[1] Hu C, Li W, Cheng X, et al. A secure and verifiable access control scheme for big data storage in clouds[J]. IEEE Transactions on Big data, 2017, 4(3):341-355. [2] Quattrone A, Naghizade E, Kulik L, et al. Tell me what you want and I will tell others where you have been[C]//Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management, Galway, Ireland, 2014:1783-1786. [3] Iqbal F, Fung B C M, Debbabi M. Mining criminal networks from chat log[C]//2012 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology, Macau, China, 2012, 1:332-337. [4] Jain R, Jain N, Nayyar A. Security and privacy in social networks:data and structural anonymity[M]//Handbook of Computer Networks and Cyber Security, Springer, 2020:265-293. [5] Chatzidimitris T, Gavalas D, Kasapakis V, et al. A location history-aware recommender system for smart retail environments[J]. Personal and Ubiquitous Computing, 2020:1-12. [6] Zhu J, Kim K H, Mohapatra P, et al. An adaptive privacy-preserving scheme for location tracking of a mobile user[C]//2013 IEEE International Conference on Sensing, Communications and Networking (SECON), New Orlean, USA, 2013:140-148. [7] Shokouhifard M. User privacy risks and protection in WLAN-based indoor positioning[D]. Tampere, Finland:Tampere University of Technology, 2015. [8] Wang X, Pande A, Zhu J, et al. STAMP:enabling privacy-preserving location proofs for mobile users[J]. IEEE/ACM Transactions on Networking, 2016, 24(6):3276-3289. [9] Liu H, Li H, Ma J, et al. Spatiotemporal correlation-aware dummy-based privacy protection scheme for location-based services[C]//IEEE International Conference on Computer Communications (INFOCOM), Atlanta, USA, 2017:1-9. [10] Pingley A, Zhang N, Fu X, et al. Protection of query privacy for continuous location based services[C]//IEEE International Conference on Computer Communications (INFOCOM), Shanghai, China, 2011:1710-1718. [11] Shankar P, Ganapathy V, Iftode L. Privately querying location-based services with sybilquery[C]//Proceedings of the 11th International Conference on Ubiquitous Computing, Sydney, Australia, 2009:31-40. [12] Gong X W, Chen X, Xing K, et al. Personalized location privacy in mobile networks:a social group utility approach[C]//2015 IEEE Conference on Computer Communications (INFOCOM), Hongkong, China, 2015:1008-1016. [13] Li M, Salinas S, Thaph A, et al. N-CD:a geometric approach to preserving location privacy in location-based services[C]//2013 IEEE Conference on Computer Communications, Turin, Italy, 2013:3012-3020. [14] Sweeney L. K-anonymity:a model for protecting privacy[J]. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2002, 10(5):557-570. [15] Baik H, Gruteser M. Protecting location privacy through path confusion[C]//First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM), Athens, Greece, 2005:194-205. [16] Liu J B, Jiang X T, Zhang S, et al. FADBM:frequency-aware dummy-based method in long-term location privacy protection[C]//IEEE 25th International Conference on Parallel and Distributed Systems (ICPADS), Tianjin, China, 2019:384-391. [17] Xu X L, Zhang X Y, Gao H H, et al. BeCome:blockchain-enabled computation offloading for IoT in mobile edge computing[J]. IEEE Transactions on Industrial Informatics, 2020(16):4187-4195. [18] Kido, H, Yanagisawa Y, Satoh T. An anonymous communication technique using dummies for location-based services[C]//International Conference on Pervasive Services, Santorini, Greece, 2005:88-97. [19] Lu H, Jensen C S, Yiu M L. PAD:privacy-area aware, dummy-based location privacy in mobile services[C]//Proceedings of the Seventh ACM International Workshop on Data Engineering for Wireless and Mobile Access, Vancouver, Canada, 2008:16-23. [20] Niu B, Li Q H, Zhu X Y, et al. Achieving k-anonymity in privacy-aware location-based services[C]//IEEE Conference on Computer Communications, Toronto, Canada, 2014:754-762. [21] Niu B, Li Q H, Zhu X Y, et al. Enhancing privacy through caching in location-based services[C]//IEEE Conference on Computer Communications, Hongkong, China, 2015(26):1017-1025. [22] Guo S, Xiao B, Yang Y, et al. Energy-efficient dynamic offloading and resource scheduling in mobile cloud computing[C]//Annual IEEE International Conference on Computer Communications, San Francisco, USA, 2016:1-9. [23] Chen M H, Liang B, Dong M. Joint offloading and resource allocation for computation and communication in mobile cloud with computing access point[C]//IEEE Conference on Co -mputer Communications, Atlanta, GA, 2017:1-9. [24] Wang Z, Zhong Z D, Zhao D M, et al. Vehicle-based cloudlet relaying for mobile computation offloading[J]. IEEE Transactions on Vehicular Technology, 2018(67):11181-11191. [25] Hu M, Zhuang L, Wu D, et al. Learning driven computation offloading for asymmetrically informed edge computing[J]. IEEE Transactions on Parallel and Distributed Systems, 2019(30):1802-1815. [26] Tang W D, Li S, Rafique W, et al. An offloading approach in fog computing environment[C]//IEEE Smart World, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation, Guangzhou, China, 2018:857-864. [27] Zhang H L, Zhang Q, Du X J. Toward vehicle-assisted cloud computing for smartphones[J]. IEEE Transactions on Vehicular Technology, 2015(64):5610-5618. [28] Josilo S, Dan G. Wireless and computing resource allocation for selfish computation offloading in edge computing[C]//IEEE Conference on Computer Communications, Paris, France, 2019:2467-2475. [29] Zhang X, Zhu Q X. D2D offloading for statistical QoS provisionings over 5G multimedia mobile wireless networks[C]//IEEE Conference on Computer Communications, Paris, France, 2019:82-90. [30] Hong Z C, Chen W H, Huang H W, et al. Multi-hop cooperative computation offloading for industrial IoT-edge-cloud computing environments[J]. IEEE Transactions on Parallel and Distributed Systems, 2019(30):2759-2774. |