1.
B. Niu, Z. Zhang, X. Li, and H. Li, “Privacy-area aware dummy generation algorithms for location-based services,†in Proc. of IEEE ICC 2014.
2.
Z. Zhu and G. Cao, “Applaus: A privacy-preserving location proof updating system for location-based services,†in Proc. of IEEE INFOCOM 2011.
3.
J. Krumm, “A survey of computational location privacy,†Personal Ubiquitous Comput., vol. 13, no. 6, pp. 391–399, Aug. 2009.
4.
M. F. Mokbel, C.-Y. Chow, and W. G. Aref, “The new casper: query processing for location services without compromising privacy,†in Proc. of ACM VLDB 2006.
5.
Through spatial and temporal cloaking,†in Proc. of ACM MobiSys 2003.
6.
J. Meyerowitz and R. Roy Choudhury, “Hiding stars with fireworks: location privacy through camouflage,†in Proc. of ACM MobiCom 2009.
7.
B. Niu, X. Zhu, H. Chi, and H. Li, “3plus: Privacy-preserving pseudolocation updating system in location-based services,†in Proc. of IEEE WCNC 2013.
8.
J. Manweiler, R. Scudellari, and L. P. Cox, “Smile: Encounter-based trust for mobile social services,†in Proc. of ACM CCS 2009.
9.
R. Shokri, G. Theodorakopoulos, J.-Y. Le Boudec, and J.-P. Hubaux, “Quantifying location privacy,†in Proc. of IEEE Security and Privacy 2011.
10.
W3C. (2011, Apr.) Platform for privacy preferences (p3p) project. [Online]. Available: http://www.w3.org/P3P/.
11.
A. Pingley, W. Yu, N. Zhang, X. Fu, and W. Zhao, “Cap: A contextaware privacy protection system for location-based services.†in Proc. of IEEE ICDCS 2009.
12.
H. Lu, C. S. Jensen, and M. L. Yiu, “Pad: privacy-area aware, dummybased location privacy in mobile services,†in Proc. of ACM MobiDE 2008.
13.
C.-Y. Chow, M. F. Mokbel, and X. Liu, “A peer-to-peer spatial cloaking algorithm for anonymous location-based service,†in Proc. of ACM GIS 2006.
14.
L. Sweeney, “k-anonymity: a model for protecting privacy,†Int. J. Uncertain. Fuzziness Knowl.-Based Syst., vol. 10, no. 5, pp. 557–570, Oct. 2002.
15.
I. Bilogrevic, M. Jadliwala, K. Kalkan, J.-P. Hubaux, and I. Aad, “Privacy in mobile computing for location-sharing-based services,†in Proc. of ACM PETS 2011.
16.
K. Shin, X. Ju, Z. Chen, and X. Hu, “Privacy protection for users of location-based services,†Wireless Communications, IEEE, vol. 19, no. 1, pp. 30–39, 2012.
17.
H. Lee, B.-S. Oh, H.-i. Kim, and J. Chang, “Grid-based cloaking area creation scheme supporting continuous location-based services,†in Proc. of ACM SAC 2012.
18.
B. Gedik and L. Liu, “Protecting location privacy with personalized kanonymity: Architecture and algorithms,†IEEE Transactions on Mobile Computing, vol. 7, no. 1, pp. 1–18, Jan. 2008.
19.
C.-Y. Chow, M. F. Mokbel, and W. G. Aref, “Casper*: Query processing for location services without compromising privacy,†ACM Trans. Database Syst., vol. 34, no. 4, 2009.
20.
H. Kido, Y. Yanagisawa, and T. Satoh, “An anonymous communication technique using dummies for location-based services,†in Proc. of IEEE ICPS 2005, 2005, pp. 88 – 97.
21.
C.-Y. Chow, M. F. Mokbel, and X. Liu, “Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments,†Geoinfor-matica, vol. 15, no. 2, pp. 351–380, Apr. 2011.
22.
B. Niu, Q. Li, X. Zhu, G. Cao, and H. Li, “Achieving k-anonymity in privacy-aware location-based services,†in Proc. of IEEE INFOCOM 2014.
23.
X. Zhu, H. Chi, B. Niu, W. Zhang, Z. Li, and H. Li, “Mobicache: When k-anonymity meets cache,†in Proc. of IEEE GLOBECOM 2013.
24.
A. Serjantov and G. Danezis, “Towards an information theoretic metric for anonymity,†in Proc. of ACM PETS 2003.
25.
Um, J. H., Kim, H. D., & Chang, J. W. (2010, August). An advanced cloaking algorithm using Hilbert curves for anonymous location based service. In Social Computing (SocialCom), 2010 IEEE Second International Conference on (pp. 1093-1098). IEEE.
26.
E. Frejinger, “Route choice analysis: data, models, algorithms and applications,†Ph.D. dissertation, Lausanne, 2008.
27.
Niu, B., Li, Q., Zhu, X., & Li, H. (2014, August). A fine-grained spatial cloaking scheme for privacy-aware users in Location-Based Services. In Computer Communication and Networks (ICCCN), 2014 23rd International Conference on (pp. 1-8). IEEE.
28.
B. Hoh and M. Gruteser, “Protecting location privacy through path confusion,†in Proc. of IEEE SECURECOMM 2005.
29.
Z. Xiao, X. Meng and J. Xu, “Quality Aware Privacy Protection for Location based Services,†In Proc. of Database Systems for Advanced Applications, vol.4443, (April 2007), 434-446.
30.
X. Liu, K. Liu, L. Guo, X. Li, and Y. Fang, “A game-theoretic approach for achieving k-anonymity in location based services,†in Proc. of IEEE INFOCOM 2013.
31.
B. Niu, X. Zhu, X. Lei, W. Zhang, and H. Li, “Eps: Encounter-based privacy-preserving scheme for location-based services,†in Proc. of IEEE GLOBECOM 2013.
32.
W3C. (2011, Apr.) Platform for privacy preferences (p3p) project. [Online]. Available: http://www.w3.org/P3P/.
33.
I. Rhee, M. Shin, S. Hong, K. Lee, and S. Chong, “On the levy-walk nature of human mobility,†in Proc. of IEEE INFOCOM 2008.
34.
K. Lee, S. Hong, S. J. Kim, I. Rhee, and S. Chong, “Slaw: A new mobility model for human walks,†in Proc. of IEEE INFOCOM 2009.
35.
G. Ghinita, P. Kalnis, and S. Skiadopoulos, “Mobihide: A mobilea peerto-peer system for anonymous location-based queries,†in Proc. of ACM SSTD 2007.
36.
J.-H. Um, H.-D.Kim, and J.-W. Chang, “An advanced cloaking algorithm using Hilbert curves for anonymous location based service,†in Proc. 2010 IEEE Second Int. Conf. Social Computing,pp.1093–1098,2010.