{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T18:00:29Z","timestamp":1773511229162,"version":"3.50.1"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319085050","type":"print"},{"value":"9783319085067","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-08506-7_2","type":"book-chapter","created":{"date-parts":[[2014,6,19]],"date-time":"2014-06-19T21:39:22Z","timestamp":1403213962000},"page":"21-41","source":"Crossref","is-referenced-by-count":52,"title":["A Predictive Differentially-Private Mechanism for Mobility Traces"],"prefix":"10.1007","author":[{"given":"Konstantinos","family":"Chatzikokolakis","sequence":"first","affiliation":[]},{"given":"Catuscia","family":"Palamidessi","sequence":"additional","affiliation":[]},{"given":"Marco","family":"Stronati","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","doi-asserted-by":"crossref","unstructured":"Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: Proc. of MobiSys, USENIX (2003)","DOI":"10.1145\/1066116.1189037"},{"key":"2_CR2","unstructured":"Mokbel, M.F., Chow, C.Y., Aref, W.G.: The new casper: Query processing for location services without compromising privacy. In: Proc. of VLDB, pp. 763\u2013774. ACM (2006)"},{"key":"2_CR3","doi-asserted-by":"crossref","unstructured":"Kido, H., Yanagisawa, Y., Satoh, T.: Protection of location privacy using dummies for location-based services. In: Proc. of ICDE Workshops, p. 1248 (2005)","DOI":"10.1109\/ICDE.2005.269"},{"key":"2_CR4","doi-asserted-by":"crossref","unstructured":"Shankar, P., Ganapathy, V., Iftode, L.: Privately querying location-based services with SybilQuery. In: Proc. of UbiComp, pp. 31\u201340. ACM (2009)","DOI":"10.1145\/1620545.1620550"},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"Bamba, B., Liu, L., Pesti, P., Wang, T.: Supporting anonymous location queries in mobile environments with privacygrid. In: Proc. of WWW, pp. 237\u2013246. ACM (2008)","DOI":"10.21236\/ADA470490"},{"key":"2_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1007\/11428572_10","volume-title":"Pervasive Computing","author":"M. Duckham","year":"2005","unstructured":"Duckham, M., Kulik, L.: A formal model of obfuscation and negotiation for location privacy. In: Gellersen, H.-W., Want, R., Schmidt, A. (eds.) PERVASIVE 2005. LNCS, vol.\u00a03468, pp. 152\u2013170. Springer, Heidelberg (2005)"},{"key":"2_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1007\/978-3-642-01721-6_5","volume-title":"Location and Context Awareness","author":"M. Xue","year":"2009","unstructured":"Xue, M., Kalnis, P., Pung, H.K.: Location diversity: Enhanced privacy protection in location based services. In: Choudhury, T., Quigley, A., Strang, T., Suginuma, K. (eds.) LoCA 2009. LNCS, vol.\u00a05561, pp. 70\u201387. Springer, Heidelberg (2009)"},{"key":"2_CR8","doi-asserted-by":"crossref","unstructured":"Shokri, R., Theodorakopoulos, G., Troncoso, C., Hubaux, J.P., Boudec, J.Y.L.: Protecting location privacy: optimal strategy against localization attacks. In: Proc. of CCS, pp. 617\u2013627. ACM (2012)","DOI":"10.1145\/2382196.2382261"},{"key":"2_CR9","doi-asserted-by":"crossref","unstructured":"Shokri, R., Theodorakopoulos, G., Boudec, J.Y.L., Hubaux, J.P.: Quantifying location privacy. In: Proc. of S&P, pp. 247\u2013262. IEEE (2011)","DOI":"10.1109\/SP.2011.18"},{"key":"2_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11787006_1","volume-title":"Automata, Languages and Programming","author":"C. Dwork","year":"2006","unstructured":"Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol.\u00a04052, pp. 1\u201312. Springer, Heidelberg (2006)"},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"Machanavajjhala, A., Kifer, D., Abowd, J.M., Gehrke, J., Vilhuber, L.: Privacy: Theory meets practice on the map. In: Proc. of ICDE, pp. 277\u2013286. IEEE (2008)","DOI":"10.1109\/ICDE.2008.4497436"},{"key":"2_CR12","doi-asserted-by":"crossref","unstructured":"Ho, S.S., Ruan, S.: Differential privacy for location pattern mining. In: Proc. of SPRINGL, pp. 17\u201324. ACM (2011)","DOI":"10.1145\/2071880.2071884"},{"key":"2_CR13","doi-asserted-by":"crossref","unstructured":"Chen, R., \u00c1cs, G., Castelluccia, C.: Differentially private sequential data publication via variable-length n-grams. In: Proc. of CCS, pp. 638\u2013649. ACM (2012)","DOI":"10.1145\/2382196.2382263"},{"key":"2_CR14","doi-asserted-by":"crossref","unstructured":"Andr\u00e9s, M.E., Bordenabe, N.E., Chatzikokolakis, K., Palamidessi, C.: Geo-indistinguishability: differential privacy for location-based systems. In: Proc. of CCS, pp. 901\u2013914. ACM (2013)","DOI":"10.1145\/2508859.2516735"},{"issue":"2","key":"2_CR15","first-page":"32","volume":"33","author":"Y. Zheng","year":"2010","unstructured":"Zheng, Y., Xie, X., Ma, W.Y.: Geolife: A collaborative social networking service among user, location and trajectory. IEEE Data Eng. Bull.\u00a033(2), 32\u201339 (2010)","journal-title":"IEEE Data Eng. Bull."