Citation: | WAN Sheng, HUA Jiafeng, ZHU Hui, et al., “A Collaboration-Based Scheme for Location-Based Services with Incentive Mechanism,” Chinese Journal of Electronics, vol. 27, no. 2, pp. 310-317, 2018, doi: 10.1049/cje.2017.12.001 |
X. Gong, X. Chen, D.H. Shin, et al., "Personalized location privacy in mobile networks:A social group utility approach", Proc. of IEEE INFOCOM, Hong Kong, China, pp.1008-1016, 2015.
|
V. Bindschaedler and R. Shokri, "Synthesizing plausible privacy-preserving location traces", Proc. of IEEE S&P, San Jose, USA, pp.546-563, 2016.
|
B. Niu, Q. Li, X. Zhu, et al., "Achieving k-anonymity in privacy-aware location-based services", Proc. of IEEE INFOCOM, Toronto, Canada, pp.754-762, 2014.
|
G. Theodorakopoulos, "The same-origin attack against location privacy", Proc. of ACM WPES, Denver, USA, pp.49-53, 2015.
|
A.Y. Ye, S.C. Lin, J.F. Ma, et al., "An active diffusion based location privacy protection method", Acta Electronica Sinica, Vol.43, No.7, pp.1362-1368, 2015. (in Chinese)
|
Q.W. Lu, C.M. Wang, et al., "Personalized privacy-preserving trajectory data publishing", Chinese Journal of Electronics, Vol.26, No.2, pp.285-291, 2017.
|
J. Shao, R. Lu and X. Lin, "Fine:A fine-grained privacypreserving location-based service framework for mobile devices", Proc. of IEEE INFOCOM, Toronto, Canada, pp.244-252, 2014.
|
X. Wang, Y. Mu and R. Chen, "One-round privacy-preserving meeting location determination for smartphone applications", IEEE Transactions on Information Forensics and Security, Vol.11, No.8, pp.1712-1721, 2016.
|
A.R. Shahid, L. Jeukeng, W. Zeng, et al., "PPVC:Privacy preserving voronoi cell for location-based services", Proc. of IEEE ICNC, Silicon Valley, USA, pp.351-355, 2017.
|
B. Ying, D. Makrakis and Z. Hou, "Motivation for protecting selfish vehicles' location privacy in vehicular networks", IEEE Transactions on Vehicular Technology, Vol.64, No.12, pp.5631-5641, 2015.
|
K. Fawaz, H. Feng and K.G. Shin, "Anatomization and protection of mobile apps location privacy threats", Proc. of USENIX Security Symposium, Washington, USA, pp.753-768, 2015.
|
Y. Xiao and L. Xiong, "Protecting locations with differential privacy under temporal correlations", Proc. of ACM CCS, Denver, USA, pp.1298-1309, 2015.
|
P. Perazzo and G. Dini,"A uniformity-based approach to location privacy", Computer Communications, Vol.64, No.1, pp.21-32, 2015.
|
R. Shokri, G. Theodorakopoulos and C. Troncoso, "Privacy games along location traces:A game-theoretic framework for optimizing location privacy", ACM Transactions on Privacy and Security, Vol.19, No.4, pp.1-31, 2016.
|
Y. Sun, M. Chen, L. Hu, et al., "ASA:Against statistical attacks for privacy-aware users in location based service", Future Generation Computer Systems, Vol.70, No.4, pp.48-58, 2017.
|
H. Zhang, Z. Xu, X. Yu, et al., "LPPS:Location privacy protection for smartphones", Proc. of IEEE ICC, Kuala Lumpur, Malaysia, pp.1-6, 2016.
|
K. Shin, X. Ju, Z. Chen, et al., "Privacy protection for users of location-based services", Wireless Communications, Vol.19, No.1, pp.30-39, 2012.
|
B. Niu, Q. Li, X. Zhu, et al., "Enhancing privacy through caching in location-based services", Proc. of IEEE INFOCOM, Hong Kong, China, pp.1017-1025, 2015.
|
R. Shokri, G. Theodorakopoulos, P. Papadimitratos, et al., "Hiding in the mobile crowd:Location privacy through collaboration", IEEE Transactions on Dependable and Secure Computing, Vol.11, No.3, pp.266-279, 2014.
|
C.Y. Chow, M.F. Mokbel and X. Liu, "Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments", GeoInformatica, Vol.15, No.2, pp.351-380, 2011.
|
B. Niu, X. Zhu, Q. Li, et al., "A novel attack to spatial cloaking schemes in location-based services", Future Generation Computer Systems, Vol.49, No.1, pp.125-132, 2015.
|
T. Gomes, L. Guardalben, P. Salvador, et al., "A spanning tree protocol over mobile wireless ad hoc networks", Proc. of IEEE ICC, Budapest, Hungary, pp.1089-1094, 2013.
|
I. Rhee, M. Shin, S. Hong, et al., "On the levy-walk nature of human mobility", IEEE Transactions on Networking, Vol.19, No.3, pp.630-643, 2011.
|
K. Lee, S. Hong, S.J. Kim, et al., "Slaw:A new mobility model for human walks", Proc. of IEEE INFOCOM, Rio de Janeiro, Brazil, pp.855-863, 2009.
|
Z. Haitao, Z. Lei, F. Weimiao, et al., "A users collaborative scheme for location and query privacy", Proc. of IEEE ICPADS, Wuhan, China, pp.383-390, 2016.
|
T. Peng, Q. Liu, D. Meng, et al., "Collaborative trajectory privacy preserving scheme in location-based services", Information Sciences, Vol.38, No.7, pp.165-179, 2017.
|