[1] 李婕,白志宏,于瑞云,等.基于PSO优化的移动位置隐私保护算法[J/OL].计算机学报,2017:1-15. LI J, BAI Z H, YU R Y, et al. Mobile location privacy protection algorithm based on PSO optimization[J/OL]. Chinese Journal Of Computers, 2017:1-15. [2] 王玲玲,马春光,刘国柱.基于位置服务的隐私保护机制度量研究综述[J].计算机应用研究,2017,34(03):647-652. DOI: 10.3969 / j.issn.1001-3695.2017.03.002. WANG L L, MA C G, LIU G Z. Survey on metrics for location-based privacy protection mechanisms[J].Application Research of Computers, 2017,34(03):647-652. DOI: 10.3969 / j.issn.1001-3695.2017.03.002. [3] 张学军,桂小林,伍忠东.位置服务隐私保护研究综述[J].软件学报,2015,26(9):2373-2395. DOI: 10.13328/j.cnki.jos.004857. ZHANG X J, GUI X L, WU Z D. Privacy preservation for location-based services: A survey[J].Journal of Software, 2015,26(9):2373-2395. DOI: 10.13328/j.cnki.jos.004857. [4] 许明艳,赵华,季新生.位置服务隐私保护技术研究综述[J].信息工程大学学报,2015,16(5):543-551. DOI: 10.3969 / j.issn.1671-0673.2015.05.006. XU M Y, ZHAO H,JI X S. Survey of location privacy protection technology[J].Journal of Information Engineering University, 2015,16(5):543-551. DOI: 10.3969 / j.issn.1671-0673.2015.05.006. [5] 李杨,温雯,谢光强.差分隐私保护研究综述[J].计算机应用研究,2012,29(9): 3201-3205+3211. DOI:10.3969/j.issn.1001-3695.2012.09.001. LI Y, WEN W, XIE G Q. Survey of research on differential privacy[J].Application Research of Computers, 2012,29(9):3201-3205+3211.DOI:10.3969 / j.issn.1001-3695.2012.09.001. [6] 杨晓晖,朱烨,胡倩茹.基于SpaceTwist改进的位置隐私保护方法[J].河北大学学报(自然科学版),2017,37(3):287-293.DOI:10.3969/j.issn.1000-1565.2017.03.011. YANG X C, ZHU Y, HU Q R. Improved location privacy protection method based on SpaceTwist[J].Journal of Hebei University(Natural Science Edition), 2017,37(3):287-293. DOI:10.3969/j.issn.1000-1565.2017.03.011. [7] 赵大鹏,宋光旋,靳远远等.基于查询概率的位置隐私保护方法[J].计算机应用,2017,37(2):347-351+359. DOI: 10.11772 /j.issn.1001-9081.2017.02.0347. ZHAO D P, SONG G X, JIN Y Y, et al. Query probability-based location privacy protection approach[J]. Journal of Computer Application, 2017,37(2):347-351. DOI:10.11772/j.issn.1001-9081.2017.02.0347. [8] 张红斌.公共网络用户隐私保护位置优化识别仿真[J].计算机仿真,2017,34(2):330-333. ZHANG H B. Public network user privacy protection location optimization identification simulation[J]. Computer Simulation,2017,34(2):330-333. [9] 熊平,朱天清,王晓峰.差分隐私保护及其应用[J].计算机学报,2014,37(1):101-122.DOI:10.3724/SP.J.1016.2014.00101. XIONG P, ZHU T Q, WANG X F. A survey on differential privacy and applications[J]. Chinese Journal of Computers,2014,37(1):101-122. DOI:10.3724/SP.J.1016.2014.00101. [10] 李灵芳. 基于差分隐私的k-means聚类分析[D].成都:西南交通大学,2016. LI L F. The analysis of k-means clustering with differential privacy[D].Chengdu:Southwest Jiaotong University,2016. [11] 李杨,郝志峰,温雯,等.差分隐私保护k-means聚类方法研究[J].计算机科学,2013,40(3):287-290. LI Y, HAO Z F, WEN W,et al. Research on differential privacy preserving k-means clustering[J]. Computer Science, 2013,40(3):287-290. |