| 1 | 
																						 
											   MUHAMMAD A ,  WANG G J ,  BHUIYAN M Z A , et al.  A survey on security attacks in VANETs: communication, applications and challenges[J]. Vehicular Communications, 2019, 19, 100179. 
											 												 
																									doi: 10.1016/j.vehcom.2019.100179
																																			 											 | 
										
																													
																						| 2 | 
																						 
											   ZHANG L ,  YANG S T ,  LI J , et al.  A particle swarm optimization clustering-based attribute generalization privacy protection scheme[J]. Journal of Circuits, Systems and Computers, 2018, 27 (11): 1850179. 
											 												 
																									doi: 10.1142/S0218126618501797
																																			 											 | 
										
																													
																						| 3 | 
																						 
											   ZHANG L ,  LI J ,  YANG S T , et al.  A novel attributes anonymity scheme in continuous query[J]. Wireless Personal Communications, 2018, 101 (2): 943- 961. 
											 												 
																									doi: 10.1007/s11277-018-5735-0
																																			 											 | 
										
																													
																						| 4 | 
																						 
											   WANG S B ,  YAO N M ,  GONG N , et al.  A trigger-based pseudonym exchange scheme for location privacy preserving in VANETs[J]. Peer-to-Peer Networking and Applications, 2018, 11 (3): 548- 560. 
											 												 
																									doi: 10.1007/s12083-017-0557-5
																																			 											 | 
										
																													
																						| 5 | 
																						 
											   LI Z P ,  WANG D .  Achieving one-round password-based authenticated key exchange over lattices[J]. IEEE Trans.on Services Computing, 2019, 8, 1- 14.
											 											 | 
										
																													
																						| 6 | 
																						 
											   ZHANG P ,  HU C C ,  CHEN D , et al.  ShiftRoute: achieving location privacy for map services on smartphones[J]. IEEE Trans.on Vehicular Technology, 2018, 67 (5): 4527- 4538. 
											 												 
																									doi: 10.1109/TVT.2018.2791402
																																			 											 | 
										
																													
																						| 7 | 
																						 
											  李婕, 白志宏, 于瑞云, 等.  基于PSO优化的移动位置隐私保护算法[J]. 计算机学报, 2018, 41 (5): 1037- 1051. 
											 											 | 
										
																													
																						 | 
																						 
											   LI J ,  BAI Z H ,  YU R Y , et al.  Mobile locationprivacy protection algorithm based on PSO optimization[J]. Chinese Journal of Computers, 2018, 41 (5): 1037- 1051. 
											 											 | 
										
																													
																						| 8 | 
																						 
											   ZHANG L ,  MA C G ,  YANG S T , et al.  Users collaborative mix-zone to resist the query content and time interval correlation attacks[J]. Tehnički Vjesnik-Technical Gazette, 2018, 25 (4): 962- 969.
											 											 | 
										
																													
																						| 9 | 
																						 
											   MA Z ,  CAO J X ,  CHEN X S , et al.  GLPP: a game-based location privacy-preserving framework in account linked mixed location-based services[J]. Security and Communication Networks, 2018, 9148768.
											 											 | 
										
																													
																						| 10 | 
																						 
											   LI C ,  PALANISAMY B .  Reversible spatio-temporal perturbation for protecting location privacy[J]. Computer Communications, 2019, 135, 16- 27. 
											 												 
																									doi: 10.1016/j.comcom.2018.12.003
																																			 											 | 
										
																													
																						| 11 | 
																						 
											   NATGUNANATHAN I ,  MEHMOOD A ,  XIANG Y , et al.  Location privacy protection in smart health care system[J]. IEEE Internet of Things Journal, 2019, 6 (2): 3055- 3069. 
											 												 
																									doi: 10.1109/JIOT.2018.2878917
																																			 											 | 
										
																													
																						| 12 | 
																						 
											   HAYASHIDA S ,  AMAGATA D ,  HARA T , et al.  Dummy generation based on user-movement estimation for location privacy protection[J]. IEEE Access, 2018, 6, 22958- 22969. 
											 												 
																									doi: 10.1109/ACCESS.2018.2829898
																																			 											 | 
										
																													
																						| 13 | 
																						 
											   YANG M M ,  ZHU T Q ,  LIANG K T , et al.  A blockchain-based location privacy-preserving crowdsensing system[J]. Future Generation Computer Systems, 2019, 94, 408- 418. 
											 												 
