[1] Hall R E, Bowerman B, Braverman J, et al. The vision of a smart city[C/OL].[2017-04-10]. https://ntl.bts.gov/lib/14000/14800/14834/DE2001-773961.pdf.
[2] Batty M. Big data, smart cities and city planning[J]. Dialogues in Hu-man Geography, 2013, 3(3):274-279.
[3] Martinez-Balleste A, Perez-Martinez P A, Solanas A. The pursuit of cit-izens' privacy:A privacy-aware smart city is possible[J]. IEEE Commu-nications Magazine, 2013, 51(6):136-141.
[4] Petrolo R, Loscrì V, Mitton N. Towards a smart city based on cloud of things, a survey on the smart city vision and paradigms[J]. Transactions on Emerging Telecommunications Technologies, 2015, 28(1), doi:10. 1002/ett.
[5] Nam T, Pardo T A. Smart city as urban innovation:focusing on manage-ment, policy, and context[C]//Proceedings of the International Confer-ence on Theory and Practice of Electronic Governance. New York:ACM, 2011:185-194.
[6] Li D R, Cao J J, Yao Y. Big data in smart cities[J]. Science China Infor-mation Sciences, 2015, 58(10):1-12.
[7] Li D R, Yao Y, Shao Z F, et al. From digital Earth to smart Earth[J]. Science Bulletin, 2014, 59(8):722-733.
[8] Li D R, Shao Z F, Zhou X R, et al. Geomatics for smart cities-concept, key techniques, and applications[J]. Geospatial Information Science, 2013, 16(1):13-24.
[9] 王家耀, 邓国臣. 大数据时代的智慧城市[J]. 测绘科学, 2014, 39(5):3-7. Wang Jiayao, Deng Guochen. Smart city in the era of big data[J]. Science of Surveying and Mapping, 2014, 39(5):3-7.
[10] Zheng Y, Capra L, Wolfson O, et al. Urban computing:Concepts, methodologies, and applications[J]. ACM Transactions on Intelligent Systems & Technology, 2014, 5(3), doi:10.1145/2629592.
[11] Zheng Y. Introduction to urban computing[J]. Geomatics & Informa-tion Science of Wuhan University, 2015, 40(1):1-13.
[12] 徐静, 陈秀万. 基于信息空间理论的智慧城市模型构建[J]. 科技导报, 2013, 31(22):56-59. Xu Jing, Chen Xiuwai. Construction of smart city model based on information space theory[J]. Science & Technology Review, 2013, 31(22):56-59.
[13] Song C M, Qu Zehui, Blumm N, et al. Limits of predictability in hu-man mobility[J]. Science, 2010, 327(5968):1018-1021.
[14] 潘纲, 李石坚, 齐观德, 等. 移动轨迹数据分析与智慧城市[J]. 中国计算机学会通讯, 2012, 8(5):31-37. Pan Gang, Li Shijian, Qi Guande, et al. Moving trajectory data analysis and smart city[J]. Communications of the CCF, 2012, 8(5):31-37.
[15] 孙未未, 毛江云. 轨迹预测技术及其应用——从上海外滩踩踏事件说起[J]. 科技导报, 2016, 36(9):48-54. Sun Weiwei, Mao Jiangyun. Trajectory prediction technology and its application from the the bund stampede in Shangha[J]. Science & Technology Review, 2016, 36(9):48-54.
[16] Zheng X H, Chen W, Wang P, et al. Big Data for social transportation[J]. IEEE Transactions on Intelligent Transportation Systems, 2015, 17(3):620-630.
[17] Chen W, Guo F Z, Wang F Y. A survey of traffic data visualization[J]. IEEE Transactions on Intelligent Transportation Systems, 2015, 16(6):1-15.
[18] Zheng Y X, Wu W C, Chen Y Z, et al. Visual analytics in urban com-puting:An overview[J]. IEEE Transactions on Big Data, 2016, 2(3):276-296.
[19] 眉间尺. 智慧城市建设不能目中无"人"[N]. 科技日报, 2016-04-15. Mei Jianchi. Construction of smart city unable to people[N]. Science and Technology Daily, 2016-04-15.
