{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T12:54:02Z","timestamp":1775912042980,"version":"3.50.1"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031466731","type":"print"},{"value":"9783031466748","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-46674-8_44","type":"book-chapter","created":{"date-parts":[[2023,11,4]],"date-time":"2023-11-04T13:02:29Z","timestamp":1699102949000},"page":"633-647","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A Privacy Preserving Method for Trajectory Data Publishing Based on Geo-Indistinguishability"],"prefix":"10.1007","author":[{"given":"Fengyun","family":"Li","sequence":"first","affiliation":[]},{"given":"Jiaxin","family":"Dong","sequence":"additional","affiliation":[]},{"given":"Mingming","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Peng","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,11,5]]},"reference":[{"key":"44_CR1","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1016\/j.neucom.2021.04.137","volume":"472","author":"W Cheng","year":"2022","unstructured":"Cheng, W., Wen, R., Huang, H., Miao, W., Wang, C.: OPTDP: towards optimal personalized trajectory differential privacy for trajectory data publishing. Neurocomputing 472, 201\u2013211 (2022)","journal-title":"Neurocomputing"},{"issue":"2","key":"44_CR2","doi-asserted-by":"publisher","first-page":"1017","DOI":"10.1109\/TDSC.2022.3147785","volume":"20","author":"Y Xiao","year":"2023","unstructured":"Xiao, Y., Jia, Y., Cheng, X., Wang, S., Mao, J., Liang, Z.: I know your social network accounts: a novel attack architecture for device-identity association. IEEE Trans. Dependable Secure Comput. 20(2), 1017\u20131030 (2023)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"44_CR3","doi-asserted-by":"crossref","unstructured":"Saito, S., Matsushima, T.: Upper bound on privacy-utility tradeoff allowing positive excess distortion probability. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. E105.A(3), 425\u2013427 (2022)","DOI":"10.1587\/transfun.2021TAL0002"},{"issue":"4","key":"44_CR4","doi-asserted-by":"publisher","first-page":"2762","DOI":"10.1109\/TII.2021.3109437","volume":"18","author":"X Dong","year":"2022","unstructured":"Dong, X., Zhang, W., Zhang, Y., You, Z., Gao, S., Shen, Y., et al.: Optimizing task location privacy in mobile crowdsensing systems. IEEE Trans. Ind. Inf. 18(4), 2762\u20132772 (2022)","journal-title":"IEEE Trans. Ind. Inf."},{"key":"44_CR5","doi-asserted-by":"publisher","unstructured":"Iwata, N., Kamei, S., Alam, K.M.R., Morimoto, Y.: Location data anonymization retaining data mining utilization. In: Chen, W., Yao, L., Cai, T., Pan, S., Shen, T., Li, X. (eds.) ADMA 2022. LNCS, vol. 13726, pp. 407\u2013418. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-22137-8_30","DOI":"10.1007\/978-3-031-22137-8_30"},{"key":"44_CR6","doi-asserted-by":"publisher","first-page":"18112","DOI":"10.1109\/ACCESS.2021.3052169","volume":"9","author":"J Xu","year":"2021","unstructured":"Xu, J., Liu, L., Zhang, R., Xie, J., Duan, Q., Shi, L.: IFTS: a location privacy protection method based on initial and final trajectory segments. IEEE Access 9, 18112\u201318122 (2021)","journal-title":"IEEE Access"},{"key":"44_CR7","doi-asserted-by":"publisher","unstructured":"Salas, J., Meg\u00edas, D., Torra, V.: SwapMob: swapping trajectories for mobility anonymization. In: Domingo-Ferrer, J., Montes, F. (eds.) PSD 2018. LNCS, vol. 11126, pp. 331\u2013346. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-99771-1_22","DOI":"10.1007\/978-3-319-99771-1_22"},{"key":"44_CR8","doi-asserted-by":"crossref","unstructured":"Sweeney, L.: K-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 10(5), 557\u2013570 (2002)","DOI":"10.1142\/S0218488502001648"},{"key":"44_CR9","doi-asserted-by":"crossref","unstructured":"Zang, H., Bolot, J.: Anonymization of location data does not work: a large-scale measurement study. In: 17th Annual International Conference on Mobile Computing and Networking, pp. 145\u2013156. Springer, Cham (2011)","DOI":"10.1145\/2030613.2030630"},{"issue":"4","key":"44_CR10","first-page":"1423","volume":"34","author":"BB Mehta","year":"2022","unstructured":"Mehta, B.B., Rao, U.P.: Improved l-diversity: scalable anonymization approach for privacy preserving big data publishing. J. King Saud Univ. Comput. Inf. Sci. 34(4), 1423\u20131430 (2022)","journal-title":"J. King Saud Univ. Comput. Inf. Sci."