{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T21:36:20Z","timestamp":1757626580999,"version":"3.44.0"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031944574"},{"type":"electronic","value":"9783031944581"}],"license":[{"start":{"date-parts":[[2025,8,31]],"date-time":"2025-08-31T00:00:00Z","timestamp":1756598400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,8,31]],"date-time":"2025-08-31T00:00:00Z","timestamp":1756598400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-031-94458-1_6","type":"book-chapter","created":{"date-parts":[[2025,8,30]],"date-time":"2025-08-30T15:54:57Z","timestamp":1756569297000},"page":"115-136","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["TGSA: Trajectory Group Semantic Anonymization"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-6762-4902","authenticated-orcid":false,"given":"Minhong","family":"Dong","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6971-2004","authenticated-orcid":false,"given":"Ze","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Zhuo","family":"Han","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9768-8045","authenticated-orcid":false,"given":"Yude","family":"Bai","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0527-1753","authenticated-orcid":false,"given":"Chao","family":"Yuan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0616-0609","authenticated-orcid":false,"given":"Guoying","family":"Qiu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,8,31]]},"reference":[{"key":"6_CR1","doi-asserted-by":"crossref","unstructured":"Manyeredzi, T., Mpofu, V.: Smartphones as digital instructional interface devices: the teacher\u2019s perspective. Res. Learn. Technol. 30 (2022)","DOI":"10.25304\/rlt.v30.2639"},{"key":"6_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3643669","volume":"42","author":"S Li","year":"2024","unstructured":"Li, S., Chen, W., Wang, B., Huang, C., Yu, Y., Dong, J.: MCN4Rec: multi-level collaborative neural network for next location recommendation. ACM Trans. Inf. Syst. 42, 1\u201326 (2024). https:\/\/doi.org\/10.1145\/3643669","journal-title":"ACM Trans. Inf. Syst."},{"issue":"8","key":"6_CR3","doi-asserted-by":"publisher","first-page":"1639","DOI":"10.1109\/TKDE.2017.2690421","volume":"29","author":"Y-T Wen","year":"2017","unstructured":"Wen, Y.-T., Yeo, J., Peng, W.-C., Hwang, S.-W.: Efficient keyword-aware representative travel route recommendation. IEEE Trans. Knowl. Data Eng. 29(8), 1639\u20131652 (2017)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"4","key":"6_CR4","doi-asserted-by":"publisher","first-page":"646","DOI":"10.1109\/TDSC.2016.2604383","volume":"15","author":"H Li","year":"2016","unstructured":"Li, H., Zhu, H., Du, S., Liang, X., Shen, X.: Privacy leakage of location sharing in mobile social networks: attacks and defense. IEEE Trans. Depend. Secure Comput. 15(4), 646\u2013660 (2016)","journal-title":"IEEE Trans. Depend. Secure Comput."},{"key":"6_CR5","unstructured":"\u201cFacebook Data Breaches: Full Timeline Through 2023.\u201d Firewall Times, 5 October 2023. https:\/\/firewalltimes.com\/facebook-data-breach-timeline\/"},{"key":"6_CR6","doi-asserted-by":"publisher","first-page":"16165","DOI":"10.1109\/JIOT.2020.3016466","volume":"8","author":"G Qiu","year":"2020","unstructured":"Qiu, G., Guo, D., Shen, Y., Tang, G., Chen, S.: Mobile semantic-aware trajectory for personalized location privacy preservation. IEEE Internet Things J. 8, 16165\u201316180 (2020)","journal-title":"IEEE Internet Things J."},{"issue":"4","key":"6_CR7","doi-asserted-by":"publisher","first-page":"875","DOI":"10.1007\/s11280-017-0489-2","volume":"21","author":"Y Dai","year":"2017","unstructured":"Dai, Y., Shao, J., Wei, C., Zhang, D., Shen, H.T.: Personalized semantic trajectory privacy preservation through trajectory reconstruction. World Wide Web 21(4), 875\u2013914 (2017). https:\/\/doi.org\/10.1007\/s11280-017-0489-2","journal-title":"World Wide Web"},{"key":"6_CR8","doi-asserted-by":"publisher","first-page":"3006","DOI":"10.1109\/TMC.2020.2993599","volume":"20","author":"S Shaham","year":"2020","unstructured":"Shaham, S., Ding, M., Liu, B., Dang, S., Lin, Z., Li, J.: Privacy preservation in location-based services: a novel metric and attack model. IEEE Trans. Mob. Comput. 