[1] LIANG L, YE H, LI G Y. Toward intelligent vehicular networks: a machine learning framework[J]. IEEE Internet of Things Journal, 2019, 6(1): 124-135.
[2] NIU X, HUANG H Y, LI Y T. A real-time data collection mechanism with trajectory privacy in mobile crowd-sensing[J]. IEEE Communications Letters, 2020, 24(10): 2114-2118.
[3] FIORE M, KATSIKOULI P, ZAVOU E, et al. Privacy in trajectory micro-data publishing: a survey[J]. Transactions on Data Privacy, 2020, 13(5): 91-149.
[4] ZHAO Y N, LUO Y L, YU Q Y, et al. A privacy-preserving trajectory publication method based on secure start-points and end-points[J]. Mobile Information Systems, 2020: 1-12.
[5] CHEN H H, JIN H, WU S L. Minimizing inter-server communications by exploiting self-similarity in online social networks[J]. IEEE Transactions on Parallel and Distributed Systems, 2015, 27(4): 1116-1130.
[6] SWEENEY L. K-anonymity: a model for protecting privacy[J]. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2002, 10(5): 557-570.
[7] GRUTESER M, GRUNWALD D. Anonymous usage of location-based services through spatial and temporal cloaking[C]//Proceedings of the 1st International Conference on Mobile Systems, Applications and Services, San Francisco, California, May 5-8, 2003. New York: ACM, 2003: 31-42.
[8] YANG M X, YANG Y X, YU X M. A trusted de-swinging k-anonymity scheme for location privacy protection[J]. Journal of Cloud Computing, 2022, 2(3): 27-35.
[9] HEGG J C, KENNEDY B P. Let’s do the time warp again: non-linear time series matching as a tool for sequentially structured data in ecology[J]. Ecosphere, 2021, 10(2):129-136.
[10] JAGWANI P, KAUSHIK S. Trajectory anonymisation based on graph split using EMD[J]. International Journal of Computational Science and Engineering, 2017, 14(3): 290-298.
[11] WANG F S, WANG S, NIU X Z, et al. Grid-based whole trajectory clustering in road networks environment[J]. Wireless Communications and Mobile Computing, 2021: 1-20.
[12] MAHDAVIFAR S, DELDAR F, MAHDIKHANI H. Personalized privacy-preserving publication of trajectory data by generalization and distortion of moving points[J]. Journal of Network and Systems Management, 2021, 5(4): 30-37.
[13] HUO Z, HUANG Y, MENG X. History trajectory privacy-preserving through graph partition[C]//Proceedings of the 1st International Workshop on Mobile Location-Based Service, Beijing, China, September 18, 2011. New York: Association for Computing Machinery, 2011: 71-78.
[14] GAO S, MA J, SUN C, et al. Balancing trajectory privacy and data utility using a personalized anonymization model[J]. Journal of Network and Computer Applications, 2014, 38(3): 125-134.
[15] BIMEYER N, STRESING C, BAYAROU K. Intrusion detection in VANETs through verification of vehicle movement data[C]//Proceedings of the 2010 IEEE Vehicular Networking Conference,Jersey City, United States, December 13-15, 2010. New York: IEEE, 2010: 166-173.
[16] CONNELL L, KEANE M T. A model of plausibility[J]. Cognitive Science, 2006, 30(1):95-120.
[17] ZHOU L, YU L, DU S G, et al. Achieving differentially private location privacy in edge-assistant connected vehicles[J]. IEEE Internet of Things Journal, 2019, 6(3): 4472-4481.
[18] ARIF M, CHEN J, WANG G J, et al. Privacy preserving and data publication for vehicular trajectories with differential privacy[J]. Measurement, 2020, 173: 1-15. |