References(43)
[1]
X. Pan, Z. Huo, and X. F. Meng, Location Big Data Privacy Management, (in Chinese). Beijing, China: Machine Press, 2017.
[2]
J. Li, X. Pei, X. J. Wang, D. Y. Yao, Y. Zhang, and Y. Yue, Transportation mode identification with GPS trajectory data and GIS information, Tsinghua Science and Technology, vol. 26, no. 4, pp. 403–416, 2021.
[3]
M. Azrour, J. Mabrouki, A. Guezzaz, and Y. Farhaoui, New enhanced authentication protocol for internet of things, Big Data Mining and Analytics, vol. 4, no. 1, pp. 1–9, 2021.
[4]
L. Y. Qi, C. H. Hu, X. Y. Zhang, M. R. Khosravi, S. Sharma, S. N. Pang, and T. Wang, Privacy-aware data fusion and prediction with spatial-temporal context for smart city industrial environment, IEEE Trans. Industr. Inform., vol. 17, no. 6, pp. 4159–4167, 2021.
[5]
Y. L. Chen, J. Sun, Y. X. Yang, T. Li, X. X. Niu, and H. Y. Zhou, PSSPR: A source location privacy protection scheme based on sector phantom routing in WSNs, Int. J. Intell. Syst., vol. 37, no. 2, pp. 1204–1221, 2022.
[6]
J. Mabrouki, M. Azrour, D. Dhiba, Y. Farhaoui, and S. El Hajjaji, IoT-based data logger for weather monitoring using arduino-based wireless sensor networks with remote graphical application and alerts, Big Data Mining and Analytics, vol. 4, no. 1, pp. 25–32, 2021.
[7]
Y. Khazbak, J. Y. Fan, S. C. Zhu, and G. H. Cao, Preserving personalized location privacy in ride-hailing service, Tsinghua Science and Technology, vol. 25, no. 6, pp. 743–757, 2020.
[8]
Y. W. Liu, A. X. Pei, F. Wang, Y. H. Yang, X. Y. Zhang, H. Wang, H. N. Dai, L. Y. Qi, and R. Ma, An attention-based category-aware GRU model for the next poi recommendation, Int. J. Intell. Syst., vol. 36, no. 7, pp. 3174–3189, 2021.
[9]
P. Nitu, J. Coelho, and P. Madiraju, Improvising personalized travel recommendation system with recency effects, Big Data Mining and Analytics, vol. 4, no. 3, pp. 139–154, 2021.
[10]
R. Kumari, S. Kumar, R. C. Poonia, V. Singh, L. Raja, V. Bhatnagar, and P. Agarwal, Analysis and predictions of spread, recovery, and death caused by covid-19 in India, Big Data Mining and Analytics, vol. 4, no. 2, pp. 65–75, 2021.
[11]
H. S. Chen, Y. P. Zhang, Y. R. Cao, and J. Xie, Security issues and defensive approaches in deep learning frameworks, Tsinghua Science and Technology, vol. 26, no. 6, pp. 894–905, 2021.
[12]
S. Y. Xu, X. Chen, and Y. H. He, EVchain: An anonymous blockchain-based system for charging-connected electric vehicles, Tsinghua Science and Technology, vol. 26, no. 6, pp. 845–856, 2021.
[13]
C. Dwork, Differential privacy, in Proc. 33rd Int. Colloquium on Automata, Languages and Programming, Venice, Italy, 2006, pp. 1–12.
[14]
C. Dwork, K. Kenthapadi, F. McSherry, I. Mironov, and M. Naor, Our data, ourselves: Privacy via distributed noise generation, in Proc. 24th Annu. Int. Conf. on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, 2006, pp. 486–503.
[15]
C. Dwork and G. N. Rothblum, Concentrated differential privacy, arXiv preprint arXiv: 1603.01887, 2016.
[16]
P. Austrin, Towards sharp inapproximability for any 2-CSP, in Proc. 48th Annu. IEEE Symp. on Foundations of Computer Science (FOCS’07), Providence, RI, USA, 2007, pp. 307–317.
[17]
Q. Geng and P. Viswanath, The optimal noise-adding mechanism in differential privacy, IEEE Trans. Inf. Theory, vol. 62, no. 2, pp. 925–951, 2016.
[18]
C. Li, G. Miklau, M. Hay, A. McGregor, and V. Rastogi, The matrix mechanism: Optimizing linear counting queries under differential privacy, VLDB J., vol. 24, no. 6, pp. 757–781, 2015.
[19]
Y. L. Chen, S. Dong, T. Li, Y. L. Wang, and H. Y. Zhou, Dynamic multi-key FHE in asymmetric key setting from LWE, IEEE Trans. Inf. Foren. Sec., vol. 16, pp. 5239–5249, 2021.
[20]
R. Shokri, G. Theodorakopoulos, C. Troncoso, J. P. Hubaux, and J. Y. Le Boudec, Protecting location privacy: Optimal strategy against localization attacks, in Proc. 2012 ACM Conf. on Computer and Communications Security, Raleigh, NC, USA, 2012, pp. 617–627.
[21]
K. Chatzikokolakis, C. Palamidessi, and M. Stronati, Geo-indistinguishability: A principled approach to location privacy, in Proc. 11th Int. Conf. on Distributed Computing and Internet Technology, Bhubaneswar, India, 2015, pp. 49–72.
[22]
R. Shokri, Privacy games: Optimal user-centric data obfuscation, Proc. Priv. Enhanc. Technol., vol. 2015, no. 2, pp. 299–315, 2015.