20, 3006\u20133019 (2020)","journal-title":"IEEE Trans. Mob. Comput."},{"key":"6_CR9","doi-asserted-by":"crossref","unstructured":"Niu, B., Li, Q., Zhu, X., Cao, G., Li, H.: Achieving k-anonymity in privacy-aware location-based services. In: IEEE INFOCOM 2014-IEEE Conference on Computer Communications, pp. 754\u2013762. IEEE (2014)","DOI":"10.1109\/INFOCOM.2014.6848002"},{"key":"6_CR10","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/j.ins.2013.02.050","volume":"236","author":"M Lv","year":"2013","unstructured":"Lv, M., Chen, L., Chen, G.: Mining user similarity based on routine activities. Inf. Sci. 236, 17\u201332 (2013)","journal-title":"Inf. Sci."},{"key":"6_CR11","doi-asserted-by":"publisher","first-page":"2387","DOI":"10.1109\/TKDE.2020.3010022","volume":"34","author":"A Liu","year":"2020","unstructured":"Liu, A., et al.: Representation learning with multi-level attention for activity trajectory similarity computation. IEEE Trans. Knowl. Data Eng. 34, 2387\u20132400 (2020)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"6_CR12","doi-asserted-by":"publisher","first-page":"18960","DOI":"10.1109\/JIOT.2022.3164672","volume":"9","author":"J Zhou","year":"2022","unstructured":"Zhou, J., Li, D., Liu, M.: BETA: from behavior sequentializing to task mapping in mobile crowdsensing. IEEE Internet Things J. 9, 18960\u201318972 (2022)","journal-title":"IEEE Internet Things J."},{"key":"6_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2020.106557","volume":"82","author":"S Bouchelaghem","year":"2020","unstructured":"Bouchelaghem, S., Omar, M.: Secure and efficient pseudonymization for privacy-preserving vehicular communications in smart cities. Comput. Electr. Eng. 82, 106557 (2020)","journal-title":"Comput. Electr. Eng."},{"key":"6_CR14","doi-asserted-by":"crossref","unstructured":"Zhang, Z., Feng, T., Wong, W.-C., Sikdar, B.: A geo-indistinguishable context-based mix strategy for trajectory protection in VANETs. IEEE Trans. Veh. Technol. (2023)","DOI":"10.1109\/TVT.2023.3293127"},{"key":"6_CR15","doi-asserted-by":"crossref","unstructured":"Palanisamy, B., Liu, L.: Mobimix: protecting location privacy with mix-zones over road networks. In: 2011 IEEE 27th International Conference on Data Engineering, pp. 494\u2013505. IEEE (2011)","DOI":"10.1109\/ICDE.2011.5767898"},{"key":"6_CR16","doi-asserted-by":"publisher","first-page":"495","DOI":"10.1109\/TMC.2014.2321747","volume":"14","author":"B Palanisamy","year":"2014","unstructured":"Palanisamy, B., Liu, L.: Attack-resilient mix-zones over road networks: architecture and algorithms. IEEE Trans. Mob. Comput. 14, 495\u2013508 (2014)","journal-title":"IEEE Trans. Mob. Comput."},{"key":"6_CR17","doi-asserted-by":"crossref","unstructured":"Memon, I., Memon, H., Arain, Q.A.: Pseudonym changing strategy with mix zones based authentication protocol for location privacy in road networks. Wirel. Pers. Commun. 116, 3309\u20133329 (2021)","DOI":"10.1007\/s11277-020-07854-6"},{"key":"6_CR18","doi-asserted-by":"crossref","unstructured":"Kido, H., Yanagisawa, Y., Satoh, T.: An anonymous communication technique using dummies for location-based services. In: ICPS\u201905. Proceedings. International Conference on Pervasive Services, 2005, pp. 88\u201397. IEEE (2005)","DOI":"10.1109\/PERSER.2005.1506394"},{"key":"6_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"368","DOI":"10.1007\/978-3-030-30952-7_37","volume-title":"Web Information Systems and Applications","author":"X Liu","year":"2019","unstructured":"Liu, X., Chen, J., Xia, X., Zong, C., Zhu, R., Li, J.: Dummy-based trajectory privacy protection against exposure location attacks. In: Ni, W., Wang, X., Song, W., Li, Y. (eds.) WISA 2019. LNCS, vol. 11817, pp. 368\u2013381. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-30952-7_37"},{"issue":"11","key":"6_CR20","first-page":"6969","volume":"9","author":"J Tang","year":"2021","unstructured":"Tang, J., Zhu, H., Lu, R., Lin, X., Li, H., Wang, F.: DLP: achieve customizable location privacy with deceptive dummy techniques in LBS applications. IEEE Internet Things J. 9(11), 6969\u20136984 (2021)","journal-title":"IEEE Internet Things J."