[1] Junglas I A, Watson R T. Location-based services[J]. Communications of the ACM, 2008, 51(3): 65-69.
[2] Ashkan S, Barton G..New documents show how the NSA infers relationships based on mobile location data. — Washington Post, 2013. http://www.washingtonpost.com/blogs/the-switch/wp/2013/12/10/new-documents-show-how-the-nsa-infers-relationships-based-on-mobile-location-data/
[3] Hu H B, Xu J L. Non-Exposure Location Anonymity [C]. In: 2009 IEEE 25th International Conference on Data Engineering. Shanghai, China. China: IEEE, 2009:1120-1131.
[4] Positive Technologies Research Lab.How to Determine a Subscriber’s Location — Sergey Puzankov, Positive Technologies, 2013. http://habrahabr.ru/company/pt/blog/191384/
[5] S. Narain, T. D. Vo-Huu, K. Block and G. Noubir, "Inferring User Routes and Locations Using Zero-Permission Mobile Sensors," 2016 IEEE Symposium on Security and Privacy (SP), San Jose, CA, 2016, pp. 397-413.
[6] Weiqing Li, Raheem Beyah. De-Anonymizing Social Networks And Mobility Traces[D]. Georgia Institute of Technology. Atlanta.2016.
[7] C. Lloyd. How to Fake Your Location on iPhone. https://www.gottabemobile.com/how-to-fake-your-location-on-iphone/.2016
[8] Sweeney L. k-anonymity: A model for protecting privacy[J]. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2002, 10(05): 557-570
[9] A.R. Beresford, A. Rice, N. Skehin, and R. Sohan. Mockdroid: Trading privacy for application functionality on smartphones. In Proceedings of HotMobile ’11, pages 49–54, New York, NY, USA, 2011. ACM.