References
- G. Chatzimilioudis, C. Costa, D. Zeinalipour-Yazti, W.-C. Lee, and E. Pitoura, "Distributed In-Memory Processing of All k Nearest Neighbor Queries," IEEE Transactions on Knowledge and Data Engineering, Vol.28, No.4, 2016.
- B. Niu, X. Zhu, W. Li, H. Li, Y. Wang, and Z. Lu, "A personalized two-tier cloaking scheme for privacy-aware location-based services," in Proc. IEEE International Conference on Computing, Networking and Communications, pp.94-98, 2015.
- D. Song, J. Sim, K. Park, and M. Song, "A privacy-preserving continuous location monitoring system for location-based services," International Journal of Distributed Sensor Networks, pp.1-10, 2015.
- X. He, R. Jin, and H. Dai, "Leveraging Spatial Diversity for Privacy-Aware Location-Based Services in Mobile Networks," IEEE Transactions on Information Forensics and Security, Vol.13, No.6, pp.1524-1534, 2018. https://doi.org/10.1109/TIFS.2018.2797023
- K. Mouratidis, S. Bakiras, and D. Papadias, "Continuous Monitoring of Spatial Queries in Wireless Broadcast Environments," IEEE Transactions on Mobile Computing, Vol.8, No.10, pp.1297-1311, 2009. https://doi.org/10.1109/TMC.2009.14
- T. Imielinski, S. Viswanathan, and B. R. Badrinath, "Data on Air: Organization and Access," IEEE Transactions on Knowledge and Data Engineering, Vol.9, No.3, pp.353-372, 1997. https://doi.org/10.1109/69.599926
- Z. Yu, Y. Liu, X. Yu, and K. Q. Pu, "Scalable Distributed Processing of K Nearest Neighbor Queries over Moving Objects," IEEE Transactions on Knowledge and Data Engineering, Vol.27, No.5, pp.1383-1396, 2015. https://doi.org/10.1109/TKDE.2014.2364046
- J. Zhou, H. Teng, Z. Yu, D. Wang, and J. Wang, "Distributed processing of continuous range queries over moving objects," in Proc. Information and Communications, pp.800-810, 2017.
- G. Ghinita, P. Kalnis, A. Khoshgozaran, C. Shahabi, and K. -L. Tan, "Private queries in location based services: Anonymizers are not necessary," in Proc. ACM SIGMOD International Conference on Management Data, pp.121-132, 2008.
- R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu, "Hippocratic databases," in Proc. International Conference on Very Large Data Bases, pp.143-154, 2002.
- C. -Y. Chow, M. F. Mokbel, and X. Liu, "A peer-to-peer spatial cloaking algorithm for anonymous location-based service," in Proc. International Conference on ACM Advanced Geographic Information Systems, pp.171-178, 2006.
- L. Sweeney, "K-anonymity: A model for protecting privacy," International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, Vol.10, No.5, pp.557-570, 2002. https://doi.org/10.1142/S0218488502001648
- T. Allard, G. Hebrail, F. Masseglia, and E. Pacitti, "A New Privacy-Preserving Solution for Clustering Massively Distributed Personal Times-Series," in Proc. International Conference on Data Engineering, pp.1370-1373, 2016.
- M. H. Afifi, K. Zhou, and J. Ren, "Privacy Characterization and Quantification in Data Publishing," IEEE Transactions on Knowledge and Data Engineering, Vol.30, No.9, pp. 1756-1769, 2018. https://doi.org/10.1109/TKDE.2018.2797092
- B. Niu, X. Zhu, X. Lei, and H. Li, "Privacy-area aware dummy generation algorithms for location-based services," in Proc. IEEE International Conference on Communications, pp. 957-962, 2014.
- H. Liu, X. Li, H. Li, J. Ma, and X. Ma, "Spatiotemporal Correlation-Aware Dummy-Based Privacy Protection Scheme for Location-Based Services," in Proc. IEEE Conference on Computer Communications, pp.1-9, 2017.
- D. Wu, Y. Zhang, and Y. Liu, "Dummy Location Selection Scheme for K-anonymity in Location based Services," in Proc. IEEE Trustcom/BigDataSE/ICESS, pp.441-448, 2017.