{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T14:05:36Z","timestamp":1774533936684,"version":"3.50.1"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030731991","type":"print"},{"value":"9783030732004","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-73200-4_33","type":"book-chapter","created":{"date-parts":[[2021,4,6]],"date-time":"2021-04-06T18:02:46Z","timestamp":1617732166000},"page":"487-495","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["An Improved Dummy Generation Approach for Enhancing User Location Privacy"],"prefix":"10.1007","author":[{"given":"Shadaab","family":"Siddiqie","sequence":"first","affiliation":[]},{"given":"Anirban","family":"Mondal","sequence":"additional","affiliation":[]},{"given":"P. Krishna","family":"Reddy","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,4,6]]},"reference":[{"issue":"1","key":"33_CR1","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1109\/TDSC.2009.25","volume":"8","author":"CA Ardagna","year":"2009","unstructured":"Ardagna, C.A., Cremonini, M., di Vimercati, S.D.C., Samarati, P.: An obfuscation-based approach for protecting location privacy. IEEE Trans. Dependable Secure Comput. 8(1), 13\u201327 (2009)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"33_CR2","doi-asserted-by":"crossref","unstructured":"Bordenabe, N.E., Chatzikokolakis, K., Palamidessi, C.: Optimal geo-indistinguishable mechanisms for location privacy. In: Conference on Computer and Communications Security, pp. 251\u2013262. ACM (2014)","DOI":"10.1145\/2660267.2660345"},{"issue":"6","key":"33_CR3","doi-asserted-by":"publisher","first-page":"526","DOI":"10.17661\/jkiiect.2016.9.6.526","volume":"9","author":"TY Cai","year":"2016","unstructured":"Cai, T.Y., Song, D.H., Youn, J.H., Lee, W.G., Kim, Y.K., Park, K.J.: Efficient dummy generation for protecting location privacy. J. Korea Inst. Inf. Electron. Commun. Technol. 9(6), 526\u2013533 (2016)","journal-title":"J. Korea Inst. Inf. Electron. Commun. Technol."},{"issue":"2","key":"33_CR4","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1007\/s10707-009-0099-y","volume":"15","author":"CY Chow","year":"2011","unstructured":"Chow, C.Y., Mokbel, M.F., Liu, X.: Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments. GeoInformatica 15(2), 351\u2013380 (2011)","journal-title":"GeoInformatica"},{"key":"33_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1007\/11428572_10","volume-title":"Pervasive Computing","author":"M Duckham","year":"2005","unstructured":"Duckham, M., Kulik, L.: A formal model of obfuscation and negotiation for location privacy. In: Gellersen, H.-W., Want, R., Schmidt, A. (eds.) Pervasive 2005. LNCS, vol. 3468, pp. 152\u2013170. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11428572_10"},{"key":"33_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1007\/978-3-540-73540-3_13","volume-title":"Advances in Spatial and Temporal Databases","author":"G Ghinita","year":"2007","unstructured":"Ghinita, G., Kalnis, P., Skiadopoulos, S.: MobiHide: a mobilea peer-to-peer system for anonymous location-based queries. In: Papadias, D., Zhang, D., Kollios, G. (eds.) SSTD 2007. LNCS, vol. 4605, pp. 221\u2013238. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-73540-3_13"},{"key":"33_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1007\/978-3-540-32004-3_19","volume-title":"Security in Pervasive Computing","author":"M Gruteser","year":"2005","unstructured":"Gruteser, M., Hoh, B.: On the anonymity of periodic location samples. In: Hutter, D., Ullmann, M. (eds.) SPC 2005. LNCS, vol. 3450, pp. 179\u2013192. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/978-3-540-32004-3_19"},{"key":"33_CR8","doi-asserted-by":"publisher","first-page":"673","DOI":"10.1109\/ACCESS.2016.2526060","volume":"4","author":"T Hara","year":"2016","unstructured":"Hara, T., Suzuki, A., Iwata, M., Arase, Y., Xie, X.: Dummy-based user location anonymization under real-world constraints. IEEE Access 4, 673\u2013687 (2016)","journal-title":"IEEE Access"},{"key":"33_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/978-3-540-72037-9_8","volume-title":"Pervasive Computing","author":"J Krumm","year":"2007","unstructured":"Krumm, J.: Inference attacks on location tracks. In: LaMarca, A., Langheinrich, M., Truong, K.N. (eds.) Pervasive 2007. LNCS, vol. 4480, pp. 127\u2013143. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-72037-9_8"},{"key":"33_CR10","unstructured":"Matsuo, Y., et al.: Inferring long-term user properties based on users\u2019 location history. In: International Joint Conferences on Artificial Intelligence, pp. 2159\u20132165 (2007)"},{"key":"33_CR11","doi-asserted-by":"crossref","unstructured":"Niu, B., Li, Q., Zhu, X., Cao, G., Li, H.: Achieving $$k$$-anonymity in privacy-aware location-based services. In: IEEE Conference on Computer Communications, pp. 754\u2013762. IEEE INFOCOM (2014)","DOI":"10.1109\/INFOCOM.2014.6848002"},{"key":"33_CR12","doi-asserted-by":"crossref","unstructured":"Niu, B., Zhang, Z., Li, X., Li, H.: Privacy-area aware dummy generation algorithms for location-based services. In: International Conference on Communications (ICC), pp. 957\u2013962. IEEE (2014)","DOI":"10.1109\/ICC.2014.6883443"},{"key":"33_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/3-540-36467-6_4","volume-title":"Privacy Enhancing Technologies","author":"A Serjantov","year":"2003","unstructured":"Serjantov, A., Danezis, G.: Towards an information theoretic metric for anonymity. In: Dingledine, R., Syverson, P. (eds.) PET 2002. LNCS, vol. 2482, pp. 41\u201353. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/3-540-36467-6_4"},{"key":"33_CR14","doi-asserted-by":"crossref","first-page":"e5146","DOI":"10.1002\/cpe.5146","volume":"33","author":"D Song","year":"2019","unstructured":"Song, D., Song, M., Shakhov, V., Park, K.: Efficient dummy generation for considering obstacles and protecting user location. Concurr. Comput.: Pract. Exp. 33, e5146 (2019)","journal-title":"Concurr. Comput.: Pract. Exp."},{"issue":"6","key":"33_CR15","doi-asserted-by":"publisher","first-page":"137","DOI":"10.14257\/ijsh.2016.10.6.15","volume":"10","author":"H Zhao","year":"2016","unstructured":"Zhao, H., Wan, J., Chen, Z.: A novel dummy-based kNN query anonymization method in mobile services. Int. J. Smart Home 10(6), 137\u2013154 (2016)","journal-title":"Int. J. Smart Home"}],"container-title":["Lecture Notes in Computer Science","Database Systems for Advanced Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-73200-4_33","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,1]],"date-time":"2023-11-01T18:52:40Z","timestamp":1698864760000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-73200-4_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030731991","9783030732004"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-73200-4_33","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"6 April 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DASFAA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Database Systems for Advanced Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Taipei","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Taiwan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 April 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 April 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dasfaa2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/dm.iis.sinica.edu.tw\/DASFAA2021\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"CMT","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"490","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"98","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"20% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"7","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Due to the Corona pandemic this event was held virtually.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}