[20] 王静远, 李超, 熊璋, 等. 以数据为中心的智慧城市研究综述[J]. 计算机研究与发展, 2014, 51(2):239-259. Wang Jingyuan, Li Chao, Xiong Zhang, et al. Survey of data-centric smart city[J]. Journal of Computer Research and Development, 2014, 51(2):239-259.
[21] Paulos E, Goodman E. The familiar stranger:Anxiety, comfort, and play in public places[C]//Conference on Human Factors in Computing Systems, CHI 2004. New York:ACM, 2004:223-230.
[22] Zhang J B, Zheng Y, Qi D K. Deep spatio-temporal residual networks for citywide crowd flows prediction[C/OL].[2017-04-10]. https://www.aaai.org/ocs/index.php/AAAI/AAAI17/paper/download/14501/13964
[23] Zheng Y. Trajectory data mining:An overview[J]. ACM Transactions on Intelligent Systems & Technology, 2015, 6(3):1-29.
[24] Zheng Y. Methodologies for cross-domain data fusion:An overview[J]. IEEE Transactions on Big Data, 2015, 1(1):16-34.
[25] 徐宗本. 用好大数据须有大智慧[N]. 人民日报, 2016-03-15. Xu Zongben. Good use of big data must have great wisdom[N]. People's Daily, 2016-03-15.
[26] 程学旗, 靳小龙, 杨婧, 等. 大数据技术进展与发展趋势[J]. 科技导报, 2016, 34(14):49-59. Cheng Xueqi, Ji Xiaolong, Yang Jing, et al. Technological progress and trends of big data[J]. Science & Technology Review, 2016, 34(14):49-59.
[27] Chen C L P, Zhang C Y. Data-intensive applications, challenges, tech-niques and technologies:A survey on big data[J]. Information Scienc-es, 2014, 275(11):314-347.
[28] Lake B M, Salakhutdinov R, Tenenbaum J B. Human-level concept learning through probabilistic program induction[J]. Science, 2015, 350(6266):1332-1338.
[29] 刘勇, 廖依伊. 类人概念学习:机器学习下一个飞跃?[J]. 科技导报, 2016, 34(7):80-81. Liu Yong, Liao Yiyi. Human-level concept learning:the next leap in machine learning[J]. Science & Technology Review, 2016, 34(7):80-81.
[30] 陈孝良. 小样本的类人概念学习与大数据的深度强化学习[J]. 科技导报, 2016, 34(7):82-84. Chen Xiaoliang. Small sample of human-level concept learning and deep reinforcement learning of big data[J]. Science & Technology Review, 2016, 34(7):82-84.
[31] Itoh M, Yokoyama D, Toyoda M, et al. Visual exploration of changes in passenger flows and tweets on Mega-City Metro Network[J]. IEEE Transactions on Big Data, 2016, 2(1):85-99.
[32] Wu W C, Xu J Y, Zeng H P, et al. TelCoVis:Visual exploration of co-occurrence in urban human mobility based on telco data[J]. IEEE Transactions on Visualization & Computer Graphics, 2016, 22(1):935-944.
[33] 王忠. 个人数据的大数据应用需要构建溯源机制[J]. 科技导报, 2014, 32(4):12. Wang Zhong. Construct of traceability mechanism for big data application of personal data[J]. Science & Technology Review, 2014, 32(4):12.
[34] 王融. 关于大数据交易核心法律问题——数据所有权的探讨[J]. 大数据, 2015, 1(2):49-55. Wang Rong. Discussion on the legal core question of the data ownership in big data trade[J]. Big Data Research, 2015, 1(2):49-55.
[35] 王黎洲. 医疗大健康及大数据的应用及其隐私保护分析[J]. 中国卫生产业, 2016, 13(13):120-122. Wang Lizhou. Analysis of the application of medical one health and big data and their privacy protection[J]. China Health Industry, 2016, 13(13):120-122.
[36] 冯登国, 张敏, 李昊. 大数据安全与隐私保护[J]. 计算机学报, 2014, 37(1):246-258. Feng Dengguo, Zhang Min, Li Hao. Big data security and privacy protection[J]. Chinese Journal of Computers, 2014, 37(1):246-258.
[37] Yang K, Jia X H. Expressive, efficient, and revocable data access con-trol for multi-authority cloud storage[J]. IEEE Transactions on Paral-lel & Distributed Systems, 2014, 25(7):1735-1744.