Supported by the National Natural Science Foundation of China(61472097);Specialized Research Fund for the Doctoral Program of Higher Education of China(20132304110017);Natural Science Foundation of Heilongjiang Province of China(F2015022)
Location k-anonymity techniques typically use anony- mous spatial region to ensure privacy. But these solutions are vul- nerable to multiple queries attacks and inference attacks. Failing to account for the obstacle i...