{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T16:43:26Z","timestamp":1725813806992},"publisher-location":"Cham","reference-count":9,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319138404"},{"type":"electronic","value":"9783319138411"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-13841-1_27","type":"book-chapter","created":{"date-parts":[[2014,12,3]],"date-time":"2014-12-03T13:02:35Z","timestamp":1417611755000},"page":"464-476","source":"Crossref","is-referenced-by-count":0,"title":["Location Obfuscation Framework for Training-Free Localization System"],"prefix":"10.1007","author":[{"given":"Thong M.","family":"Doan","sequence":"first","affiliation":[]},{"given":"Han N.","family":"Dinh","sequence":"additional","affiliation":[]},{"given":"Nam T.","family":"Nguyen","sequence":"additional","affiliation":[]},{"given":"Phuoc T.","family":"Tran","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"doi-asserted-by":"crossref","unstructured":"Le, T., Doan, T., Dinh, H., Nguyen, N.: Instant Search-based Indoor Localization. In: IEEE Consumer Communications and Networking Conference (CCNC), Las Vegas, Nevada, USA, pp. 143\u2013148 (2013)","key":"27_CR1","DOI":"10.1109\/CCNC.2013.6488438"},{"doi-asserted-by":"crossref","unstructured":"Doan, T.M., Dinh, H.N., Nguyen, N.T.: CGSIL: Collaborative Geo-clustering Search-based Indoor Localization. Accepted in the 16th IEEE International Conference on High Performance Computing and Communications (HPCC), Paris, France (2014)","key":"27_CR2","DOI":"10.1109\/HPCC.2014.89"},{"doi-asserted-by":"crossref","unstructured":"Le, T.D., et al.: Convert Wi-Fi Signals for Fingerprint Localization Algorithm. In: Proc. IEEE Int. Conf. on Wireless Communication, Networking and Mobile Computing (WiCOM 2011), Wuhan, China, Session 12, pp. 1\u20135 (2011)","key":"27_CR3","DOI":"10.1109\/wicom.2011.6040625"},{"doi-asserted-by":"crossref","unstructured":"Sweeney, L.: k-Anonymity: A Model for Protecting Privacy. International Journal on Uncertainty, Fuzziness and Knowledge-Based Systems, 557\u2013570 (2002)","key":"27_CR4","DOI":"10.1142\/S0218488502001648"},{"issue":"12","key":"27_CR5","doi-asserted-by":"publisher","first-page":"1719","DOI":"10.1109\/TKDE.2007.190662","volume":"19","author":"P. Kalnis","year":"2007","unstructured":"Kalnis, P., Ghinita, G., Mouratidis, K., Papadias, D.: Preventing Location-Based Identity Inference in Anonymous Spatial Queries. IEEE Transactions on Knowledge and Data Engineering\u00a019(12), 1719\u20131733 (2007)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"unstructured":"Gedik, B., Liu, L.: A Customizable k-Anonymity Model for Protecting Location Privacy. In: ICDCS, pp. 620\u2013629 (2004)","key":"27_CR6"},{"doi-asserted-by":"crossref","unstructured":"Zhong, G., Hengartner, U.: A Distributed k-Anonymity Protocol for Location Privacy. In: IEEE Int. Conference on Pervasive Computing and Communications (PerCom), pp. 1\u201310 (2009)","key":"27_CR7","DOI":"10.1109\/PERCOM.2009.4912774"},{"doi-asserted-by":"crossref","unstructured":"Gedik, B., Liu, L.: Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms. IEEE Transactions on Mobile Computing\u00a07(1) (2008)","key":"27_CR8","DOI":"10.1109\/TMC.2007.1062"},{"doi-asserted-by":"crossref","unstructured":"Gkoulalas\u2013Divanis, A., Kalnis, P., Verykios, V.S.: Providing K\u2013Anonymity in Location Based Services. SIGKDD Explorations 12(1)","key":"27_CR9","DOI":"10.1145\/1882471.1882473"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-13841-1_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,23]],"date-time":"2022-04-23T20:23:15Z","timestamp":1650745395000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-13841-1_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319138404","9783319138411"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-13841-1_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}