1. [1] H. Li, H. Zhu, S. Du, X. Liang, and X. Shen, “Privacy leakage of location sharing in mobile social networks: Attacks and defense,” IEEE Transactions on Dependable and Secure Computing, 2016.
2. [2] J. Son, D. Kim, R. Tashakkori, A.O. Tokuta, and H. Oh, “A new mobile online social network based location sharing with enhanced privacy protection,” 2016 25th International Conference on Computer Communication and Networks (ICCCN), pp.1-9, IEEE, 2016. 10.1109/icccn.2016.7568481
3. [3] P. Nitesh, “The10 billion rule: location, location, location.” http://www.strategyanalytics.com/default.aspx?mod=reportabstractviewer&a0=6355.
4. [4] K.G. Shin, X. Ju, Z. Chen, and X. Hu, “Privacy protection for users of location-based services,” IEEE Wireless Communications, vol.19, no.1, 2012.
5. [5] W. Karim, “The privacy implications of personal locators: Why you should think twice before voluntarily availing yourself to GPS monitoring,” Wash. UJL & Pol'y, vol.14, p.485, 2004.