[1] Kazemi L, Shahabi C. GeoCrowd:Enabling query answering with spatial crowdsourcing. In Proc. the 20th Int. Conf. Advances in Geographic Information Systems, November 2012, pp.189198.
[2] Deng D X, Shahabi C, Demiryurek U, Zhu L H. Task selection in spatial crowdsourcing from worker's perspective. GeoInformatica, 2016, 20(3):529568.
[3] Cheng P, Lian X, Chen Z, Fu R, Chen L, Han J S, Zhao J Z. Reliable diversitybased spatial crowdsourcing by moving workers. Proceedings of the VLDB Endowment, 2015, 8(10):10221033.
[4] Cheng P, Lian X, Chen L, Han J S, Zhao J Z. Task assignment on multiskill oriented spatial crowdsourcing. IEEE Trans. Knowledge and Data Engineering, 2016, 28(8):22012215.
[5] Ghinita G, Kalnis P, Khoshgozaran A, Shahabi C, Tan K L. Private queries in location based services:Anonymizers are not necessary. In Proc. the ACM SIGMOD Int. Conf. Management of Data, June 2008, pp.121132.
[6] Paulet R, Kaosar M G, Yi X, Bertino E. Privacypreserving and contentprotecting location based queries. In Proc. the 28th IEEE Int. Conf. Data Engineering, April 2012, pp.4453.
[7] Paulet R, Kaosar M G, Yi X, Bertino E. Privacypreserving and contentprotecting location based queries. IEEE Trans. Knowledge and Data Engineering, 2014, 26(5):12001210.
[8] Yi X, Paulet R, Bertino E, Varadharajan V. Practical k nearest neighbor queries with location privacy. In Proc. the 30th IEEE Int. Conf. Data Engineering, March 31April 4, 2014, pp.640651.
[9] Yi X, Paulet R, Bertino E, Varadharajan V. Practical approximate k nearest neighbor queries with location and query privacy. IEEE Trans. Knowledge and Data Engineering, 2016, 28(6):15461559.
[10] Liu S S, Liu A, Zhao L, Liu G F, Li Z X, Zhao P P, Zheng K, Qin L. Efficient query processing with mutual privacy protection for locationbased services. In Proc. the 21st Int. Conf. Database Systems for Advanced Applications, April 2016, pp.299313.
[11] To H, Ghinita G, Shahabi C. A framework for protecting worker location privacy in spatial crowdsourcing. Proceedings of the VLDB Endowment, 2014, 7(10):919930.
[12] To H, Ghinita G, Shahabi C. PrivGeoCrowd:A toolbox for studying private spatial crowdsourcing. In Proc. the 31st IEEE Int. Conf. Data Engineering, April 2015, pp.14041407.
[13] Liu B Z, Chen L, Zhu X Q, Zhang Y, Zhang C Q, Qiu W D. Protecting location privacy in spatial crowdsourcing using encrypted data. In Proc. the 20th Int. Conf. Extending Database Technology, March 2017, pp.478481.
[14] Liu A, Wang W Q, Shang S, Li Q, Zhang X L. Efficient task assignment in spatial crowdsourcing with worker and task privacy protection. Geoinformatica, 2017. DOI:101007/s1070701703052.
[15] Dwork C. Differential privacy:A survey of results. In Proc. the 5th Int. Conf. Theory and Applications of Models of Computation, April 2008.
[16] Hightower J, Borriello G. Location systems for ubiquitous computing. Computer, 2001, 34(8):5766.
[17] Paillier P. Publickey cryptosystems based on composite degree residuosity classes. In Proc. the 17th Int. Conf. Theory and Application of Cryptographic Techniques, May 1999, pp.223238.
[18] Yao A C C. How to generate and exchange secrets. In Proc. the 27th Annual Symp. Foundations of Computer Science, October 1986, pp.162167.
[19] Lindell Y, Pinkas B. A proof of security of Yao's protocol for twoparty computation. Journal of Cryptology, 2009, 22(2):161188.
[20] Gentry C. Fully homomorphic encryption using ideal lattices. In Proc. the 41st Annual ACM Symp. Theory of Computing, May 31June 2, 2009, pp.169178.
[21] Gentry C, Halevi S. Implementing Gentry's fullyhomomorphic encryption scheme. In Proc. the 30th Annual Int. Conf. Theory and Applications of Cryptographic Techniques:Advances in Cryptology, May 2011, pp.129148.
[22] Elmehdwi Y, Samanthula B K, Jiang W. Secure knearest neighbor query over encrypted data in outsourced environments. In Proc. the 30th IEEE Int. Conf. Data Engineering, March 31April 4, 2014, pp.664675.
