References(40)
[1]
Y. Huang, Y. J. Li, and Z. Cai, Security and privacy in metaverse: A comprehensive survey, Big Data Mining and Analytics, vol. 6, no. 2, pp. 234–247, 2023.
[2]
O. Abul, F. Bonchi, and M. Nanni, Never walk alone: Uncertainty for anonymity in moving objects databases, in Proc. 2008 IEEE 24th Int. Conf. Data Engineering, Cancun, Mexico, 2008, pp. 376–385.
[3]
P. Samarati and L. Sweeney, Generalizing data to provide anonymity when disclosing information, in Proc.17th ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, Seattle, WA, USA, 1998, pp. 188–201.
[4]
O. Abul, F. Bonchi, and M. Nanni, Anonymization of moving objects databases by clustering and perturbation, Inf. Syst., vol. 35, no. 8, pp. 884–910, 2010.
[5]
N. Mohammed, B. C. M. Fung, and M. Debbabi, Walking in the crowd: Anonymizing trajectory data for pattern analysis, in Proc. 18th ACM Conf. Information and Knowledge Management, Hong Kong, China, 2009, pp. 1441–1444.
[6]
R. Chen, B. C. M. Fung, N. Mohammed, B. C. Desai, and K. Wang, Privacy-preserving trajectory data publishing by local suppression, Inf. Sci., vol. 231, pp. 83–97, 2013.
[7]
S. Papadopoulos, S. Bakiras, and D. Papadias, Nearest neighbor search with strong location privacy, Proc. VLDB Endow., vol. 3, nos. 1&2, pp. 619–629, 2010.
[8]
S. Yang, C. Ma, and C. Zhou, SL-Cloak: PIR technology based stochastic location cloaking method, in Proc. Int. Conf. Computer, Network Security and Communication Engineering, Shenzhen, China, 2014, pp. 395–399.
[9]
J. Freudiger, M. Raya, and M. Feleghhazi, Mix-zones for location privacy in vehicular networks, presented at WiN-ITS, Vancouver, Canada, 2007.
[10]
I. Memon, H. T. Mirza, Q. A. Arain, and H. Memon, Multiple mix zones de-correlation trajectory privacy model for road network, Telecommun. Syst., vol. 70, no. 4, pp. 557–582, 2019.
[11]
C. Dwork, Differential privacy in new settings, in Proc. Twenty-First Annual ACM-SIAM Symposium on Discrete Algorithms, Austin, TX, USA, 2010, pp.174–183.
[12]
K. Zhang, Z. Tian, Z. Cai, and D. Seo, Link-privacy preserving graph embedding data publication with adversarial learning, Tsinghua Science and Technology, vol. 27, no. 2, pp. 244–256, 2022.
[13]
R. Chen, B. C. M. Fung, and B. C. Desai, Differentially private trajectory data publication, arXiv preprint arXiv: 1112.2020, 2011.
[14]
Z. Cai, X. Zheng, J. Wang, and Z. He, Private data trading towards range counting queries in Internet of Things, IEEE Trans. Mob. Comput., vol. 22, no. 8, pp. 4881–4897, 2023.
[15]
Z. Cai and Z. He, Trading private range counting over big IoT data, in Proc. 2019 IEEE 39th Int. Conf. Distributed Computing Systems (ICDCS), Dallas, TX, USA, 2019, pp. 144–153.
[16]
Z. Cai and X. Zheng, A private and efficient mechanism for data uploading in smart cyber-physical systems, IEEE Trans. Netw. Sci. Eng., vol. 7, no. 2, pp. 766–775, 2020.
[17]
X. Zheng and Z. Cai, Privacy-preserved data sharing towards multiple parties in industrial IoTs, IEEE J. Sel. Areas Commun., vol. 38, no. 5, pp. 968–979, 2020.
[18]
R. Chen, B. C. M. Fung, B. C. Desai, and N. M. Sossou, Differentially private transit data publication: A case study on the Montreal transportation system, in Proc. 18th ACM SIGKDD Int. Conf. Knowledge Discovery and Data Mining, Beijing, China, 2012, pp. 213–221.
[19]
S. S. Ho and S. Ruan, Differential privacy for location pattern mining, in Proc. 4th ACM SIGSPATIAL Int. Workshop on Security and Privacy in GIS and LBS, Chicago, IL, USA, 2011, pp. 17–24.
[20]
Y. Xiao and L. Xiong, Protecting locations with differential privacy under temporal correlations, in Proc. 22nd ACM SIGSAC Conf. Computer and Communications Security, Denver, CO, USA, 2015, pp. 1298–1309.
[21]
L. Ou, Z. Qin, S. Liao, Y. Hong, and X. Jia, Releasing correlated trajectories: Towards high utility and optimal differential privacy, IEEE Trans. Dependable Secure Comput., vol. 17, no. 5, pp. 1109–1123, 2020.
