1. Trajectory outlier detection: a partition-and-detect framework;Lee,2008
2. I. Webroot Software. (2010). Webroot Survey Finds Geolocation Apps Prevalent Amongst Mobile Device Users, but 55% Concerned About Loss Of Privacy. Available: http://pr.webroot.com/threat-research/cons/social-networks-mobile-security-071310.html.
3. M. I. f. P. O. (Mipo). (2010). Half of Social Networkers Online Concerned About Privacy. Available: http://maristpoll.marist.edu/714-half-of-social-networkers-online%concerned-about-privacy/.
4. A survey of trajectory privacy-preserving techniques;Zheng;Chin. J. Comput.,2011
5. k-anonymity: a model for protecting privaCY;Sweeney;Int. J. Uncertain. Fuzz. Knowl.-Based Syst.,2012