YANG D J, XUE G L, FANG X, et al. Incentive mechanisms for crowdsensing: crowdsourcing with smartphones[J]. IEEE/ACM Transactions on Networking, 2015, 99: 1-13.
|
GAO S, MA J F, SHI W S, et al. TrPF: A trafectory privacy-preserving framework for participatory sensing[J]. IEEE Transactions on Information Forensics and Security, 2013, 8(6): 874-887.
|
MOHAN P, PADMANABHAN V N, and RAMJEE R. Nericell: rich monitoring of road and traffic conditions using mobile smartphones[C]. Proceedings of the ACM Conference on Embedded Networked Sensor Systems, North Carolina, 2008: 323-336.
|
MONTJOYE Y A, HIDALGO C A, VERLEYSEN M, et al. Unique in the crowd: The privacy bounds of human mobility[R]. Nature Science Report, Cambridge, 2013.
|
CHRIS M, DAVID Y, and NUNG Y. Privacy vulnerability of published anonymous mobility traces[J]. IEEE Transactions on Networking, 2013, 21(3): 720-733.
|
孙利民, 李红, 王笑寒, 等. 物联网位置隐私保护综述[J]. 软件学报, 2014, 25(s1): 1-10.
|
SUN Limin, LI Hong, WANG Xiaohan, et al. Survey on the location privacy preservation in the internet of things[J]. Journal of Software, 2014, 25(s1): 1-10.
|
SHI E, CHAN T H, RIEFFEL E, et al. Privacy-preserving aggregation of time-series data[C]. Proceedings of 18th Network Distributed System Security Symposium, California, 2011: 1-17.
|
HOH B, GRUTESER M, XIONG H, et al. Achieving guaranteed anonymity in gps traces via uncertainty-aware path cloaking [J]. IEEE Transactions on Mobile Computing, 2010, 9(8): 1089-1107.
|
PALANISAMY B and LIU L. Attack-resilient mix-zones over road networks: architecture and algorithms[J]. IEEE Transactions on Mobile Computing, 2015, 14(3): 495-508.
|
LIU X X, ZHAO H, PAN M, et al. Traffic-aware multiple mix zone placement for protecting location privacy[C]. Proceedings of the 31rd Annual IEEE International Conference on Computer Communications, Florida, 2012: 972-980.
|
HOH B, IWUCHUKWU T, JACOBSON Q, et al. Enhancing privacy and accuracy in probe vehicle based traffic monitoring via virtual trip lines[J]. IEEE Transactions on Mobile Computing, 2012, 11(5): 849-864.
|
SHOKRI R, THEODORAKOPOULOS G, BOUDEC J L, et al. Quantifying location privacy[C]. Proceedings of IEEE Symposium on Security and Privacy, California, 2011: 247-262.
|
FREUDIGER J, MANSHAEI M H, HUBAUX J P, et al. Non-cooperative location privacy[J]. IEEE Transactions on Dependable and Secure Computing, 2013, 10(2): 84-98.
|
葛国栋, 郭云飞, 刘彩霞, 等. 内容中心网络中面向隐私保护的协作缓存策略[J]. 电子与信息学报, 2015, 37(5): 1220-1226. doi: 10.11999/JEIT140874.
|
GE Guodong, GUO Yunfei, LIU Caixia, et al. A collaborative caching strategy for privacy protection in content centric networking[J]. Journal of Electronics Information Technology, 2015, 37(5): 1220-1226. doi: 10.11999/JEIT- 140874.
|
黄开枝, 洪颖, 罗文宇, 等. 基于演化博弈机制的物理层安全协作方法[J]. 电子与信息学报, 2015, 37(1): 193-199. doi:10. 11999/JEIT140309.
|
HUANG Kaizhi, HONG Ying, LUO Wenyu, et al. A method for physical layer security cooperation based on evolutionary game[J]. Journal of Electronics Information Technology, 2015, 37(1): 193-199. doi: 10.11999/JEIT140309.
|
SHOKRI R, THEODORAKOPOULOS G, TRONCOSO C, et al. Protecting location privacy: Optimal strategy against localization attacks[C]. Proceedings of 19th ACM Conference on Computer and Communications Security, California, 2012: 617-627.
|