[22]
Y. Wang, M. Li, S. Luo, Y. Xin, H. Zhu, Y. Chen, G. Yang, and Y. Yang, LRM: A location recombination mechanism for achieving trajectory k-anonymity privacy protection, IEEE Access, vol. 7, pp. 182886–182905, 2019.
[23]
W. Zhang, G. Yin, Y. Sha, and J. Yang, Protecting the moving user’s locations by combining differential privacy and k-anonymity under temporal correlations in wireless networks, Wirel. Commun. Mob. Comput., vol. 2021, pp. 1–12, 2021.
[24]
Z. Hu, J. Yang, and J. Zhang, Trajectory privacy protection method based on the time interval divided, Comput. Secur., vol. 77, pp. 488–499, 2018.
[25]
L. Gong, H. Sato, T. Yamamoto, T. Miwa, and T. Morikawa, Identification of activity stop locations in GPS trajectories by density-based clustering method combined with support vector machines, J. Mod. Transp., vol. 23, pp. 202–213, 2015.
[26]
T. Luo, X. Zheng, G. Xu, K. Fu, and W. Ren, An improved DBSCAN algorithm to detect stops in individual trajectories, ISPRS Int. J. Geo Inf., vol. 6, no. 3, p. 63, 2017.
[27]
L. Bermingham and I. Lee, A probabilistic stop and move classifier for noisy GPS trajectories, Data Min. Knowl. Discov., vol. 32, no. 6, pp. 1634–1662, 2018.
[28]
P. Kairouz, S. Oh, and P. Viswanath, Extremal mechanisms for local differential privacy, in Proc. 27th Int. Conf. Neural Information Processing Systems, Montreal, Canada, 2014, pp. 2879–2887.
[29]
W. Y. Gan, D. Y. Li, and J. M. Wang, An hierarchical clustering method based on data fields, Acta Electron. Sin., vol. 35, no. 2, pp. 258–262, 2006.
[30]
Z. Cai, Z. Xiong, H. Xu, P. Wang, W. Li, and Y. Pan, Generative adversarial networks: A survey toward private and secure applications, ACM Comput. Surv., vol. 54, no. 6, pp. 1–38, 2021.
[31]
Y. Zheng, L. Zhang, X. Xie, and W. Y. Ma, Mining interesting locations and travel sequences from GPS trajectories, in Proc. 18th Int. Conf. World Wide Web, Madrid, Spain, 2009, pp. 791–800.
[32]
Y. Zheng, Q. Li, Y. Chen, X. Xie, and W. Y. Ma, Understanding mobility based on GPS data, in Proc. 10th Int. Conf. Ubiquitous Computing, Seoul, Republic of Korea, 2008, pp. 312–321.
[33]
Y. Zheng, X. Xie, and W. Y. Ma, GeoLife: A collaborative social networking service among user, location and trajectory, IEEE Data Eng. Bull., vol. 33, pp.32–39, 2010.
[34]
A. T. Palma, V. Bogorny, B. Kuijpers, and L. O. Alvares, A clustering-based approach for discovering interesting places in trajectories, in Proc. 2008 ACM Symp. on Applied computing, Fortaleza, Brazil, 2008, pp. 863–868.
[35]
K. Gu, L. Yang, Y. Liu, and N. Liao, Trajectory data privacy protection based on differential privacy mechanism, in Proc. 2017 2nd Int. Conf. Reliability Engineering (ICRE 2017), Milan, Italy, 2017, pp. 122–127.
[36]
Z. Cai, Z. He, X. Guan, and Y. Li, Collective data-sanitization for preventing sensitive information inference attacks in social networks, IEEE Trans. Dependable Secure Comput., vol. 15, no. 4, pp. 577–590, 2018.
[37]
J. He, B. Gong, J. Yang, H. Wang, P. Xu, and T. Xing, ASCFL: Accurate and speedy semi-supervised clustering federated learning, Tsinghua Science and Technology, vol. 28, no. 5, pp. 823–837, 2023.
[38]
M. Yang, L. Huang, C. Tang, K-means clustering with local distance privacy, Big Data Mining and Analytics, .
[39]
K. Jiang, D. Shao, S. Bressan, T. Kister, and K. L. Tan, Publishing trajectories with differential privacy guarantees, in Proc. 25th Int. Conf. Scientific and Statistical Database Management, Baltimore, MD, USA, 2013, pp. 1–12.
[40]
P. Chen, J. Gu, D. Zhu, and F. Shao, A dynamic time warping based algorithm for trajectory matching in LBS, International Journal of Database Theory and Application, vol. 6, no. 3, pp. 39–48, 2013.