SCIE, EI, Scopus, INSPEC, DBLP, CSCD, etc.
Citation: | Yubin Duan, Guo-Ju Gao, Ming-Jun Xiao, Jie Wu. Cloaking Region Based Passenger Privacy Protection in Ride-Hailing Systems[J]. Journal of Computer Science and Technology, 2020, 35(3): 629-646. DOI: 10.1007/s11390-020-0256-1 |
[1] |
Duan Y, Mosharraf T, Wu J, Zheng H. Optimizing carpool scheduling algorithm through partition merging. In Proc. the IEEE Int. Conf. Communication, May 2018.
|
[2] |
Gao G, Xiao M, Zhao Z. Optimal multi-taxi dispatch for mobile taxi-hailing systems. In Proc. the 45th IEEE Int. Conf. Parallel Processing, August 2016, pp.294-303.
|
[3] |
Shokri R, Theodorakopoulos G, le Boudec J Y, Hubaux J P. Quantifying location privacy. In Proc. the 32nd IEEE Symp. Security and Privacy, May 2011, pp.247-262.
|
[4] |
Meyer-Lee G, Shang J, Wu J. Location-leaking through network traffic in mobile augmented reality applications. In Proc. the 37th IEEE Int. Performance Computing and Communications Conf., November 2018.
|
[5] |
Damiani M L, Bertino E, Silvestri C. The PROBE framework for the personalized cloaking of private locations. Trans. Data Privacy, 2010, 3(2):123-148.
|
[6] |
Xue M, Kalnis P, Pung H K. Location diversity:Enhanced privacy protection in location based services. In Proc. the 4th Int. Symp. Location and Context Awareness, May 2009, pp.70-87.
|
[7] |
Pham A, Dacosta I, Endignoux G, Troncoso-Pastoriza J R, Huguenin K, Hubaux J P. ORide:A privacy-preserving yet accountable ride-hailing service. In Proc. the 26th USENIX Security Symp., August 2017, pp.1235-1252.
|
[8] |
Aïvodji U M, Huguenin K, Huguet M J, Killijian M O. SRide:A privacy-preserving ridesharing system. In Proc. the 11th ACM Conf. Security&Privacy in Wireless and Mobile Networks, June 2018, pp.40-50.
|
[9] |
He Y, Ni J, Wang X, Niu B, Li F, Shen X. Privacypreserving partner selection for ride-sharing services. IEEE Trans. Vehicular Technology, 2018, 67(7):5994-6005.
|
[10] |
Khazbak Y, Fan J, Zhu S, Cao G. Preserving location privacy in ride-hailing service. In Proc. the 2008 IEEE Conf. Communications and Network Security, May 2018.
|
[11] |
Aurenhammer F. Voronoi diagrams-A survey of a fundamental geometric data structure. ACM Computing Surveys, 1991, 23(3):345-405.
|
[12] |
Duan Y, Gao G, Xiao M, Wu J. A privacy-preserving order dispatch scheme for ride-hailing services. In Proc. the 16th Int. Conf. Mobile Ad-hoc and Smart Systems, November 2019.
|
[13] |
Hadiwardoyo S A, Patra S, Calafate C T, Cano J C, Manzoni P. An intelligent transportation system application for smartphones based on vehicle position advertising and route sharing in vehicular ad-hoc networks. Journal of Computer Sci. and Tech., 2018, 33(2):249-262.
|
[14] |
Beresford A R, Stajano F. Location privacy in pervasive computing. IEEE Pervasive Computing, 2003, 2(1):46-55.
|
[15] |
Liu A, Li Z X, Liu G F, Zheng K, Zhang M, Li Q, Zhang X. Privacy-preserving task assignment in spatial crowdsourcing. Journal of Computer Sci. and Tech., 2017, 32(5):905-918
|
[16] |
Hoh B, Gruteser M. Protecting location privacy through path confusion. In Proc. the 1st IEEE Int. Conf. Security and Privacy for Emerging Areas in Communications Networks, September 2005, pp.194-205.
|
[17] |
Sánchez D, Martínez S, Domingo-Ferrer J. Co-utile P2P ridesharing via decentralization and reputation management. Transportation Research Part C:Emerging Technologies, 2016, 73:147-166.
|
[18] |
Goel P, Kulik L, Ramamohanarao K. Optimal pick up point selection for effective ride sharing. IEEE Trans. Big Data, 2017, 3(2):154-168.
|
[19] |
Dai C, Yuan X, Wang C. Privacy-preserving ridesharing recommendation in geosocial networks. In Proc. the 5th Int. Conf. Computational Social Networks, August 2016, pp.193-205.
|
[20] |
Aïvodji U M, Gambs S, Huguet M J, Killijian M O. Meeting points in ridesharing:A privacy-preserving approach. Transportation Research Part C:Emerging Technologies, 2016, 72:239-253.
|
[21] |
Li H, Zhu H, Du S, Liang X, Shen X S. Privacy leakage of location sharing in mobile social networks:Attacks and defense. IEEE Trans. Dependable and Secure Computing, 2018, 15(4):646-660.
|
[22] |
Zhang N, Zhong S, Tian L. Using blockchain to protect personal privacy in the scenario of online taxi-hailing. Int. Journal of Computers Communications Control, 2017, 12(6):886-902.
|
[23] |
Pham A, Dacosta I, Jacot-Guillarmod B, Huguenin K, Hajar T, Tramèr F, Gligor V, Hubaux J P. PrivateRide:A privacy-enhanced ride-hailing service. Proceedings on Privacy Enhancing Technologies, 2017, 2017(2):38-56.
