1 |
张萌, 杨志伟, 姜江, 等. 军事物联网体系试验初探[J]. 军事运筹与评估, 2023, 38(1): 67-72.
|
|
Zhang Meng, Yang Zhiwei, Jiang Jiang, et al. Preliminary Study on the Military Internet of Things System Tests[J]. Military Operations Research and Assessment, 2023, 38(1): 67-72.
|
2 |
Yu Juan. Design of Location Security Protection System Based on Internet of Things[C]//2022 4th International Conference on Applied Machine Learning (ICAML). Piscataway, NJ, USA: IEEE, 2022: 273-276.
|
3 |
Calcara A, Gilli A, Gilli M, et al. Why Drones Have Not Revolutionized War: the Enduring Hider-finder Competition in Air Warfare[J]. International Security, 2022, 46(4): 130-171.
|
4 |
Asada M, Yoshikawa M, Cao Yang. "When and Where Do You Want to Hide?" - Recommendation of Location Privacy Preferences With Local Differential Privacy[C]//Data and Applications Security and Privacy XXXIII. Cham: Springer International Publishing, 2019: 164-176.
|
5 |
李沛谕, 张治学. 基于安全区域的汇聚节点位置隐私保护协议算法设计[J]. 系统仿真学报, 2015, 27(12): 2973-2980.
|
|
Li Peiyu, Zhang Zhixue. Protocol Algorithm Design of Location Privacy Preserving for Sink Node Based on Security Area[J]. Journal of System Simulation, 2015, 27(12): 2973-2980.
|
6 |
Zhu Liang, Liu Xiaowei, Jing Zhiyong, et al. Knowledge-driven Location Privacy Preserving Scheme for Location-based Social Networks[J]. Electronics, 2023, 12(1): 70.
|
7 |
Naher N, Hashem T. Loukas G. Think Ahead: Enabling Continuous Sharing of Location Data in Real-time With Privacy Guarantee[J]. The Computer Journal, 2019, 62(1): 1-19.
|
8 |
Zhang Shiwen, Li Mengling, Liang Wei, et al. A Survey of Dummy-based Location Privacy Protection Techniques for Location-based Services[J]. Sensors, 2022, 22(16): 6141.
|
9 |
Nisha N, Natgunanathan I, Gao Shang, et al. A Novel Privacy Protection Scheme for Location-based Services Using Collaborative Caching[J]. Computer Networks, 2022, 213: 109107.
|
10 |
Tian Cenxi, Xu Hongyun, Lu Tao, et al. Semantic and Trade-off Aware Location Privacy Protection in Road Networks Via Improved Multi-objective Particle Swarm Optimization[J]. IEEE Access, 2021, 9: 54264-54275.
|
11 |
Zhang Shaobo, Li Xiong, Tan Zhiyuan, et al. A Caching and Spatial K-anonymity Driven Privacy Enhancement Scheme in Continuous Location-based Services[J]. Future Generation Computer Systems, 2019, 94: 40-50.
|
12 |
Chen Guobin, Li Shijin. Markov and Improved Particle Swarm Optimization-based Privacy Preservation Algorithm for User Space Geographical Location[J]. European Journal of Remote Sensing, 2020, 53(S1): 31-40.
|
13 |
Kido H, Yanagisawa Y, Satoh T. An Anonymous Communication Technique Using Dummies for Location-based Services[C]//ICPS '05. Proceedings. International Conference on Pervasive Services, 2005. Piscataway, NJ, USA: IEEE, 2005: 88-97.
|
14 |
Sun Gang, Chang V, Ramachandran M, et al. Efficient Location Privacy Algorithm for Internet of Things (IoT) Services and Applications[J]. Journal of Network and Computer Applications, 2017, 89: 3-13.
|
15 |
Dua A, Singh P, Bapat J. Location Privacy-preserving Mechanism - A Data-driven Approach[C]//2021 IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT). Piscataway, NJ, USA: IEEE, 2021: 1-6.
|
16 |
叶清, 李默泚, 宋莹莹, 等. 基于噪声加密机制的WSN差分位置隐私保护[J]. 传感技术学报, 2019, 32(12): 1904-1910.
|
|
Ye Qing, Li Moqian, Song Yingying, et al. Noise Encrypted Based Differential Location Privacy Protection in Wireless Sensors Network[J]. Chinese Journal of Sensors and Actuators, 2019, 32(12): 1904-1910.
|
17 |
He Weixin, Cong Linhu. Intelligent Security System Based on Location Information[C]//2020 5th International Conference on Mechanical, Control and Computer Engineering (ICMCCE). Piscataway, NJ, USA: IEEE, 2020: 985-989.
|
18 |
Utsav A, Abhishek A, Suraj P, et al. An IoT Based UAV Network for Military Applications[C]//2021 Sixth International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET). Piscataway, NJ, USA: IEEE, 2021: 122-125.
|
19 |
Tortonesi M, Wrona K, Suri N. Secured Distributed Processing and Dissemination of Information in Smart City Environments[J]. IEEE Internet of Things Magazine, 2019, 2(2): 38-43.
|
20 |
Toth A. Internet of Things Vulnerabilities in Military Environments[J]. Vojenské Rozhledy, 2021, 30(3): 45-58.
|
21 |
Goldwasser S, Micali S, Rackoff C. The Knowledge Complexity of Interactive Proof Systems[J]. SIAM Journal on Computing, 1989, 18(1): 186-208.
|