[23]
L. N. Ni, C. Li, X. Wang, H. L. Jiang, and J. G. Yu, DP-MCDBSCAN: Differential privacy preserving multi-core DBSCAN clustering for network user data, IEEE Access, vol. 6, pp. 21053–21063, 2018.
[24]
B. Niu, Q. H. Li, X. Y. Zhu, G. H. Cao, and H. Li, Achieving k-anonymity in privacy-aware location-based services, in Proc. IEEE Conf. on Computer Communications, Toronto, Canada, 2014, pp. 754–762.
[25]
B. Niu, Q. H. Li, X. Y. Zhu, G. H. Cao, and H. Li, Enhancing privacy through caching in location-based services, in Proc. 2015 IEEE Conf. on Computer Communications (INFOCOM), Hong Kong, China, 2015, pp. 1017–1025.
[26]
H. To, K. Nguyen, and C. Shahabi, Differentially private publication of location entropy, in Proc. 24th ACM SIGSPATIAL Int. Conf. on Advances in Geographic Information Systems, Burlingame, CA, USA, 2016, p. 35.
[27]
Y. L. Wang, G. Y. Yang, T. Li, F. Y. Li, Y. L. Tian, and X. M. Yu, Belief and fairness: A secure two-party protocol toward the view of entropy for IoT devices, J. Netw. Comput. Appl., vol. 161, p. 102641, 2020.
[28]
G. J. Han, H. Wang, M. Guizani, S. Chan, and W. B. Zhang, KCLP: A k-means cluster-based location privacy protection scheme in WSNs for IoT, IEEE Wirel. Commun., vol. 25, no. 6, pp. 84–90, 2018.
[29]
L. N. Ni, F. L. Tian, Q. H. Ni, Y. Yan, and J. Q. Zhang, An anonymous entropy-based location privacy protection scheme in mobile social networks, EURASIP J. Wirel. Commun. Netw., vol. 2019, p. 93, 2019.
[30]
H. Liu, X. H. Li, B. Luo, Y. W. Wang, Y. B. Ren, J. F. Ma, and H. F. Ding, Distributed k-anonymity location privacy protection scheme based on blockchain, (in Chinese), Chin. J. Comput., vol. 42, no. 5, pp. 942–960, 2019.
[31]
T. Li, Z. J. Wang, G. Y. Yang, Y. Cui, Y. L. Chen, and X. M. Yu, Semi-selfish mining based on hidden Markov decision process, Int. J. Intell. Syst., vol. 36, no. 7, pp. 3596–3612, 2021.
[32]
T. Li, Z. J. Wang, Y. L. Chen, C. M. Li, Y. L. Jia, and Y. X. Yang, Is semi-selfish mining available without being detected? Int. J. Intell. Syst., .
[33]
Y. L. Wang, G. Y. Yang, A. Bracciali, H. F. Leung, H. B. Tian, L. S. Ke, and X. M. Yu, Incentive compatible and anti-compounding of wealth in proof-of-stake, Inf. Sci., vol. 530, pp. 85–94, 2020.
[34]
T. Li, Y. L. Chen, Y. L. Wang, Y. L. Wang, M. H. Zhao, H. J. Zhu, Y. L. Tian, X. M. Yu, and Y. X. Yang, Rational protocols and attacks in blockchain system, Sec. Commun. Netw., vol. 2020, p. 8839047, 2020.
[35]
X. J. Zhu, E. Ayday, and R. Vitenberg, A privacy-preserving framework for outsourcing location-based services to the cloud, IEEE Trans. Dependable Secure Comput., vol. 18, no. 1, pp. 384–399, 2021.
[36]
Z. Huo and X. F. Meng, A trajectory data publication method under differential privacy, (in Chinese), Chin. J. Comput., vol. 41, no. 2, pp. 400–412, 2018.
[37]
X. D. Bi, Y. Liang, H. Z. Shi, and H. Tian, A parameterized location privacy protection method based on two-level anonymity, (in Chinese), J. Shandong Univ. (Nat. Sci.), vol. 52, no. 5, pp. 75–84, 2017.
[38]
C. E. Shannon, A mathematical theory of communication, ACM Sigmobile Mobile Comput. Commun. Rev., vol. 5, no. 1, pp. 3–55, 2001.
[39]
Y. F. Wang, Y. L. Luo, Q. Y. Yu, Q. Q. Liu, and W. Chen, Trajectory privacy-preserving method based on information entropy suppression, (in Chinese), J. Comput. Appl., vol. 38, no. 11, pp. 3252–3257, 2018.
[40]
L. W. Ouyang, S. Wang, Y. Yuan, X. C. Ni, and F. Y. Wang, Smart contracts: Architecture and research progresses, (in Chinese), Acta Automat. Sin., vol. 45, no. 3, pp. 445–457, 2019.
[41]
F. Y. Li, D. F. Wang, Y. L. Wang, X. M. Yu, N. Wu, J. G. Yu, and H. Y. Zhou, Wireless communications and mobile computing blockchain-based trust management in distributed internet of things, Wirel. Commun. Mobile Comput., vol. 2020, p. 8864533, 2020.
[42]
F. Y. Li, R. Ge, H. Y. Zhou, Y. L. Wang, Z. X. Liu, and X. M. Yu, Tesia: A trusted efficient service evaluation model in internet of things based on improved aggregation signature, Concurr. Comput.: Pract. Exp., .
[43]
B. K. Samanthula, D. Karthikeyan, B. X. Dong, and K. A. Kumari, ESPADE: An efficient and semantically secure shortest path discovery for outsourced location-based services, Cryptography, vol. 4, no. 4, p. 29, 2020.