},{"key":"2_CR16","doi-asserted-by":"crossref","unstructured":"Yuan, J., Zheng, Y., Zhang, C., Xie, W., Xie, X., Sun, G., Huang, Y.: T-drive: driving directions based on taxi trajectories. In: GIS, pp. 99\u2013108 (2010)","DOI":"10.1145\/1869790.1869807"},{"key":"2_CR17","doi-asserted-by":"crossref","unstructured":"Chatzikokolakis, K., Palamidessi, C., Stronati, M.: A predictive differentially-private mechanism for mobility traces. CoRR abs\/1311.4008 (2013)","DOI":"10.1007\/978-3-319-08506-7_2"},{"key":"2_CR18","doi-asserted-by":"crossref","unstructured":"Reed, J., Pierce, B.C.: Distance makes the types grow stronger: a calculus for differential privacy. In: Proc. of ICFP, pp. 157\u2013168. ACM (2010)","DOI":"10.1145\/1932681.1863568"},{"key":"2_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1007\/978-3-642-39077-7_5","volume-title":"Privacy Enhancing Technologies","author":"K. Chatzikokolakis","year":"2013","unstructured":"Chatzikokolakis, K., Andr\u00e9s, M.E., Bordenabe, N.E., Palamidessi, C.: Broadening the Scope of Differential Privacy using metrics. In: De Cristofaro, E., Wright, M. (eds.) PETS 2013. LNCS, vol.\u00a07981, pp. 82\u2013102. Springer, Heidelberg (2013)"},{"key":"2_CR20","doi-asserted-by":"crossref","unstructured":"Roth, A., Roughgarden, T.: Interactive privacy via the median mechanism. In: Proc. of STOC, pp. 765\u2013774 (2010)","DOI":"10.1145\/1806689.1806794"},{"issue":"2","key":"2_CR21","first-page":"103","volume":"4","author":"S. Gambs","year":"2011","unstructured":"Gambs, S., Killijian, M.O., del Prado Cortez, M.N.: Show me how you move and i will tell you who you are. Trans. on Data Privacy\u00a04(2), 103\u2013126 (2011)","journal-title":"Trans. on Data Privacy"},{"key":"2_CR22","doi-asserted-by":"crossref","unstructured":"Hardt, M., Rothblum, G.N.: A multiplicative weights mechanism for privacy-preserving data analysis. In: FOCS, pp. 61\u201370. IEEE (2010)","DOI":"10.1109\/FOCS.2010.85"},{"key":"2_CR23","doi-asserted-by":"crossref","unstructured":"Dwork, C., Naor, M., Pitassi, T., Rothblum, G.N.: Differential privacy under continual observation. In: STOC, pp. 715\u2013724. ACM (2010)","DOI":"10.1145\/1806689.1806787"},{"issue":"1","key":"2_CR24","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1145\/2031331.2031334","volume":"13","author":"M. Terrovitis","year":"2011","unstructured":"Terrovitis, M.: Privacy preservation in the dissemination of location data. SIGKDD Explorations\u00a013(1), 6\u201318 (2011)","journal-title":"SIGKDD Explorations"},{"issue":"6","key":"2_CR25","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1007\/s00779-008-0212-5","volume":"13","author":"J. Krumm","year":"2009","unstructured":"Krumm, J.: A survey of computational location privacy. Personal and Ubiquitous Computing\u00a013(6), 391\u2013399 (2009)","journal-title":"Personal and Ubiquitous Computing"},{"issue":"2","key":"2_CR26","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/MWC.2012.6155874","volume":"19","author":"K.G. Shin","year":"2012","unstructured":"Shin, K.G., Ju, X., Chen, Z., Hu, X.: Privacy protection for users of location-based services. IEEE Wireless Commun.\u00a019(2), 30\u201339 (2012)","journal-title":"IEEE Wireless Commun."},{"key":"2_CR27","unstructured":"Hoh, B., Gruteser, M.: Protecting location privacy through path confusion. In: Proc. of SecureComm, pp. 194\u2013205. IEEE (2005)"},{"issue":"(PrePrints","key":"2_CR28","first-page":"1","volume":"99","author":"R. Dewri","year":"2012","unstructured":"Dewri, R.: Local differential perturbations: Location privacy under approximate knowledge attackers. IEEE Trans. on Mobile Computing\u00a099((PrePrints), 1 (2012)","journal-title":"IEEE Trans. on Mobile Computing"},{"key":"2_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1007\/11957454_23","volume-title":"Privacy Enhancing Technologies","author":"R. Cheng","year":"2006","unstructured":"Cheng, R., Zhang, Y., Bertino, E., Prabhakar, S.: Preserving user location privacy in mobile data management infrastructures. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, vol.\u00a04258, pp. 393\u2013412. Springer, Heidelberg (2006)"},{"key":"2_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/978-3-540-73538-0_4","volume-title":"Data and Applications Security XXI","author":"C.A. Ardagna","year":"2007","unstructured":"Ardagna, C.A., Cremonini, M., Damiani, E., De Capitani di Vimercati, S., Samarati, P.: Location privacy protection through obfuscation-based techniques. In: Barker, S., Ahn, G.-J. (eds.) Data and Applications Security 2007. LNCS, vol.\u00a04602, pp. 47\u201360. Springer, Heidelberg (2007)"}],"container-title":["Lecture Notes in Computer Science","Privacy Enhancing Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-08506-7_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,26]],"date-time":"2019-05-26T23:59:43Z","timestamp":1558915183000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-08506-7_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319085050","9783319085067"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-08506-7_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014]]}}}