|
[24] |
Liang X, Li X, Lu R, Lin X, Shen X. UDP:Usage-based dynamic pricing with privacy preservation for smart grid. IEEE Trans. Smart Grid, 2013, 4(1):141-150.
|
[25] |
Zhuo X, Gao W, Cao G, Dai Y. Win-coupon:An incentive framework for 3G traffic offloading. In Proc. the 19th Annual IEEE Int. Conf. Network Protocols, October 2011, pp.206-215.
|
[26] |
Gao G, Xiao M, Wu J, Huang L, Hu C. Truthful incentive mechanism for nondeterministic crowdsensing with vehicles. IEEE Trans. Mobile Computing, 2018, 17(12):2982-2997.
|
[27] |
Edelman B, Ostrovsky M, Schwarz M. Internet advertising and the generalized second-price auction:Selling billions of dollars worth of keywords. The American Economic Review, 2007, 97(1):242-259.
|
[28] |
Vickrey W. Counterspeculation, auctions, and competitive sealed tenders. The Journal of Finance, 1961, 16(1):8-37.
|
[29] |
Cheng R, Zhang Y, Bertino E, Prabhakar S. Preserving user location privacy in mobile data management infrastructures. In Proc. the 6th Int. Workshop on Privacy Enhancing Technologies, June 2006, pp.393-412.
|
[1] | Dong-Yu Cao, Hao Yin, Bi-Xin Li. A Random Mixing Scheme for Protecting Transaction Privacy on Ethereum[J]. Journal of Computer Science and Technology, 2025, 40(3): 731-747. DOI: 10.1007/s11390-024-3843-8 |
[2] | Maryam Zarezadeh, Hamid Mala, Homa Khajeh. Preserving Privacy of Software-Defined Networking Policies by Secure Multi-Party Computation[J]. Journal of Computer Science and Technology, 2020, 35(4): 863-874. DOI: 10.1007/s11390-020-9247-5 |
[3] | Lie-Huang Zhu, Bao-Kun Zheng, Meng Shen, Feng Gao, Hong-Yu Li, Ke-Xin Shi. Data Security and Privacy in Bitcoin System: A Survey[J]. Journal of Computer Science and Technology, 2020, 35(4): 843-862. DOI: 10.1007/s11390-020-9638-7 |
[4] | Yifan Wu, Fan Yang, Yong Xu, Haibin Ling. Privacy-Protective-GAN for Privacy Preserving Face De-Identification[J]. Journal of Computer Science and Technology, 2019, 34(1): 47-60. DOI: 10.1007/s11390-019-1898-8 |
[5] | Bao-Kun Zheng, Lie-Huang Zhu, Meng Shen, Feng Gao, Chuan Zhang, Yan-Dong Li, Jing Yang. Scalable and Privacy-Preserving Data Sharing Based on Blockchain[J]. Journal of Computer Science and Technology, 2018, 33(3): 557-567. DOI: 10.1007/s11390-018-1840-5 |
[6] | Xian-Mang He, Xiaoyang Sean Wang, Dong Li, Yan-Ni Hao. Semi-Homogenous Generalization:Improving Homogenous Generalization for Privacy Preservation in Cloud Computing[J]. Journal of Computer Science and Technology, 2016, 31(6): 1124-1135. DOI: 10.1007/s11390-016-1687-6 |
[7] | Linke Guo, Chi Zhang, Yuguang Fang, Phone Lin. A Privacy-Preserving Attribute-Based Reputation System in Online Social Networks[J]. Journal of Computer Science and Technology, 2015, 30(3): 578-597. DOI: 10.1007/s11390-015-1547-9 |
[8] | Hui Wang. Privacy-Preserving Data Sharing in Cloud Computing[J]. Journal of Computer Science and Technology, 2010, 25(3): 401-414. |
[9] | Ren-Yi Xiao. Survey on Anonymity in Unstructured Peer-to-Peer Systems[J]. Journal of Computer Science and Technology, 2008, 23(4): 660-671. |
[10] | Xiaolan Zhang, Brian King. An Anti-Counterfeiting RFID Privacy Protection Protocol[J]. Journal of Computer Science and Technology, 2007, 22(3): 438-448. |
1. | Ke Wang, Dongmin Yao, Mingyang Pei. What factors influence Chinese Women's nighttime ride-hailing preferences? An ICLV model analysis. Research in Transportation Economics, 2025, 110: 101538. DOI:10.1016/j.retrec.2025.101538 |
2. | Shixingyue Hu, Yazao Yang. Safety of female ride-hailing passengers: Perception and prevention. Humanities and Social Sciences Communications, 2024, 11(1) DOI:10.1057/s41599-024-02740-z |
3. | Hui Ma, Yuan Ping, Yong Zhang, et al. Privacy-Preserving Cross-Zone Ride-Matching for Online Ride-Hailing Service. Mathematical Problems in Engineering, 2022, 2022: 1. DOI:10.1155/2022/5040766 |
4. | Yousheng Zheng. Personal Information Protection Based on Big Data. Journal of Physics: Conference Series, 2021, 2037(1): 012134. DOI:10.1088/1742-6596/2037/1/012134 |
5. | M. Fadhil, Parman Sukarno, Aulia Arif Wardana. Intelligent Computing. Lecture Notes in Networks and Systems, DOI:10.1007/978-3-031-62273-1_24 |