwork, Differential privacy, in Proc. 33rd Int. Colloquium on Automata, Languages and Programming, Venice, Italy, 2006, pp. 1–12.
C. Dwork, K. Kenthapadi, F. McSherry, I. Mironov, and M. Naor, Our data, ourselves: Privacy via distributed noise generation, in Proc. 24th Annu. Int. Conf. on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, 2006, pp. 486–503.
C. Dwork and G. N. Rothblum, Concentrated differential privacy, arXiv preprint arXiv: 1603.01887, 2016.
P. Austrin, Towards sharp inapproximability for any 2-CSP, in Proc. 48th Annu. IEEE Symp. on Foundations of Computer Science (FOCS’07), Providence, RI, USA, 2007, pp. 307–317.
Q. Geng and P. Viswanath, The optimal noise-adding mechanism in differential privacy, IEEE Trans. Inf. Theory, vol. 62, no. 2, pp. 925–951, 2016.
C. Li, G. Miklau, M. Hay, A. McGregor, and V. Rastogi, The matrix mechanism: Optimizing linear counting queries under differential privacy, VLDB J., vol. 24, no. 6, pp. 757–781, 2015.
Y. L. Chen, S. Dong, T. Li, Y. L. Wang, and H. Y. Zhou, Dynamic multi-key FHE in asymmetric key setting from LWE, IEEE Trans. Inf. Foren. Sec., vol. 16, pp. 5239–5249, 2021.
R. Shokri, G. Theodorakopoulos, C. Troncoso, J. P. Hubaux, and J. Y. Le Boudec, Protecting location privacy: Optimal strategy against localization attacks, in Proc. 2012 ACM Conf. on Computer and Communications Security, Raleigh, NC, USA, 2012, pp. 617–627.
K. Chatzikokolakis, C. Palamidessi, and M. Stronati, Geo-indistinguishability: A principled approach to location privacy, in Proc. 11th Int. Conf. on Distributed Computing and Internet Technology, Bhubaneswar, India, 2015, pp. 49–72.
R. Shokri, Privacy games: Optimal user-centric data obfuscation, Proc. Priv. Enhanc. Technol., vol. 2015, no. 2, pp. 299–315, 2015.
L. N. Ni, C. Li, X. Wang, H. L. Jiang, and J. G. Yu, DP-MCDBSCAN: Differential privacy preserving multi-core DBSCAN clustering for network user data, IEEE Access, vol. 6, pp. 21053–21063, 2018.
B. Niu, Q. H. Li, X. Y. Zhu, G. H. Cao, and H. Li, Achieving k-anonymity in privacy-aware location-based services, in Proc. IEEE Conf. on Computer Communications, Toronto, Canada, 2014, pp. 754–762.
B. Niu, Q. H. Li, X. Y. Zhu, G. H. Cao, and H. Li, Enhancing privacy through caching in location-based services, in Proc. 2015 IEEE Conf. on Computer Communications (INFOCOM), Hong Kong, China, 2015, pp. 1017–1025.
H. To, K. Nguyen, and C. Shahabi, Differentially private publication of location entropy, in Proc. 24th ACM SIGSPATIAL Int. Conf. on Advances in Geographic Information Systems, Burlingame, CA, USA, 2016, p. 35.
Y. L. Wang, G. Y. Yang, T. Li, F. Y. Li, Y. L. Tian, and X. M. Yu, Belief and fairness: A secure two-party protocol toward the view of entropy for IoT devices, J. Netw. Comput. Appl., vol. 161, p. 102641, 2020.
G. J. Han, H. Wang, M. Guizani, S. Chan, and W. B. Zhang, KCLP: A k-means cluster-based location privacy protection scheme in WSNs for IoT, IEEE Wirel. Commun., vol. 25, no. 6, pp. 84–90, 2018.
L. N. Ni, F. L. Tian, Q. H. Ni, Y. Yan, and J. Q. Zhang, An anonymous entropy-based location privacy protection scheme in mobile social networks, EURASIP J. Wirel. Commun. Netw., vol. 2019, p. 93, 2019.
H. Liu, X. H. Li, B. Luo, Y. W. Wang, Y. B. Ren, J. F. Ma, and H. F. Ding, Distributed k-anonymity location privacy protection scheme based on blockchain, (in Chinese), Chin. J. Comput., vol. 42, no. 5, pp. 942–960, 2019.
T. Li, Z. J. Wang, G. Y. Yang, Y. Cui, Y. L. Chen, and X. M. Yu, Semi-selfish mining based on hidden Markov decision process, Int. J. Intell. Syst., vol. 36, no. 7, pp. 3596–3612, 2021.
T. Li, Z. J. Wang, Y. L. Chen, C. M. Li, Y. L. Jia, and Y. X. Yang, Is semi-selfish mining available without being detected? Int. J. Intell. Syst., .
Y. L. Wang, G. Y. Yang, A. Bracciali, H. F. Leung, H. B. Tian, L. S. Ke, and X. M. Yu, Incentive compatible and anti-compounding of wealth in proof-of-stake, Inf. Sci., vol. 530, pp. 85–94, 2020.
T. Li, Y. L. Chen, Y. L. Wang, Y. L. Wang, M. H. Zhao, H. J. Zhu, Y. L. Tian, X. M. Yu, and Y. X. Yang, Rational protocols and attacks in blockchain system, Sec. Commun. Netw., vol. 2020, p. 8839047, 2020.
X. J. Zhu, E. Ayday, and R. Vitenberg, A privacy-preserving framework for outsourcing location-based services to the cloud, IEEE Trans. Dependable Secure Comput., vol. 18, no. 1, pp. 384–399, 2021.
Z. Huo and X. F. Meng, A trajectory data publication method under differential privacy, (in Chinese), Chin. J. Comput., vol. 41, no. 2, pp. 400–412, 2018.
X. D. Bi, Y. Liang, H. Z. Shi, and H. Tian, A parameterized location privacy protection method based on two-level anonymity, (in Chinese), J. Shandong Univ. (Nat. Sci.), vol. 52, no. 5, pp. 75–84, 2017.
C. E. Shannon, A mathematical theory of communication, ACM Sigmobile Mobile Comput. Commun. Rev., vol. 5, no. 1, pp. 3–55, 2001.
Y. F. Wang, Y. L. Luo, Q. Y. Yu, Q. Q. Liu, and W. Chen, Trajectory privacy-preserving method based on information entropy suppression, (in Chinese), J. Comput. Appl., vol. 38, no. 11, pp. 3252–3257, 2018.
L. W. Ouyang, S. Wang, Y. Yuan, X. C. Ni, and F. Y. Wang, Smart contracts: Architecture and research progresses, (in Chinese), Acta Automat. Sin., vol. 45, no. 3, pp. 445–457, 2019.
F. Y. Li, D. F. Wang, Y. L. Wang, X. M. Yu, N. Wu, J. G. Yu, and H. Y. Zhou, Wireless communications and mobile computing blockchain-based trust management in distributed internet of things, Wirel. Commun. Mobile Comput., vol. 2020, p. 8864533, 2020.
F. Y. Li, R. Ge, H. Y. Zhou, Y. L. Wang, Z. X. Liu, and X. M. Yu, Tesia: A trusted efficient service evaluation model in internet of things based on improved aggregation signature, Concurr. Comput.: Pract. Exp., .
B. K. Samanthula, D. Karthikeyan, B. X. Dong, and K. A. Kumari, ESPADE: An efficient and semantically secure shortest path discovery for outsourced location-based services, Cryptography, vol. 4, no. 4, p. 29, 2020.