Open Access
MATEC Web Conf.
Volume 220, 2018
2018 The 2nd International Conference on Mechanical, System and Control Engineering (ICMSC 2018)
Article Number 10001
Number of page(s) 6
Section Modern information technology and application
Published online 29 October 2018
  1. Vergara-Laurens I J, Jaimes L G, Labrador M A. Privacy-Preserving Mechanisms for Crowdsensing: Survey and Research Challenges[J]. IEEE Internet of Things Journal, 2016, PP(99):1-1. [Google Scholar]
  2. Shokri R, Theodorakopoulos G, Papadimitratos P, et al. Hiding in the Mobile Crowd: LocationPrivacy through Collaboration[J]. IEEE Transactions on Dependable & Secure Computing, 2014, 11 (3): 266–279. [CrossRef] [Google Scholar]
  3. Chatzikokolakis K, Elsalamouny E, Palamidessi C. Efficient Utility Improvement for Location Privacy[J]. Proceedings on Privacy Enhancing Technologies, 2017, 2017 (4) :308–328. [CrossRef] [Google Scholar]
  4. Zhang Lei, Ma Chunguang, Yang Songtao, Li Zengpeng. Correlation probability indistinguishable location privacy protection algorithm[J]. Journal on Communications. 2017,(08):37-49. [Google Scholar]
  5. Zhang Lei, Ma Chunguang, Yang Songtao, et al. Location privacy protection model and algorithm based on profiles generalization [J]. Systems engineering and electronics 2016, 38 (12): 2894–2900. [Google Scholar]
  6. Palanisamy B, Liu L. Attack-Resilient Mix-zones over Road Networks: Architecture and Algorithms[J]. Mobile Computing IEEE Transactions on, 2015, 14 (3): 495–508. [CrossRef] [Google Scholar]
  7. Zhang Lei, Ma Chun-guang, Yang Song-tao, et al. A real-time similar trajectories generation algorithm for trajectories differences identification resistance [J]. Journal of Harbin Engineering University, 2017, 2017 (07): 1173–1178. [Google Scholar]
  8. Zhang Lei, Ma Chun-guang, Yang Song-tao, Li Zengpeng. A Privacy Preserving Method from Attacks of Velocity Prediction in Road Network[J]. Journal of Xi’an Jiaotong University. 2017,51 (2): 27–32. [Google Scholar]
  9. Zeberga K, Jin R, Cho H J, et al. A Safe-Region Approach to a Moving k-RNN Queries in a Directed Road Network[J]. Journal of Circuits Systems & Computers, 2017, 26 (05): 115–124. [CrossRef] [Google Scholar]
  10. Peng T, Liu Q, Meng D C, et al. Collaborative trajectory privacy preserving scheme in location-based services [J]. Information Sciences, 2017, 387(165–179. [CrossRef] [Google Scholar]
  11. Zhang L, Li J, Yang S, et al. Privacy Preserving in Cloud Environment for Obstructed Shortest Path Query [J]. Wireless Personal Communications, 2017, 96 (2): 2305–2322. [CrossRef] [Google Scholar]
  12. Hashem T, Kulik L, Zhang R. Countering overlapping rectangle privacy attack for moving kNN queries [J]. Information Systems, 2013, 38 (3): 430–453. [CrossRef] [Google Scholar]
  13. Gao S, Ma J F, Shi W S, et al. LTPPM: a location and trajectory privacy protection mechanism in participatory sensing [J]. Wireless Communications & Mobile Computing, 2015, 15 (1): 155–169. [CrossRef] [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.