[23] Liu A, Zheng K, Li L, Liu G F, Zhao L, Zhou X F. Efficient secure similarity computation on encrypted trajectory data. In Proc. the 31st IEEE Int. Conf. Data Engineering, April 2015, pp.6677.
[24] Liu J F, Yang J C, Xiong L, Pei J. Secure skyline queries on cloud platform. In Proc. the 33rd IEEE Int. Conf. Data Engineering, April 2017, pp.633644.
[25] Goldreich O. Foundations of Cryptography:Volume 2, Basic Applications. Cambridge University Press, 2004.
[26] Samanthula B K, Rao F Y, Bertino E, Yi X. Privacypreserving protocols for shortest path discovery over outsourced encrypted graph data. In Proc. Int. Conf. Information Reuse and Integration, August 2015, pp.427434.
[27] Nikolaenko V, Ioannidis S, Weinsberg U, Joye M, Taft N, Boneh D. Privacypreserving matrix factorization. In Proc. the ACM SIGSAC Conf. Computer & Communications Security, November 2013, pp.801812.
[28] Zhu H H, Meng X R, Kollios G. Privacy preserving similarity evaluation of time series data. In Proc. the 17th Int. Conf. Extending Database Technology, March 2014, pp.499510.
[29] Kolesnikov V, Sadeghi A R, Schneider T. Improved garbled circuit building blocks and applications to auctions and computing minima. In Proc. the 8th Int. Conf. Cryptology and Network Security, December 2009, pp.120.
[30] Mokbel M F, Chow C Y, Aref W G. The new Casper:Query processing for location services without compromising privacy. In Proc. the 32nd Int. Conf. Very Large Data Bases, September 2006, pp.763774.
[31] Huang Y, Evans D, Katz J, Malka L. Faster secure twoparty computation using garbled circuits. In Proc. the 20th USENIX Conf. Security, August 2011.
[32] Li G L, Wang J N, Zheng Y D, Franklin M J. Crowdsourced data management:A survey. IEEE Trans. Knowledge and Data Engineering, 2016, 28(9):22962319.
[33] Chen L, Shahabi C. Spatial crowdsourcing:Challenges and opportunities. Bulletin of the Technical Committee on Data Engineering, 2016, 39(4):1425.
[34] Tong Y X, She J Y, Ding B L, Wang L B, Chen L. Online mobile microtask allocation in spatial crowdsourcing. In Proc. the 32nd IEEE Int. Conf. Data Engineering, May 2016, pp.4960.
[35] Zheng L, Chen L. Mutual benefit aware task assignment in a bipartite labor market. In Proc. the 32nd IEEE Int. Conf. Data Engineering, May 2016, pp.7384.
[36] Yiu M L, Ghinita G, Jensen C S, Kalnis P. Enabling search services on outsourced private spatial data. The VLDB Journal, 2010, 19(3):363384.
[37] Yao B, Li F F, Xiao X K. Secure nearest neighbor revisited. In Proc. the 29th IEEE Int. Conf. Data Engineering, April 2013, pp.733744.
[38] Shin M, Cornelius C, Peebles D, Kapadia A, Kotz D, Triandopoulos N. AnonySense:A system for anonymous opportunistic sensing. Pervasive and Mobile Computing, 2011, 7(1):1630.
[39] Boutsis I, Kalogeraki V. Privacy preservation for participatory sensing data. In Proc. IEEE Int. Conf. Pervasive Computing and Communications, March 2013, pp.103113.
[40] Agir B, Papaioannou T G, Narendula R, Aberer K, Hubaux J P. Userside adaptive protection of location privacy in participatory sensing. GeoInformatica, 2014, 18(1):165191.
[41] VergaraLaurens I J, Mendez D, Labrador M A. Privacy, quality of information, and energy consumption in participatory sensing systems. In Proc. IEEE Int. Conf. Pervasive Computing and Communications, March 2014, pp.199207.
[42] Zhang F, He L, He W B, Liu X. Data perturbation with statedependent noise for participatory sensing. In Proc. IEEE INFOCOM, March 2012, pp.22462254.
[43] Li Q H, Cao G H. Efficient and privacypreserving data aggregation in mobile sensing. In Proc. the 20th IEEE Int. Conf. Network Protocols, October 30November 2, 2012.
[44] Kazemi L, Shahabi C. A privacyaware framework for participatory sensing. ACM SIGKDD Explorations Newsletter, 2011, 13(1):4351.
