{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T00:20:28Z","timestamp":1743121228159,"version":"3.40.3"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319281209"},{"type":"electronic","value":"9783319281216"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-28121-6_11","type":"book-chapter","created":{"date-parts":[[2015,12,29]],"date-time":"2015-12-29T08:57:57Z","timestamp":1451379477000},"page":"113-124","source":"Crossref","is-referenced-by-count":11,"title":["Protecting Location Privacy in Spatial Crowdsourcing"],"prefix":"10.1007","author":[{"given":"Jie","family":"Hu","sequence":"first","affiliation":[]},{"given":"Liusheng","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Lu","family":"Li","sequence":"additional","affiliation":[]},{"given":"Mingyu","family":"Qi","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,30]]},"reference":[{"key":"11_CR1","doi-asserted-by":"crossref","unstructured":"Kazemi, L., Shahabi, C.: Geocrowd: enabling query answering with spatial crowdsourcing. In: ACM SIGSPATIAL GIS 2012, pp. 189\u2013198 (2012)","DOI":"10.1145\/2424321.2424346"},{"key":"11_CR2","doi-asserted-by":"crossref","unstructured":"To, H., Ghinita, G., Shahabi, C.: A framework for protecting worker location privacy in spatial crowdsourcing. In: International Conference on Very Large Data Bases (VLDB), Hangzhou, China (2014)","DOI":"10.14778\/2732951.2732966"},{"issue":"1","key":"11_CR3","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1145\/2031331.2031337","volume":"13","author":"L Kazemi","year":"2011","unstructured":"Kazemi, L., Shahabi, C.: A privacy-aware framework for participatory sensing. SIGKDD Explor. 13(1), 45\u201351 (2011)","journal-title":"SIGKDD Explor."},{"key":"11_CR4","volume-title":"Algorithm Design","author":"J Kleinberg","year":"2005","unstructured":"Kleinberg, J., Tardos, E.: Algorithm Design. Addison-Wesley Longman Publishing Co. Inc., Boston (2005)"},{"issue":"2","key":"11_CR5","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1007\/s10707-009-0099-y","volume":"15","author":"CY Chow","year":"2011","unstructured":"Chow, C.Y., Mokbel, M.F., Liu, X.: Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments. GeoInformatica 15(2), 351\u2013380 (2011)","journal-title":"GeoInformatica"},{"key":"11_CR6","doi-asserted-by":"crossref","unstructured":"Navas, J.C., Imielinski, T.: Geocastgeographic addressing and routing. In: International Conference on Mobile Computing and Networking (MOBICOM), pp. 66\u201376 (1997)","DOI":"10.1145\/262116.262132"},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"Alt, F., Shirazi, A.S., Schmidt, A., Kramer, U., Nawaz, Z.: Location-based crowdsourcing: extending crowdsourcing to the real world. In: International Conference on Human-Computer Interaction (NordiCHI), pp. 13\u201322 (2010)","DOI":"10.1145\/1868914.1868921"},{"key":"11_CR8","doi-asserted-by":"crossref","unstructured":"Niu, B., Li, Q., Zhu, X., Cao, G., Li, H.: Achieving k-anonymity in privacy-aware location-based services. In: International Conference on INFOCOM. IEEE (2014)","DOI":"10.1109\/INFOCOM.2014.6848002"},{"key":"11_CR9","doi-asserted-by":"crossref","unstructured":"Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: International Conference on Mobile Systems, Applications and Services, pp. 31\u201342. ACM (2003)","DOI":"10.1145\/1066116.1189037"},{"key":"11_CR10","doi-asserted-by":"crossref","unstructured":"Hirth, M., Scheuring, S., Hossfeld, T., et al.: Predicting result quality in crowdsourcing using application layer monitoring. In: International Conference on Communications and Electronics (ICCE), pp. 510\u2013515. IEEE (2014)","DOI":"10.1109\/CCE.2014.6916756"},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"Horton, J.J., Chilton, L.B.: The labor economics of paid crowdsourcing. In: International Conference on Electronic Commerce, pp. 209\u2013218. ACM (2010)","DOI":"10.1145\/1807342.1807376"},{"issue":"2","key":"11_CR12","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1111\/j.1540-5885.2011.00893.x","volume":"29","author":"MK Poetz","year":"2012","unstructured":"Poetz, M.K., Schreier, M.: The value of crowdsourcing: can users really compete with professionals in generating new product ideas? J. Prod. Innov. Manage. 29(2), 245\u2013256 (2012)","journal-title":"J. Prod. Innov. Manage."