吉林大学学报(工学版) ›› 2014, Vol. 44 ›› Issue (2): 454-458.doi: 10.13229/j.cnki.jdxbgxb201402028
• paper • Previous Articles Next Articles
CAI Zhao-hui1,2, ZHANG Jian-pei1, YANG Jing1
CLC Number:
[1] Authorities: GPS system used to stalk woman. USA Today.[DB/OL] http://www.usatoday.com/ tech/new/2002-12-30-gps-stalker_x.htm, 2002.[2] Gedik B, Liu L. Location privacy in mobile systems: a personalized anonymization model[C]//Proceedings of the 25th IEEE International Conference on Distributed Computing Systems, Columbus: IEEE Computer Society, 2005: 620-629.[3] Chow C, Mokbel M F. Enabling private continuous queries for revealed user locations[C]//Proceedings of the 10th International Conference on Advances in Spatial and Temporal Databases. Boston: Springer, 2007: 258-275.[4] Mokbel M F. Privacy in location-based services: state-of-the-art and research directions[C]//Proceedings of 8th International Conference on Mobile Data Management, Mannheim, 2007:228.[5] Gruteser M, Grunwald D. Anonymous usage of location-based services through spatial and temporal cloaking[C]//Proceedings of the International Conference on Mobile Systems, Applications, and Services, Scan Francisco, 2003:163-168.[6] Gabriel Ghinita, Panos Kalnis, Ali Khoshgozaran, et al. Private queries in location based services: anonymizers are not necessary[C]//Proceedings of the 2008 ACM SIGMOD International Conference on Management of Data, SIGMOD, 2008:121-132.[7] Xiao Z, Xu J, Meng X F. P-sensitivity: a semantic privacy-protection model for location-based services[C]//Proceedings of PALMS2008, China, 2008:47-54.[8] Gedik Bugra, Liu Ling. Protecting location privacy with personalized k-anonymity: architecture and algorithms[J]. IEEE Transactions on Mobile Computing, 2008, 7(1): 1-18.[9] Baik Hoh, Marco Gruteser. Protecting location privacy through path confusion[C]//Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, Athens, 2005: 194-205.[10] Machanavajjhala A, Gehrke J, Kifer D. L-diversity: privacy beyond K-anonymity[C]//Proceedings of 22nd International Conference on Data Engineering, Atlanta, 2006: 24-35.[11] Wang Ting, Liu Ling. Privacy-aware mobile services over road networks[C]//Proceedings of the VLDB Endowment, Lyon, 2009, 2(1): 1042-1053.[12] Chow C, Mokbel M F, Bao J, et al. Query-aware location anonymization for road networks[J]. GeoInformatica, 2011, 15(3): 571-607.[13] Li Fei-fei, Cheng Di-han, Marios Hadjieleftheriou, et al. On trip planning queries in spatial databases[C]//Proceedings of 9th International Symposium, SSTD 2005. Berlin: Springer, 2005: 273-290. |
[1] | WANG Li-min,LIU Yang,SUN Ming-hui,LI Mei-hui. Ensemble of unrestricted K-dependence Bayesian classifiers based on Markov blanket [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1851-1858. |
[2] | DONG Sa, LIU Da-you, OUYANG Ruo-chuan, ZHU Yun-gang, LI Li-na. Logistic regression classification in networked data with heterophily based on second-order Markov assumption [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1571-1577. |
[3] | GU Hai-jun, TIAN Ya-qian, CUI Ying. Intelligent interactive agent for home service [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1578-1585. |
[4] | WANG Xu, OUYANG Ji-hong, CHEN Gui-fen. Measurement of graph similarity based on vertical dimension sequence dynamic time warping method [J]. 吉林大学学报(工学版), 2018, 48(4): 1199-1205. |
[5] | ZHANG Hao, ZHAN Meng-ping, GUO Liu-xiang, LI Zhi, LIU Yuan-ning, ZHANG Chun-he, CHANG Hao-wu, WANG Zhi-qiang. Human exogenous plant miRNA cross-kingdom regulatory modeling based on high-throughout data [J]. 吉林大学学报(工学版), 2018, 48(4): 1206-1213. |
[6] | SUN Xiao-ying, HU Ze-zheng, YANG Jin-peng. Assessment method of electromagnetic pulse sensitivity of vehicle engine system based on hierarchical Bayesian networks [J]. 吉林大学学报(工学版), 2018, 48(4): 1254-1264. |
[7] | HUANG Lan, JI Lin-ying, YAO Gang, ZHAI Rui-feng, BAI Tian. Construction of disease-symptom semantic net for misdiagnosis prompt [J]. 吉林大学学报(工学版), 2018, 48(3): 859-865. |
[8] | LI Xiong-fei, FENG Ting-ting, LUO Shi, ZHANG Xiao-li. Automatic music composition algorithm based on recurrent neural network [J]. 吉林大学学报(工学版), 2018, 48(3): 866-873. |
[9] | LIU Jie, ZHANG Ping, GAO Wan-fu. Feature selection method based on conditional relevance [J]. 吉林大学学报(工学版), 2018, 48(3): 874-881. |
[10] | WANG Xu, OUYANG Ji-hong, CHEN Gui-fen. Heuristic algorithm of all common subsequences of multiple sequences for measuring multiple graphs similarity [J]. 吉林大学学报(工学版), 2018, 48(2): 526-532. |
[11] | YANG Xin, XIA Si-jun, LIU Dong-xue, FEI Shu-min, HU Yin-ji. Target tracking based on improved accelerated gradient under tracking-learning-detection framework [J]. 吉林大学学报(工学版), 2018, 48(2): 533-538. |
[12] | LIU Xue-juan, YUAN Jia-bin, XU Juan, DUAN Bo-jia. Quantum k-means algorithm [J]. 吉林大学学报(工学版), 2018, 48(2): 539-544. |
[13] | SUN Xiao-ying, WANG Zhen, YANG Jin-peng, HU Ze-zheng, CHEN Jian. Electromagnetic susceptibility assessment of electronic throttle based on Bayesian network [J]. 吉林大学学报(工学版), 2018, 48(1): 281-289. |
[14] | QU Hui-yan, ZHAO Wei, QIN Ai-hong. A fast collision detection algorithm based on optimization operator [J]. 吉林大学学报(工学版), 2017, 47(5): 1598-1603. |
[15] | LI Jia-fei, SUN Xiao-yu. Clustering method for uncertain data based on spectral decomposition [J]. 吉林大学学报(工学版), 2017, 47(5): 1604-1611. |
|