共 28 条
[1]
GAMBS S, KILLIJIAN M O, DEL PRADO CORTEZ M N., De-anonymization attack on geolocated data, Journal of computer and system sciences, 80, 8, pp. 1597-1614, (2013)
[2]
KRUMM J., Inference attacks on location tracks, Proceedings of the 5th International Conference on Pervasive Computing, pp. 127-143, (2007)
[3]
GONZALEZ M C, HIDALGO C A, BARABASI B., Understanding individual human mobility patterns, Nature, 453, 7196, pp. 779-782, (2008)
[4]
SONG Chaoming, QU Zehui, BLUMM N, Et al., Limits of predictability in human mobility, Science, 327, 5968, pp. 1018-1021, (2010)
[5]
JEDRZEJCZYK L, PRICE B A, BANDARA A K, Et al., I Know What You Did Last Summer: risks of location data leakage in mobile and social computing, Department of Computing Faculty of Mathematics, Computing and Technology the Open University, pp. 1744-1986, (2009)
[6]
BETTINI C, WANG X S, JAJODIA S., Protecting privacy against location-based personal identification, Proceedings of the Second VLDB Workshop on Secure Data Management, 3674, pp. 185-199, (2005)
[7]
GAMBS S, KILLIJIAN M O, DEL PRADO CORTEZ M N., Show me how you move and I will tell you who you are, Transactions on data privacy, 2, 4, pp. 103-126, (2010)
[8]
MA C Y T, YAU D K Y, YIP N K, Et al., Privacy Vulnerability of published anonymous mobility traces, IEEE/ACM transactions on networking, 21, 3, pp. 720-733, (2013)
[9]
SHOKRI R, THEODORAKOPOULOS G, LE BOUDEC J Y, Et al., Quantifying location privacy, Proceedings of 2011 IEEE Symposium on Security and Privacy, pp. 247-262, (2011)
[10]
SRIVATSA M, HICKS M., Deanonymizing mobility traces: using social network as a side-channel, Proceedings of 2012 ACM Conference on Computer and Communications Security, pp. 628-637, (2012)