},{"key":"11_CR13","doi-asserted-by":"crossref","unstructured":"Dang, H., Nguyen, T., To, H.: Maximum complex task assignment: towards tasks correlation in spatial crowdsourcing. In: International Conference on Information Integration and Web-based Applications & Services. ACM (2013)","DOI":"10.1145\/2539150.2539243"},{"key":"11_CR14","doi-asserted-by":"crossref","unstructured":"Kazemi, L., Shahabi, C., Chen, L.: Geotrucrowd: trustworthy query answering with spatial crowdsourcing. In: International Conference on Advances in Geographic Information Systems, pp. 304\u2013313. ACM (2013)","DOI":"10.1145\/2525314.2525346"},{"key":"11_CR15","doi-asserted-by":"crossref","unstructured":"Deng, D., Shahabi, C., Demiryurek, U.: Maximizing the number of worker\u2019s self-selected tasks in spatial crowdsourcing. In: International Conference on Advances in Geographic Information Systems, pp. 324\u2013333. ACM (2013)","DOI":"10.1145\/2525314.2525370"},{"key":"11_CR16","doi-asserted-by":"crossref","unstructured":"Pournajaf, L., Xiong, L., Sunderam, V., et al. Spatial task assignment for crowd sensing with cloaked locations. In: International Conference on Mobile Data Management (MDM). IEEE (2014, to appear)","DOI":"10.1109\/MDM.2014.15"},{"key":"11_CR17","doi-asserted-by":"crossref","unstructured":"Rai, A., Chintalapudi, K.K., Padmanabhan, V.N., et al.: Zee: zero-effort crowdsourcing for indoor localization. In: International Conference on Mobile Computing and Networking. ACM, pp. 293\u2013304 (2012)","DOI":"10.1145\/2348543.2348580"},{"key":"11_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1007\/978-3-540-73540-3_13","volume-title":"Advances in Spatial and Temporal Databases","author":"G Ghinita","year":"2007","unstructured":"Ghinita, G., Kalnis, P., Skiadopoulos, S.: MobiHide: a mobilea peer-to-peer system for anonymous location-based queries. In: Papadias, D., Zhang, D., Kollios, G. (eds.) SSTD 2007. LNCS, vol. 4605, pp. 221\u2013238. Springer, Heidelberg (2007)"},{"key":"11_CR19","doi-asserted-by":"crossref","unstructured":"Shokri, R., Theodorakopoulos, G., Le Boudec, J.Y., et al.: Quantifying location privacy. In: IEEE Symposium on International Conference on Security and Privacy (SP), pp. 247\u2013262. IEEE (2011)","DOI":"10.1109\/SP.2011.18"},{"key":"11_CR20","doi-asserted-by":"crossref","unstructured":"Shokri, R., Theodorakopoulos, G., Troncoso, C., et al.: Protecting location privacy: optimal strategy against localization attacks. In: International Conference on Computer and Communications Security (CCS), pp. 617\u2013627. ACM (2012)","DOI":"10.1145\/2382196.2382261"},{"key":"11_CR21","unstructured":"Narayanan, A., Thiagarajan, N., Lakhani, M., et al.: Location privacy via private proximity testing. In: International Conference on NDSS (2011)"},{"issue":"3","key":"11_CR22","doi-asserted-by":"publisher","first-page":"435","DOI":"10.1007\/s10115-010-0286-z","volume":"26","author":"A Khoshgozaran","year":"2011","unstructured":"Khoshgozaran, A., Shahabi, C., Shirani-Mehr, H.: Location privacy: going beyond K-anonymity, cloaking and anonymizers. Knowl. Inf. Syst. 26(3), 435\u2013465 (2011)","journal-title":"Knowl. Inf. Syst."},{"key":"11_CR23","unstructured":"Guha, S., Jain, M., Padmanabhan, V.N.: Koi: a location-privacy platform for smartphone apps. In: International Conference on NSDI, pp. 183\u2013196 (2012)"},{"key":"11_CR24","doi-asserted-by":"crossref","unstructured":"Cormode, G., Procopiuc, C., Srivastava, D., et al.: Differentially private spatial decompositions. In: IEEE 28th International Conference on Data Engineering (ICDE), pp. 20\u201331. IEEE (2012)","DOI":"10.1109\/ICDE.2012.16"},{"key":"11_CR25","volume-title":"Algorithm Design","author":"J Kleinberg","year":"2005","unstructured":"Kleinberg, J., Tardos, E.: Algorithm Design. Addison-Wesley Longman Publishing Co. Inc., Boston (2005)"},{"key":"11_CR26","unstructured":"Gowalla dataset. \n                      http:\/\/snap.stanford.edu\/data\/loc-gowalla.html"},{"key":"11_CR27","unstructured":"Cheng, P., Lian, X., Chen, Z., et al.: Reliable diversity-based spatial crowdsourcing by moving workers. arXiv preprint \n                      arXiv: 1412.0223\n                      \n                     (2014)"},{"key":"11_CR28","doi-asserted-by":"crossref","unstructured":"Shahabi, C., et al.: Towards a generic framework for trustworthy spatial crowdsourcing. In: International Conference on Data Engineering for Wireless and Mobile Acess, pp. 1\u20134. ACM (2013)","DOI":"10.1145\/2486084.2486085"},{"key":"11_CR29","unstructured":"Van Exel, M., Dias, E., Fruijtier, S.: The impact of crowdsourcing on spatial data quality indicators. In: Proceedings of GiScience 2011 (2010)"}],"container-title":["Lecture Notes in Computer Science","Web Technologies and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-28121-6_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T02:48:22Z","timestamp":1559357302000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-28121-6_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319281209","9783319281216"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-28121-6_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}