Computer Science ›› 2018, Vol. 45 ›› Issue (6): 130-134.doi: 10.11896/j.issn.1002-137X.2018.06.022
• Information Security • Previous Articles Next Articles
ZHANG Pan-pan1,2,4, PENG Chang-gen2,3,4,5, HAO Chen-yan1,2,4
CLC Number:
[1]SHANNON C E.A mathematical theory of communication[J].Bell System Technical Journal,1948,27(3):379-423. [2]DÍAZ C,SEYS S,CLAESSENS J,et al.Towards Measuring Anonymity[C]//International Conference on Privacy Enhancing Technologies.Springer-Verlag,2002:54-68. [3]MA Z,KARGL F,WEBER M.Measuring location privacy in V2X communication systems with accumulated information[C]//IEEE International Conference on Mobile Adhoc and Sensor Systems.IEEE,2009:322-331. [4]CHEN X,PANG J.Measuring query privacy in location-based services[C]//ACM Conference on Data and Application Security and Privacy.ACM,2012:49-60. [5]YANG Y,LUTES J,LI F,et al.Stalking online:On user privacy in social networks[C]//ACM Conference on Data and Application Security and Privacy.ACM,2012:37-48. [6]ZHANG X J,GUI X L,FENG Z C,et al.A Quantifying Framework of Query Privacy in Location-Based Service[J].Journal of Xi’an Jiaotong University,2014,48(2):8-13.(in Chinese) 张学军,桂小林,冯志超,等.位置服务中的查询隐私度量框架研究[J].西安交通大学学报,2014,48(2):8-13. [7]PENG C G,DING H F,ZHU Y J,et al.Information Entropy Models and Privacy Metrics for Privacy Protection[J].Journal of Software,2016,27(8):1891-1903.(in Chinese) 彭长根,丁红发,朱义杰,等.隐私保护的信息熵模型及其度量方法[J].软件学报,2016,27(8):1891-1903. [8]LIU D,BAGH A.New Privacy-Preserving Ascending Auction for Assignment Problems[J/OL].http://dx.doi.org/10.2139/ssrn.2883867. [9]DWORK C.Differential privacy[J].Lecture Notes in Computer Science,2006,26(2):1-12. [10]VADHAN S.The Complexity of Differential Privacy[J/OL].http://doi.org/10.1007/978-3-319-57048-8-7. [11]CHATZIKOKOLAKIS K,PALAMIDESSI C,STRONATI M. Constructing elastic distinguish ability metrics for location privacy[J].Proceedings on Privacy Enhancing Technologies,2015,2015(2):156-170. [12]LIU H,KRISHNAMACHARI B,ANNAVARAM M.Game theoretic approach to location sharing with privacy in a community-based mobile safety application[C]//Proceedings of the 11th International Symposium on Modeling,Analysis and Simulation of Wireless and Mobile Systems.ACM,2008:229-238. [13]HUMBERT M,MANSHAEI M H,FREUDIGER J,et al.Tracking Games in Mobile Networks[C]//International Conference on Decision & Game Theory for Security.Springer-Verlag,2010:595-599. [14]CHORPPATH A K,ALPCAN T.Trading privacy with incentives in mobile commerce:A game theoretic approach[J].Pervasive & Mobile Computing,2013,9(4):598-612. [15]ZHOU D D,LI W W,SUN Y Q.Survey on Game Theory Based Privacy Protection[J].Journal of Chinese Computer Systems,2015,36(12):2696-2700.(in Chinese) 周丹丹,李威伟,孙宇清.博弈论隐私保护方法研究综述[J].小型微型计算机系统,2015,36(12):2696-2700. [16]XU L,JIANG C,WANG J,et al.Game theoretic data privacy preservation:Equilibrium and pricing[C]//IEEE International Conference on Communications.IEEE,2015:7071-7076. [17]ZHANG Y X,HE J S,ZHAO B,et al.A Privacy Protection Model Base on Game Theory[J].Chinese Journal of Computers,2016,39(3):615-627.(in Chinese) 张伊璇,何泾沙,赵斌,等.一个基于博弈理论的隐私保护模型[J].