Journal of Guangdong University of Technology ›› 2023, Vol. 40 ›› Issue (05): 56-63.doi: 10.12052/gdutxb.220170
• Computer Science and Technology • Previous Articles
Li Yang, Zhou Ying
CLC Number:
[1] LI J Y, GUO W Z, LI X Y, et al. Privacy-preserving real-time road conditions monitoring scheme based on intelligent traffic [J]. Journal on Communications, 2020, 41(7): 73-83. [2] SWEENEY L. k-anonymity: a model for protecting privacy [J]. International Journal of Uncertainty, Fuzziness and Knowledge Based Systems, 2002, 10(5): 557-570. [3] MACHANAVAJJHALA A, KIFER D, GEHRKE J, et al. l-diversity: privacy beyond k-anonymity [J]. ACM Transactions on Knowledge Discovery from Data (TKDD), 2007, 1(1): 3-14. [4] DWORK C. Differential privacy: a survey of results[C]//International Conference on Theory and Applications of Models of Computation. Heidelberg: Springer, 2008: 1-19. [5] CHEN R, FUNG B C M, DESAI B C, et al. Differentially private transit data publication: a case study on the montreal transportation system[C]// Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. Beijing: ACM, 2012: 213-221. [6] CHEN R, ACS G, CASTELLUCCIA C. Differentially private sequential data publication via variable-length n-grams[C]//Proceedings of the 2012 ACM Conference on Computer and Communications Security. Raleigh: ACM, 2012: 638-649. [7] ZHAO X, DONG Y, PI D. Novel trajectory data publishing method under differential privacy [J]. Expert Systems with Applications, 2019, 138: 112791. [8] HUA J, GAO Y, ZHONG S. Differentially private publication of general time-serial trajectory data[C]//2015 IEEE Conference on Computer Communications (INFOCOM). Hong Kong: IEEE, 2015: 549-557. [9] LI M, ZHU L, ZHANG Z, et al. Achieving differential privacy of trajectory data publishing in participatory sensing [J]. Information Sciences, 2017, 400: 1-13. [10] GENG Q, VISWANATH P. The optimal noise-adding mechanism in differential privacy [J]. IEEE Transactions on Information Theory, 2015, 62(2): 925-951. [11] LI Y, YANG D, HU X. A differential privacy-based privacy-preserving data publishing algorithm for transit smart card data [J]. Transportation Research Part C:Emerging Technologies, 2020, 115: 102634. [12] GURSOY M E, LIU L, TRUEX S, et al. Differentially private and utility preserving publication of trajectory data [J]. IEEE Transactions on Mobile Computing, 2018, 18(10): 2315-2329. [13] NI T, QIAO M, CHEN Z, et al. Utility efficient differentially private K-means clustering based on cluster merging [J]. Neurocomputing, 2021, 424: 205-214. [14] LU Z, SHEN H. Differentially private K-means clustering with convergence guarantee [J]. IEEE Transactions on Dependable and Secure Computing, 2020, 18(4): 1541-1552. [15] LIU Q, YU J, HAN J, et al. Differentially private and utility-aware publication of trajectory data [J]. Expert Systems with Applications, 2021, 180: 115120. [16] HAMALAINEN J, KARKKAINEN T, ROSSI T. Scalable initialization methods for large-scale clustering[EB/OL]. arXiv preprint arXiv: 2007.11937 (2020-07-23)[2022-11-01].https://doi.org/10.48550/arXiv.2007.11937. [17] XU C, ZHU L, LIU Y, et al. DP-LTOD: differential privacy latent trajectory community discovering services over location-based social networks [J]. IEEE Transactions on Services Computing, 2018, 14(4): 1068-1083. [18] 陈思, 付安民, 苏铓, 等. 基于差分隐私的轨迹隐私保护方案[J]. 