},{"key":"6_CR21","doi-asserted-by":"publisher","first-page":"18700","DOI":"10.1007\/s10489-022-04379-2","volume":"53","author":"S Siddiqie","year":"2023","unstructured":"Siddiqie, S., Mondal, A., Reddy, P.K.: An improved dummy generation approach for infeasible regions. Appl. Intell. 53, 18700\u201318714 (2023). https:\/\/doi.org\/10.1007\/s10489-022-04379-2","journal-title":"Appl. Intell."},{"key":"6_CR22","doi-asserted-by":"crossref","unstructured":"Shokri, R., Theodorakopoulos, G., Le Boudec, J.-Y., Hubaux, J.-P.: Quantifying location privacy. In: 2011 IEEE Symposium on Security and Privacy, pp. 247\u2013262. IEEE (2011)","DOI":"10.1109\/SP.2011.18"},{"key":"6_CR23","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1016\/j.neucom.2021.04.137","volume":"472","author":"W Cheng","year":"2022","unstructured":"Cheng, W., Wen, R., Huang, H., Miao, W., Wang, C.: OPTDP: towards optimal personalized trajectory differential privacy for trajectory data publishing. Neurocomputing 472, 201\u2013211 (2022)","journal-title":"Neurocomputing"},{"key":"6_CR24","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1109\/TBDATA.2022.3155752","volume":"9","author":"W Li","year":"2022","unstructured":"Li, W., et al.: Metagraph-based life pattern clustering with big human mobility data. IEEE Trans. Big Data 9, 227\u2013240 (2022)","journal-title":"IEEE Trans. Big Data"},{"key":"6_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3322126","volume":"13","author":"I Ben-Gal","year":"2019","unstructured":"Ben-Gal, I., Weinstock, S., Singer, G., Bambos, N.: Clustering users by their mobility behavioral patterns. ACM Trans. Knowl. Discov. Data 13, 1\u201328 (2019). https:\/\/doi.org\/10.1145\/3322126","journal-title":"ACM Trans. Knowl. Discov. Data"},{"key":"6_CR26","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-021-3414-7","volume":"66","author":"Y Bai","year":"2023","unstructured":"Bai, Y., Chen, S., Xing, Z., Li, X.: ArgusDroid: detecting android malware variants by mining permission-API knowledge graph. Sci. China Inf. Sci. 66, 192101 (2023). https:\/\/doi.org\/10.1007\/s11432-021-3414-7","journal-title":"Sci. China Inf. Sci."},{"key":"6_CR27","doi-asserted-by":"crossref","unstructured":"Zheng, Y., Zhang, L., Xie, X., Ma, W.-Y.: Mining interesting locations and travel sequences from GPS trajectories. In: Proceedings of International Conference on World Wide Web (WWW 2009), Madrid Spain, pp. 791\u2013800. ACM Press (2009)","DOI":"10.1145\/1526709.1526816"},{"key":"6_CR28","unstructured":"Rdusseeun, L.K.P.J., Kaufman, P.: Clustering by means of medoids. In: Proceedings of the Statistical Data Analysis Based on the L1 Norm Conference, Neuchatel, Switzerland, vol. 31 (1987)"},{"key":"6_CR29","unstructured":"Ng, A., Jordan, M., Weiss, Y.: On spectral clustering: analysis and an algorithm. In: Advances in Neural Information Processing Systems, vol. 14 (2001)"},{"key":"6_CR30","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1007\/BF01890115","volume":"1","author":"WHE Day","year":"1984","unstructured":"Day, W.H.E., Edelsbrunner, H.: Efficient algorithms for agglomerative hierarchical clustering methods. J. Classif. 1, 7\u201324 (1984). https:\/\/doi.org\/10.1007\/BF01890115","journal-title":"J. Classif."}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-94458-1_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,9]],"date-time":"2025-09-09T22:44:56Z","timestamp":1757457896000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-94458-1_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,31]]},"ISBN":["9783031944574","9783031944581"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-94458-1_6","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2025,8,31]]},"assertion":[{"value":"31 August 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"SecureComm","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security and Privacy in Communication Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Dubai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Arab Emirates","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 October 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 October 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"securecomm2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/securecomm.eai-conferences.org\/2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}