共 27 条
- [11] Jingyu Hua, 2015, 2015 IEEE Conference on Computer Communications (INFOCOM). Proceedings, P549, DOI 10.1109/INFOCOM.2015.7218422
- [13] Khan K, 2014, 2014 FIFTH INTERNATIONAL CONFERENCE ON THE APPLICATIONS OF DIGITAL INFORMATION AND WEB TECHNOLOGIES (ICADIWT), P232, DOI 10.1109/ICADIWT.2014.6814687
- [15] How Much Is Enough? Choosing ε for Differential Privacy [J]. INFORMATION SECURITY, 2011, 7001 : 325 - 340
- [17] Outlier Trajectory Detection: A Trajectory Analytics Based Approach [J]. DATABASE SYSTEMS FOR ADVANCED APPLICATIONS (DASFAA 2017), PT I, 2017, 10177 : 231 - 246
- [18] An overview on trajectory outlier detection [J]. ARTIFICIAL INTELLIGENCE REVIEW, 2019, 52 (04) : 2437 - 2456