计算机学报,2016,39(3):615-627. [18]PANAOUSIS E,LASZKA A,POHL J,et al.Game-Theoretic Model of Incentivizing Privacy-Aware Users to Consent to Location Tracking[C]//IEEE Computer Society.2016:1006-1013. [19]WU X,DOU W,NI Q.Game theory based privacy preserving analysis in correlated data publication[C]//Australasian Computer Science Week Multiconference.ACM,2017:73. [20]YUAN M,CHEN L,YU P S.Personalized privacy protection in social networks[J].Proceedings of the Vldb Endowment,2010,4(2):141-150. [21]GUO M,LIU Z,WANG H B.Personalized Privacy Preserving Approaches for Multiple Sensitive Attributes in Data Publishing[J/OL].https://doi.org/10.12783/dtetr/ssme-ist2016/3965. [22]FUDENBERG D,TIROLE J.Game Theory[J].Mit Press Books, 2010,1(7):841-846. |
[1] | LU Chen-yang, DENG Su, MA Wu-bin, WU Ya-hui, ZHOU Hao-hao. Federated Learning Based on Stratified Sampling Optimization for Heterogeneous Clients [J]. Computer Science, 2022, 49(9): 183-193. |
[2] | JIANG Yang-yang, SONG Li-hua, XING Chang-you, ZHANG Guo-min, ZENG Qing-wei. Belief Driven Attack and Defense Policy Optimization Mechanism in Honeypot Game [J]. Computer Science, 2022, 49(9): 333-339. |
[3] | YUAN Wei-lin, LUO Jun-ren, LU Li-na, CHEN Jia-xing, ZHANG Wan-peng, CHEN Jing. Methods in Adversarial Intelligent Game:A Holistic Comparative Analysis from Perspective of Game Theory and Reinforcement Learning [J]. Computer Science, 2022, 49(8): 191-204. |
[4] | XU Hao, CAO Gui-jun, YAN Lu, LI Ke, WANG Zhen-hong. Wireless Resource Allocation Algorithm with High Reliability and Low Delay for Railway Container [J]. Computer Science, 2022, 49(6): 39-43. |
[5] | WANG Mei-shan, YAO Lan, GAO Fu-xiang, XU Jun-can. Study on Differential Privacy Protection for Medical Set-Valued Data [J]. Computer Science, 2022, 49(4): 362-368. |
[6] | JIN Hua, ZHU Jing-yu, WANG Chang-da. Review on Video Privacy Protection [J]. Computer Science, 2022, 49(1): 306-313. |
[7] | LEI Yu-xiao , DUAN Yu-cong. AI Governance Oriented Legal to Technology Bridging Framework for Cross-modal Privacy Protection [J]. Computer Science, 2021, 48(9): 9-20. |
[8] | LI Shao-hui, ZHANG Guo-min, SONG Li-hua, WANG Xiu-lei. Incomplete Information Game Theoretic Analysis to Defend Fingerprinting [J]. Computer Science, 2021, 48(8): 291-299. |
[9] | GUO Rui, LU Tian-liang, DU Yan-hui. Source-location Privacy Protection Scheme Based on Target Decision in WSN [J]. Computer Science, 2021, 48(5): 334-340. |
[10] | WANG Rui-jin, TANG Yu-cheng, PEI Xi-kai, GUO Shang-tong, ZHANG Feng-li. Block-chain Privacy Protection Scheme Based on Lightweight Homomorphic Encryption and Zero-knowledge Proof [J]. Computer Science, 2021, 48(11A): 547-551. |
[11] | LI Yu, DUAN Hong-yue, YIN Yu-yu, GAO Hong-hao. Survey of Crowdsourcing Applications in Blockchain Systems [J]. Computer Science, 2021, 48(11): 12-27. |
[12] | YU Qi-long, LU Ning, SHI Wen-bo. Traceable Mixing Scheme for Bitcoin [J]. Computer Science, 2021, 48(11): 72-78. |
[13] | WEI Li-qi, ZHAO Zhi-hong, BAI Guang-wei, SHEN Hang. Location Privacy Game Mechanism Based on Generative Adversarial Networks [J]. Computer Science, 2021, 48(10): 266-271. |
[14] | YU Xue-yong, CHEN Tao. Privacy Protection Offloading Algorithm Based on Virtual Mapping in Edge Computing Scene [J]. Computer Science, 2021, 48(1): 65-71. |
[15] | LI Yan, SHEN De-rong, NIE Tie-zheng, KOU Yue. Multi-keyword Semantic Search Scheme for Encrypted Cloud Data [J]. Computer Science, 2020, 47(9): 318-323. |
|