共 42 条
[31]
De-anonymizing Social Networks
[J].
PROCEEDINGS OF THE 2009 30TH IEEE SYMPOSIUM ON SECURITY AND PRIVACY,
2009,
:173-187
[32]
Back to the Drawing Board: Revisiting the Design of Optimal Location Privacy-preserving Mechanisms
[J].
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2017,
:1959-1972
[33]
Linking Users Across Domains with Location Data: Theory and Validation
[J].
PROCEEDINGS OF THE 25TH INTERNATIONAL CONFERENCE ON WORLD WIDE WEB (WWW'16),
2016,
:707-719
[34]
Quantifying Location Privacy
[J].
2011 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2011),
2011,
:247-262
[35]
Srivatsa Mudhakar., 2012, ACM C COMP COMM SEC, P628, DOI [https://doi.org/10.1145/2382196.2382262, DOI 10.1145/2382196.2382262]
[37]
Thomas M., 2006, Elements of Information Theory
[38]
Valcarce D., 2016, P CERI
[39]
Wang Gang., 2016, P 10 INT AAAI C WEB, P417
[40]
Zang H., 2011, P 17 ANN INT C MOB C, P145, DOI [DOI 10.1145/2030613.2030630, 10.1145/2030613.2030630]