| 1 | 
																						 
											张萌, 杨志伟, 姜江, 等. 军事物联网体系试验初探[J]. 军事运筹与评估, 2023, 38(1): 67-72.
																						 | 
										
																													
																							 | 
																						 
											Zhang Meng, Yang Zhiwei, Jiang Jiang, et al. Preliminary Study on the Military Internet of Things System Tests[J]. Military Operations Research and Assessment, 2023, 38(1): 67-72.
																						 | 
										
																													
																							| 2 | 
																						 
											Yu Juan. Design of Location Security Protection System Based on Internet of Things[C]//2022 4th International Conference on Applied Machine Learning (ICAML). Piscataway, NJ, USA: IEEE, 2022: 273-276.
																						 | 
										
																													
																							| 3 | 
																						 
											Calcara A, Gilli A, Gilli M, et al. Why Drones Have Not Revolutionized War: the Enduring Hider-finder Competition in Air Warfare[J]. International Security, 2022, 46(4): 130-171.
																						 | 
										
																													
																							| 4 | 
																						 
											Asada M, Yoshikawa M, Cao Yang. "When and Where Do You Want to Hide?" - Recommendation of Location Privacy Preferences With Local Differential Privacy[C]//Data and Applications Security and Privacy XXXIII. Cham: Springer International Publishing, 2019: 164-176.
																						 | 
										
																													
																							| 5 | 
																						 
											李沛谕, 张治学. 基于安全区域的汇聚节点位置隐私保护协议算法设计[J]. 系统仿真学报, 2015, 27(12): 2973-2980.
																						 | 
										
																													
																							 | 
																						 
											Li Peiyu, Zhang Zhixue. Protocol Algorithm Design of Location Privacy Preserving for Sink Node Based on Security Area[J]. Journal of System Simulation, 2015, 27(12): 2973-2980.
																						 | 
										
																													
																							| 6 | 
																						 
											Zhu Liang, Liu Xiaowei, Jing Zhiyong, et al. Knowledge-driven Location Privacy Preserving Scheme for Location-based Social Networks[J]. Electronics, 2023, 12(1): 70.
																						 | 
										
																													
																							| 7 | 
																						 
											Naher N, Hashem T. Loukas G. Think Ahead: Enabling Continuous Sharing of Location Data in Real-time With Privacy Guarantee[J]. The Computer Journal, 2019, 62(1): 1-19.
																						 | 
										
																													
																							| 8 | 
																						 
											Zhang Shiwen, Li Mengling, Liang Wei, et al. A Survey of Dummy-based Location Privacy Protection Techniques for Location-based Services[J]. Sensors, 2022, 22(16): 6141.
																						 | 
										
																													
																							| 9 | 
																						 
											Nisha N, Natgunanathan I, Gao Shang, et al. A Novel Privacy Protection Scheme for Location-based Services Using Collaborative Caching[J]. Computer Networks, 2022, 213: 109107.
																						 | 
										
																													
																							| 10 | 
																						 
											Tian Cenxi, Xu Hongyun, Lu Tao, et al. Semantic and Trade-off Aware Location Privacy Protection in Road Networks Via Improved Multi-objective Particle Swarm Optimization[J]. IEEE Access, 2021, 9: 54264-54275.
																						 | 
										
																													
																							| 11 | 
																						 
											Zhang Shaobo, Li Xiong, Tan Zhiyuan, et al. A Caching and Spatial K-anonymity Driven Privacy Enhancement Scheme in Continuous Location-based Services[J]. Future Generation Computer Systems, 2019, 94: 40-50.
																						 | 
										
																													
																							| 12 | 
																						 
											Chen Guobin, Li Shijin. Markov and Improved Particle Swarm Optimization-based Privacy Preservation Algorithm for User Space Geographical Location[J]. European Journal of Remote Sensing, 2020, 53(S1): 31-40.
																						 | 
										
																													
																							| 13 | 
																						 
											Kido H, Yanagisawa Y, Satoh T. An Anonymous Communication Technique Using Dummies for Location-based Services[C]//ICPS '05. Proceedings. International Conference on Pervasive Services, 2005. Piscataway, NJ, USA: IEEE, 2005: 88-97.
																						 | 
										
																													
																							| 14 | 
																						 
											Sun Gang, Chang V, Ramachandran M, et al. Efficient Location Privacy Algorithm for Internet of Things (IoT) Services and Applications[J]. Journal of Network and Computer Applications, 2017, 89: 3-13.
																						 | 
										
																													
																							| 15 | 
																						 
											Dua A, Singh P, Bapat J. Location Privacy-preserving Mechanism - A Data-driven Approach[C]//2021 IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT). Piscataway, NJ, USA: IEEE, 2021: 1-6.
																						 | 
										
																													
																							| 16 | 
																						 
											叶清, 李默泚, 宋莹莹, 等. 基于噪声加密机制的WSN差分位置隐私保护[J]. 传感技术学报, 2019, 32(12): 1904-1910.
																						 | 
										
																													
																							 | 
																						 
											Ye Qing, Li Moqian, Song Yingying, et al. Noise Encrypted Based Differential Location Privacy Protection in Wireless Sensors Network[J]. Chinese Journal of Sensors and Actuators, 2019, 32(12): 1904-1910.
																						 | 
										
																													
																							| 17 | 
																						 
											He Weixin, Cong Linhu. Intelligent Security System Based on Location Information[C]//2020 5th International Conference on Mechanical, Control and Computer Engineering (ICMCCE). Piscataway, NJ, USA: IEEE, 2020: 985-989.
																						 | 
										
																													
																							| 18 | 
																						 
											Utsav A, Abhishek A, Suraj P, et al. An IoT Based UAV Network for Military Applications[C]//2021 Sixth International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET). Piscataway, NJ, USA: IEEE, 2021: 122-125.
																						 | 
										
																													
																							| 19 | 
																						 
											Tortonesi M, Wrona K, Suri N. Secured Distributed Processing and Dissemination of Information in Smart City Environments[J]. IEEE Internet of Things Magazine, 2019, 2(2): 38-43.
																						 | 
										
																													
																							| 20 | 
																						 
											Toth A. Internet of Things Vulnerabilities in Military Environments[J]. Vojenské Rozhledy, 2021, 30(3): 45-58.
																						 | 
										
																													
																							| 21 | 
																						 
											Goldwasser S, Micali S, Rackoff C. The Knowledge Complexity of Interactive Proof Systems[J]. SIAM Journal on Computing, 1989, 18(1): 186-208.
																						 |