																									doi: 10.1016/j.future.2018.11.046
																																			 											 | 
										
																													
																						| 14 | 
																						 
											   ZHANG L ,  HE L L ,  LIU D S , et al.  An attribute generalization mix-zone without privacy leakage[J]. IEEE Access, 2019, 7, 57088- 57099. 
											 												 
																									doi: 10.1109/ACCESS.2019.2898996
																																			 											 | 
										
																													
																						| 15 | 
																						 
											  许明艳, 赵华, 季新生, 等.  基于用户分布感知的移动P2P快速位置匿名算法[J]. 软件学报, 2018, 29 (7): 1852- 1862. 
											 											 | 
										
																													
																						 | 
																						 
											   XU M Y ,  ZHAO H ,  JI X S , et al.  Distribution-perceptive-based spatial cloaking algorithm for location privacy in mobile peer-to-peer enviroments[J]. Journal of Software, 2018, 29 (7): 1852- 1862. 
											 											 | 
										
																													
																						| 16 | 
																						 
											   ZHANG S B ,  LI X ,  TAN Z Y , et al.  A caching and spatial K-anonymity driven privacy enhancement scheme in continuous location-based services[J]. Future Generation Computer Systems, 2019, 94, 40- 50. 
											 												 
																									doi: 10.1016/j.future.2018.10.053
																																			 											 | 
										
																													
																						| 17 | 
																						 
											   PENG T ,  LIU Q ,  WANG G J , et al.  Multidimensional privacy preservation in location-based services[J]. Future Generation Computer Systems, 2019, 93, 312- 326. 
											 												 
																									doi: 10.1016/j.future.2018.10.025
																																			 											 | 
										
																													
																						| 18 | 
																						 
											   HUA J Y ,  TONG W ,  XU F Y , et al.  A geo-indistinguishable location perturbation mechanism for location-based services supporting frequent queries[J]. IEEE Trans.on Information Forensics and Security, 2018, 13 (5): 1155- 1168.
											 											 | 
										
																													
																						| 19 | 
																						 
											   LAI J C ,  MU Y ,  GUO F C , et al.  Privacy-enhanced attribute-based private information retrieval[J]. Information Sciences, 2018, 454-455, 275- 291. 
											 												 
																									doi: 10.1016/j.ins.2018.04.084
																																			 											 | 
										
																													
																						| 20 | 
																						 
											   SEPAHKAR M ,  KHAYYAMBASHI M .  A novel collaborative approach for location prediction in mobile networks[J]. Wireless Networks, 2018, 24 (1): 283- 294. 
											 												 
																									doi: 10.1007/s11276-016-1304-1
																																			 											 | 
										
																													
																						| 21 | 
																						 
											   SHI X F ,  WU J F .  To hide private position information in localization using time difference of arrival[J]. IEEE Trans.on Signal Processing, 2018, 66 (18): 4946- 4956. 
											 												 
																									doi: 10.1109/TSP.2018.2858187
																																			 											 | 
										
																													
																						| 22 | 
																						 
											   WANG Y J ,  CAI Z P ,  TONG X R , et al.  Truthful incentive mechanism with location privacy-preserving for mobile crowdsourcing systems[J]. Computer Networks, 2018, 135, 32- 43. 
											 												 
																									doi: 10.1016/j.comnet.2018.02.008
																																			 											 | 
										
																													
																						| 23 | 
																						 
											   WANG J ,  WANG Y L ,  ZHAO G S , et al.  Location protection method for mobile crowd sensing based on local differential privacy preference[J]. Peer-to-Peer Networking and Applications, 2019, 12 (5): 1097- 1109. 
											 												 
																									doi: 10.1007/s12083-019-00774-8
																																			 											 | 
										
																													
																						| 24 | 
																						 
											   WANG X J ,  NING Z L ,  ZHOU M C , et al.  Privacy-preserving content dissemination for vehicular social networks: challenges and solutions[J]. IEEE Communications Surveys & Tutorials, 2019, 21 (2): 1314- 1345.
											 											 | 
										
																													
																						| 25 | 
																						 
											   LI W H ,  NIU B ,  CAO J , et al.  A personalized range-sensitive privacy-preserving scheme in LBSs[J]. Concurrency and Computation: Practice and Experience, 2020, 32 (9): 5462.
											 											 | 
										
																													
																						| 26 | 
																						 
											   ZHOU J ,  CAO Z F ,  QIN Z , et al.  LPPA: lightweight privacy-preserving authentication from efficient multi-key secure outsourced computation for location-based services in VANETs[J]. IEEE Trans.on Information Forensics and Security, 2020, 15, 420- 434. 
											 												 
																									doi: 10.1109/TIFS.2019.2923156
																																			 											 |