[1] |
Mano K,Minami K,Maruyama H.Pseudonym exchange for privacy-preserving publishing of trajectory dataset[C]∥Proc of 2014 IEEE 3rd Global Conference on Consumer
|
|
Electro- nics (GCCE), 2014:691-695.
|
[2] |
Yu R,Kang J,Huang X,et al.MixGroup:Accumulative pseudonym exchanging for location privacy preservation in vehicular social networks[J].IEEE Transactions on Dependable & Secure Computing,2015,13(1):1.
|
[3] |
Das G,Gunopulos D,Mannila H.Finding similar time series[C]∥
|
|
Proc of the 1st European Symposium on Principles of Data Mining and Knowledge Discovery, 1997:88-100.
|
[4] |
Yi B K,Jagadish H V,Faloutsos C.Efficient retrieval of similar time sequences under time warping[C]∥Proc of the 14thInternational Conference on Data Engineering,1998:201-208.
|
[5] |
Chen L,Ng R.On the marriage of edit distance and Lp norms[C]∥Proc of the 30th International Conference on Very Large Data Bases, 2002:792-803.
|
[6] |
Zang H, Bolot J.Anonymization of location data does not work:A large-scale measurement study[C]∥Proc of International Conference on Mobile Computing & Networking,
|
20 |
11:145-156.
|
[7] |
Freudiger J,Shokri R,Hubaux J P.Evaluating the privacy risk of location-based services[C]∥Proc of International Conference on Financial Cryptography & Data Security,2012:31-46.
|
[8] |
de Montjoye Y-A, Hidalgo C A, Verleysen M, et al.Unique in the crowd:The privacy bounds of human mobility[J].Scientific Reports,2013,3:article number 1376.
|
[9] |
Gambs S,Killijian M O,Cortez M N D P.De-anonymization attack on geolocated data[C]∥Proc of IEEE International Conference on Trust,Security & Privacy in Computing & Communications,2013:789-797.
|
[10] |
Lin M, Cao H, Zheng V,et al.Mobile user verification/ identification using statistical mobility profile[C]∥Proc of 2015International Conference on Big Data and Smart Computing,2015:15-18.
|
[11] |
Lin M, Cao H,Zheng V,et al.Mobility profiling for user verification with anonymized location data[C]∥Proc of International Conference on Artificial Intelligence,2015:960-966.
|
[12] |
Wang R,Zhang M,Feng D,et al.A de-anonymization attack on geo-located data considering spatio-temporal influences[C]∥Proc of the 2015 International Conference on Information and Communications Security,2015:478-484.
|
[13] |
Chen Z,Fu Y,Zhang M,et al.The de-anonymization method based on user spatio-temporal mobility trace[C]∥Proc of the 2017 International Conference on Information and Communications Security,2017:459-471.
|
[14] |
Luo X,Gao Q,Zhou F,et al.Identifying human mobility via trajectory embeddings[C]∥Proc of the 26th International Joint Conference on Artificial Intelligence,2017:1689-1695.
|
[15] |
Wang G,Liao D,Li J.Complete user mobility via user and trajectory embeddings[J].IEEE Access,2018,6:72125-72136.
|
[16] |
Zhou F,Gao Q,Trajcevski G,et al.Trajectory-user linking via variational AutoEncoder[C]∥Proc of the 27th International Joint Conference on Artificial Intelligence,2018:3212-3218.
|
[17] |
Zhou F,Yin R,Trajcevski G,et al.Improving human mobility identification with trajectory augmentation[J].GeoInformatica,2021, 25(3):453-483.
|
[18] |
Quan Bo,Yang Bo-chen,Hu Ke-qi,et al.Prediction model of ship trajectory based on LSTM [J].Computer Science,2018,45(z2):126-131.(in Chinese)
|
[19] |
Li Xu-juan,Pi Jian-yong.A review of the application of deep learning in trajectory data mining [J].Computer Science and Application,2019,9(12):2357-2366.(in Chinese)
|
[20] |
Liu Q,Wu S,Wang L,et al.Predicting the next location:A recurrent model with spatial and temporal contexts[C]∥Proc of the 13th AAAI Conference on Artificial Intelligence,2016:194-200.
|
[21] |
Li X C, Zhao K Q,Cong G, et al.Deep representation learning for trajectory similarity computation[C]∥Proc of
|
|
the 34th International Conference on Data Engineering,2018:617-628.
|
[22] |
Le Q, Mikolov T. Distributed representations of sentences and documents[C]∥Proc of the 31st International Confe- rence on Machine Learning, 2014:1188-1196.
|
[23] |
GeoLifeData [EB/OL]. [2019-01-29]. http://research.microsoft.com/enus/downloads/b16d359d-d164-469e-9fd4-daa38f2b2e13/default.asp.
|
|
附中文参考文献:
|
[18] |
权波,杨博辰,胡可奇,等.基于LSTM的船舶航迹预测模型[J].计算机科学,2018,45(z2):126-131.
|
[19] |
李旭娟,皮建勇.深度学习在轨迹数据挖掘中的应用研究综述[J].计算机科学与应用,2019,9(12):2357-2366.
|