{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T04:57:33Z","timestamp":1743051453004,"version":"3.40.3"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319210414"},{"type":"electronic","value":"9783319210421"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-21042-1_24","type":"book-chapter","created":{"date-parts":[[2015,6,5]],"date-time":"2015-06-05T14:12:18Z","timestamp":1433513538000},"page":"297-308","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Location Semantics Protection Based on Bayesian Inference"],"prefix":"10.1007","author":[{"given":"Zhengang","family":"Wu","sequence":"first","affiliation":[]},{"given":"Zhong","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Jiawei","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Huiping","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Zhi","family":"Guan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,6,6]]},"reference":[{"key":"24_CR1","doi-asserted-by":"crossref","unstructured":"Lee, B., Oh, J., Yu, H., Kim, J.: Protecting location privacy using location semantics. In: Apt\u00e9, C., Ghosh, J., Smyth, P. (eds.) KDD, pp. 1289\u20131297. ACM (2011)","DOI":"10.1145\/2020408.2020602"},{"key":"24_CR2","unstructured":"Mokbel, M.F., Chow, C.Y., Aref, W.G.: The new casper: query processing for location services without compromising privacy. In: Dayal, U., Whang, K.Y., Lomet, D.B., Alonso, G., Lohman, G.M., Kersten, M.L., Cha, S.K., Kim, Y.K. (eds.) VLDB, pp. 763\u2013774. ACM (2006)"},{"issue":"5","key":"24_CR3","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L.: k-anonymity: A model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 10(5), 557\u2013570 (2002)","journal-title":"International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems"},{"key":"24_CR4","doi-asserted-by":"crossref","unstructured":"Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M.: l-diversity: privacy beyond k-anonymity. In: Liu, L., Reuter, A., Whang, K.Y., Zhang, J. (eds.) ICDE, p. 24. IEEE Computer Society (2006)","DOI":"10.1109\/ICDE.2006.1"},{"key":"24_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1007\/978-3-642-40235-7_3","volume-title":"Advances in Spatial and Temporal Databases","author":"MF Mokbel","year":"2013","unstructured":"Mokbel, M.F., Alarabi, L., Bao, J., Eldawy, A., Magdy, A., Sarwat, M., Waytas, E., Yackel, S.: MNTG: an extensible web-based traffic generator. In: Nascimento, M.A., Sellis, T., Cheng, R., Sander, J., Zheng, Y., Kriegel, H.-P., Renz, M., Sengstock, C. (eds.) SSTD 2013. LNCS, vol. 8098, pp. 38\u201355. Springer, Heidelberg (2013)"},{"issue":"5","key":"24_CR6","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1142\/S021848850200165X","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L.: Achieving k-anonymity privacy protection using generalization and suppression. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 10(5), 571\u2013588 (2002)","journal-title":"International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems"},{"key":"24_CR7","doi-asserted-by":"crossref","unstructured":"Li, N., Li, T., Venkatasubramanian, S.: t-closeness: Privacy beyond k-anonymity and l-diversity. In: Chirkova, R., Dogac, A., \u00d6zsu, M.T., Sellis, T.K. (eds.) ICDE, pp. 106\u2013115. IEEE (2007)","DOI":"10.1109\/ICDE.2007.367856"},{"issue":"1","key":"24_CR8","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/s00779-012-0633-z","volume":"18","author":"M Wernke","year":"2014","unstructured":"Wernke, M., Skvortsov, P., D\u00fcrr, F., Rothermel, K.: A classification of location privacy attacks and approaches. Personal and Ubiquitous Computing 18(1), 163\u2013175 (2014)","journal-title":"Personal and Ubiquitous Computing"},{"issue":"1","key":"24_CR9","first-page":"619","volume":"3","author":"S Papadopoulos","year":"2010","unstructured":"Papadopoulos, S., Bakiras, S., Papadias, D.: Nearest neighbor search with strong location privacy. PVLDB 3(1), 619\u2013629 (2010)","journal-title":"PVLDB"},{"issue":"5","key":"24_CR10","doi-asserted-by":"publisher","first-page":"1200","DOI":"10.1109\/TKDE.2013.87","volume":"26","author":"R Paulet","year":"2014","unstructured":"Paulet, R., Kaosar, M.G., Yi, X., Bertino, E.: Privacy-preserving and content-protecting location based queries. IEEE Trans. Knowl. Data Eng. 26(5), 1200\u20131210 (2014)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"24_CR11","doi-asserted-by":"crossref","unstructured":"Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: Siewiorek, D.P. (ed.) MobiSys. USENIX (2003)","DOI":"10.1145\/1066116.1189037"},{"issue":"1","key":"24_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TMC.2007.1062","volume":"7","author":"B Gedik","year":"2008","unstructured":"Gedik, B., Liu, L.: Protecting location privacy with personalized k-anonymity: Architecture and algorithms. IEEE Trans. Mob. Comput. 7(1), 1\u201318 (2008)","journal-title":"IEEE Trans. Mob. Comput."},{"issue":"12","key":"24_CR13","doi-asserted-by":"publisher","first-page":"1719","DOI":"10.1109\/TKDE.2007.190662","volume":"19","author":"P Kalnis","year":"2007","unstructured":"Kalnis, P., Ghinita, G., Mouratidis, K., Papadias, D.: Preventing location-based identity inference in anonymous spatial queries. IEEE Trans. Knowl. Data Eng. 19(12), 1719\u20131733 (2007)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"24_CR14","doi-asserted-by":"crossref","unstructured":"Shokri, R., Theodorakopoulos, G., Boudec, J.Y.L., Hubaux, J.P.: Quantifying location privacy. In: IEEE Symposium on Security and Privacy, pp. 247\u2013262. IEEE Computer Society (2011)","DOI":"10.1109\/SP.2011.18"},{"issue":"4","key":"24_CR15","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1145\/2501654.2501656","volume":"45","author":"C Parent","year":"2013","unstructured":"Parent, C., Spaccapietra, S., Renso, C., Andrienko, G.L., Andrienko, N.V., Bogorny, V., Damiani, M.L., Gkoulalas-Divanis, A., de Mac\u00eado, J.A.F., Pelekis, N., Theodoridis, Y., Yan, Z.: Semantic trajectories modeling and analysis. ACM Comput. Surv. 45(4), 42 (2013)","journal-title":"ACM Comput. Surv."}],"container-title":["Lecture Notes in Computer Science","Web-Age Information Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-21042-1_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,31]],"date-time":"2023-01-31T04:14:43Z","timestamp":1675138483000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-21042-1_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319210414","9783319210421"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-21042-1_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"6 June 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}