},{"key":"44_CR11","doi-asserted-by":"crossref","unstructured":"Li, N., Li, T., Venkatasubramanian, S.: t-Closeness: privacy beyond k-anonymity and l-diversity. In: 23rd IEEE International Conference on Data Engineering, pp. 106\u2013115 (2007)","DOI":"10.1109\/ICDE.2007.367856"},{"key":"44_CR12","doi-asserted-by":"publisher","first-page":"21823","DOI":"10.1007\/s11042-021-10789-0","volume":"80","author":"H Luo","year":"2021","unstructured":"Luo, H., Zhang, H., Long, S., et al.: Enhancing frequent location privacy-preserving strategy based on geo-Indistinguishability. Multimedia Tools Appl. 80, 21823\u201321841 (2021)","journal-title":"Multimedia Tools Appl."},{"issue":"3","key":"44_CR13","doi-asserted-by":"publisher","first-page":"927","DOI":"10.1109\/JSAC.2022.3142301","volume":"40","author":"F Ye","year":"2022","unstructured":"Ye, F., El Rouayheb, S.: Intermittent private information retrieval with application to location privacy. IEEE J. Sel. Areas Commun. 40(3), 927\u2013939 (2022)","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"1","key":"44_CR14","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1109\/TSC.2019.2920643","volume":"15","author":"J Wei","year":"2022","unstructured":"Wei, J., Lin, Y., Yao, X., Zhang, J.: Differential privacy-based location protection in spatial crowdsourcing. IEEE Trans. Serv. Comput. 15(1), 45\u201358 (2022)","journal-title":"IEEE Trans. Serv. Comput."},{"issue":"7","key":"44_CR15","first-page":"4075","volume":"34","author":"L Kacha","year":"2022","unstructured":"Kacha, L., Zitouni, A., Djoudi, M.: KAB: a new k-anonymity approach based on black hole algorithm. J. King Saud Univ. Comput. Inf. Sci. 34(7), 4075\u20134088 (2022)","journal-title":"J. King Saud Univ. Comput. Inf. Sci."},{"issue":"10","key":"44_CR16","doi-asserted-by":"publisher","first-page":"17910","DOI":"10.1109\/TITS.2022.3164391","volume":"23","author":"C Zhao","year":"2022","unstructured":"Zhao, C., Zhu, Y., Du, Y., Liao, F., Chan, C.-Y.: A novel direct trajectory planning approach based on generative adversarial networks and rapidly-exploring random tree. IEEE Trans. Intell. Transp. Syst. 23(10), 17910\u201317921 (2022)","journal-title":"IEEE Trans. Intell. Transp. Syst."}],"container-title":["Lecture Notes in Computer Science","Advanced Data Mining and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-46674-8_44","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,4]],"date-time":"2023-11-04T13:21:01Z","timestamp":1699104061000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-46674-8_44"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031466731","9783031466748"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-46674-8_44","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"5 November 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ADMA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Data Mining and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Shenyang","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 August 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 August 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"adma2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/adma2023.uqcloud.net\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes. Microsoft CMT","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"503","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"216","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"43% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.97","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.77","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}