通信学报, 2021, 42(9): 54-64. CHEN S, FU A M, SU M, et al. Trajectory privacy protection scheme based on differential privacy [J]. Journal on Communications, 2021, 42(9): 54-64. [19] ZHAO X, PI D, CHEN J. Novel trajectory privacy-preserving method based on clustering using differential privacy [J]. Expert Systems with Applications, 2020, 149: 113241. [20] YUAN J, ZHENG Y, ZHANG C, et al. T-drive: driving directions based on taxi trajectories[C]// Proceedings of the 18th SIGSPATIAL International Conference on Advances in Geographic Information Systems. California: ACM, 2010: 99-108. |
[1] | Jin Yu-kai, Li Zhi-sheng, Ou Yao-chun, Zhang Hua-gang, Zeng Jiang-yi, Chen Bo-chao. Prediction and Comparative Study of PM2.5 Concentration Based on Multi-stage Clustering [J]. Journal of Guangdong University of Technology, 2023, 40(03): 17-24. |
[2] | Fan Juan, Deng Xiu-qin, Liu Yu-lan. A Spectral Clustering Algorithm Based on Fréchet Distance [J]. Journal of Guangdong University of Technology, 2023, 40(02): 39-44. |
[3] | Mo Zan, Fan Meng-ting, Liu Hong-wei, Yan Yang-fan. Market Structure of Product Asymmetric Competition Based on Online User Behavior [J]. Journal of Guangdong University of Technology, 2023, 40(02): 111-119. |
[4] | Yang Da-sen. DPLORE: A Location Recommendation Algorithm for Differential Privacy Protection [J]. Journal of Guangdong University of Technology, 2021, 38(01): 69-74. |
[5] | Fan Meng-ting, Liu Hong-wei, Gao Hong-ming, He Rui-chao. A Research on Competitive Product Market Structure of E-commerce Platform [J]. Journal of Guangdong University of Technology, 2019, 36(06): 32-37. |
[6] | He Qing-xiang, Zhang Wei. Application of Improved Clustering Algorithm in Terrorist Attacks [J]. Journal of Guangdong University of Technology, 2019, 36(04): 24-30. |
[7] | Zhang Wei, Mai Zhi-shen. A Research on Local Outlier Factor De-noising Method for Kernel Fuzzy Spectral Clustering [J]. Journal of Guangdong University of Technology, 2018, 35(06): 77-82. |
[8] | Wang Rong-rong, Fu Xiu-fen. An Improved mpts-HDBSCAN Algorithm [J]. Journal of Guangdong University of Technology, 2017, 34(03): 49-53. |
[9] | Chen Li, Cao Xi, Lin Jun-jie, Gao Hong-ming, Liu Fei-ya, Li Yan-yan. Prediction of Short-Term Load Based on Big Data Mining [J]. Journal of Guangdong University of Technology, 2017, 34(03): 105-109. |
[10] | Chen Ji-feng, Liu Guang-cong, Peng Cheng-ping. An Improved DV-Hop Localization Algorithm for Wireless Sensor Networks [J]. Journal of Guangdong University of Technology, 2017, 34(02): 80-85. |
[11] | SHEN Xiao-Min, LI Bao-Jun, SUN Xu, XU Wei-Chao. Large Scale Face Clustering Based on Convolutional Neural Network [J]. Journal of Guangdong University of Technology, 2016, 33(06): 77-84. |
[12] | TENG Shao-Hua, LIU Xiang. An E-CARGO Based Cluster Mechanism Research on WSN [J]. Journal of Guangdong University of Technology, 2015, 32(04): 92-98. |
[13] | WANG Bo, ZHONG Ying-Chun, CHEN Jun-Bin. Research on Speaker Recognition Based on Both AP and GMM [J]. Journal of Guangdong University of Technology, 2015, 32(04): 145-149. |
[14] | TENG Shao-Hua, WU Hao, LI Ri-Gui, ZHANG Wei, LIU Dong-Ning, LIANG Lu. The Application of the Adjustable Multitimes Clustering Algorithm in Telecom Data [J]. Journal of Guangdong University of Technology, 2014, 31(3): 1-7. |
[15] | JIANG Sheng-Yi, WANG Lian-Xi. Some Challenges in Clustering Analysis [J]. Journal of Guangdong University of Technology, 2014, 31(3): 32-38. |
|