References
- C.Y. Chow, and M.F. Mokbel, "Trajectory Privacy in Location-based Services and Data Publication," ACM SIGKDD Explorations Newsletter, Vol. 13, No. 1, pp. 19-29, 2011. https://doi.org/10.1145/2031331.2031335
- A. Pingley, W. Yu, N. Zhang, X.W. Fu, and W. Zhao, "Cap: A Context-Aware Privacy Protection System for Location-Based Services," IEEE ICDCS, pp. 49-57, June 2009.
- K.G. Shin, X.E. Ju, Z.G. Chen, and X. Hu, "Privacy Protection for Users of Location-Based Services," IEEE Wireless Communication, Vol. 19, no. 1, pp. 30-39, February, 2012.
- B. Bamba, L. Liu, P. Pesti, and T. Wang, "Supporting Anonymous Location Queries in Mobile Environments with Privacy Grid," Proc. Int'l Conf. World Wide Web (WWW), pp. 237-246, 2008.
- B.Y. Lee, J.O. Oh, H.J. Yu, and J. Kim, "Protecting Location Privacy Using Location Semantics", Proc. Int'l. Conf. Knowledge Discovery and Data Mining (KDD), pp. 1289-1297, 2011.
- C.Y. Chow, M.F. Mokbel, and X. Liu, "Spatial Cloaking for Anonymous Location-based Services in Mobile Peer-to-Peer Environments," Vol. 15, No. 2, pp. 351-380, 2012.
- H.I. Kim, Y.S. Shin, and J.W. Chang, "A Grid-based Cloaking Scheme for Continuous Queries in Distributed Systems," Proc. Int'l. Conf. Computer and Information Technology, pp. 75-82, 2011.
- X. Pan, J.L. Xu, and X.F. Meng, "Protecting Location Privacy against Location-Dependent Attacks in Mobile Services," IEEE Transactions on Knowledge and Data Engineering, Vol. 24, No. 8, pp. 1506-1519, 2012. https://doi.org/10.1109/TKDE.2011.105
- H.J. Lee, B.S. Oh, H.I. Kim, and J.W. Chang, "Grid-based Cloaking Area Creation Scheme Supporting Continuous Location-based Services," Proc. Int'l. Conf. Applied Computing, pp. 537-543, 2012.
- M.F. Mokbel, C.Y. Chow, and W.G. Aref, "The New Casper: Query procesing for location services without compromising privacy," Proc. Int'l. Conf. Very Large Databases (VLDB), pp. 763-774, 2006.
- B. Gedik, and L. Liu, "Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms," IEEE Transactions on Mobile Computing , Vol. 7, No. 1, pp. 1-18, 2008. https://doi.org/10.1109/TMC.2007.1062
- T. Xu, and Y. Cai, "Exploring Historical Location Data for Anonymity Preservation in Location-based Services," Proc. Int'l. Conf. Computer Communications (INFOCOM), pp. 547-555, 2008.
- G. Ghinita, P. Kalnis, and S. Skiadopoulos, "PRIVE: Anonymous Location-based Queries in Distributed Mobile Systems," Proc. Int'l. Conf. World Wide Web, pp. 371-380, 2007.
- G. Ghinita1, P. Kalnis, and S. Skiadopoulos, "MobiHide: A Mobile Peer-to-Peer System for Anonymous Location-based Queries," Proc. Int'l. Conf. Advances in Spatial and Temporal Databases, pp. 221-238, 2007.
- C. Chow, and M.F. Mokbel, "Enabling Private Continuous Queries for Revealed User Locations," Proc. Int'l. Conf. Advances in Spatial and Temporal Databases, pp. 258-273, 2007.
- X. Pan, X.F. Meng, and J. Xu, "Distortion-based Anonymity for Continuous Queries in Location-based Mobile Services," Proc. Int'l. Conf. ACM SIGSPATIAL on Advances in Geographic Information Systems, 2009.
- T. Xu, and Y. Cai, "Location Anonymity in Continuous Location-based Services," Proc. Int'l. Conf. on Advances in Geographic Information Systems, pp. 221-238, 2007.
- Thomas Brinkhoff Network-Based Generator of Moving Objects, http://www.fh-oow.de/institute/iapg/personen/brinkhoff/generator/, 2008.
- T. Takahashi, and S. Miyakawa, "CMOA: Continuous Moving Object Anonymization," Proc. Int'l. Conf. Database Engineering & Applications, pp. 81-90, 2012.
- G. Ghinita, P. Kalnis, A. Khoshgozaran, C. Shahabi, and K.L. Tan, "Private Queries in Location Based Services: Anonymizers Are Not Necessary," Proc. Int'l. Conf. Management of Data (SIGMOD), pp. 121-132, 2008.
- Y.L. Wang, H. Zhou, Y.J. Wu, and L. Sun, "Preserving Location Privacy for Location-based Services with Continuous Queries on Road Network," Proc. Int'l. Conf. Computer Science & Education, pp. 822-827, 2012.
- T.G. Kim, S.S. Shin, W.I. Chung, and H.Y. Bae, "Effective Indexing of Moving Objects for Current Position Management in Road Networks," Journal of the Korea Society of Computer and Information, Vol. 16, No. 10, pp. 33-43, 2011. https://doi.org/10.9708/jksci.2011.16.10.033
- S.S. Shin, G.B. Kim, and H.Y. Bae, "FingerPrint Building Method Using Splite-tree based on Indoor Environment," Journal of the Korea Society of Computer and Information, Vol. 17, No. 6, pp. 173-182, 2012. https://doi.org/10.9708/jksci.2012.17.6.173