共 18 条
- [1] ZHANG Xuejun, GUI Xiaolin, WU Zhongdong, Privacy preservation for location-based services: a survey, Journal of software, 26, 9, pp. 2373-2395, (2015)
- [2] ZHANG Lei, MA Chunguang, YANG Songtao, Et al., Real-time similar trajectory generation algorithm for resisting trajectory difference identification attack, Journal of Harbin Engineering University, 38, 7, pp. 1173-1178, (2017)
- [3] ZHANG Lei, YANG Songtao, LI Jing, Et al., A particle swarm optimization clustering-based attribute generalization privacy protection scheme, Journal of circuits, systems and computers, 27, 11, (2018)
- [4] ZHANG Lei, HE Lili, LIU Desheng, Et al., An attribute generalization mix-zone without privacy leakage, IEEE access, 7, pp. 57088-57099, (2019)
- [5] ZHANG Lei, MA Chunguang, YANG Songtao, Et al., Probability indistinguishable: a query and location correlation attack resistance scheme, Wireless personal communications, 97, 4, pp. 6167-6187, (2017)
- [6] ZHANG Lei, MA Chunguang, YANG Songtao, Et al., A privacy preserving method from attacks of velocity prediction in road network, Journal of Xi'an Jiaotong University, 51, 2, pp. 27-32, (2017)
- [7] LI Zengpeng, WANG Ding, Achieving one-round password-based authenticated key exchange over lattices, IEEE transactions on services computing, 12, 8, pp. 1-14, (2019)
- [8] YU Jinxia, YANG Chaochao, YANG Liwei, Et al., Attribute-based encryption scheme supporting tree access structure on ideal lattices, Journal of Chongqing University of Posts and Telecommunications(natural science edition), 31, pp. 113-119, (2019)
- [9] LI Weihao, NIU Ben, CAO Jin, Et al., A personalized range-sensitive privacy-preserving scheme in LBSs, Concurrency and computation: practice and experience, 32, 5, (2020)
- [10] KHOSHGOZARAN A, SHAHABI C, SHIRANI-MEHR H., Location privacy: going beyond K-anonymity, cloaking and anonymizers, Knowledge and information systems, 26, 3, pp. 435-465, (2011)