{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T23:40:10Z","timestamp":1748821210132,"version":"3.41.0"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319320489"},{"type":"electronic","value":"9783319320496"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-32049-6_20","type":"book-chapter","created":{"date-parts":[[2016,3,24]],"date-time":"2016-03-24T12:47:36Z","timestamp":1458823656000},"page":"314-331","source":"Crossref","is-referenced-by-count":9,"title":["Semantic-Aware Location Privacy Preservation on Road Networks"],"prefix":"10.1007","author":[{"given":"Yanhui","family":"Li","sequence":"first","affiliation":[]},{"given":"Ye","family":"Yuan","sequence":"additional","affiliation":[]},{"given":"Guoren","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Lei","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Jiajia","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,3,25]]},"reference":[{"key":"20_CR1","doi-asserted-by":"crossref","unstructured":"Bamba, B., Liu, L., Pesti, P., Wang, T.: Supporting anonymous location queries in mobile environments with privacygrid. In: WWW, pp. 237\u2013246. ACM (2008)","DOI":"10.21236\/ADA470490"},{"issue":"6","key":"20_CR2","first-page":"41","volume":"45","author":"B Chor","year":"1998","unstructured":"Chor, B., Kushilevitz, E., Goldreich, O., Sudan, M.: Private information retrieval. IEEE Symp. Found. Comput. Sci. 45(6), 41\u201350 (1998)","journal-title":"IEEE Symp. Found. Comput. Sci."},{"issue":"3","key":"20_CR3","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1007\/s10707-010-0117-0","volume":"15","author":"C Chow","year":"2011","unstructured":"Chow, C., Mokbel, M.F., Bao, J., Liu, X.: Query-aware location anonymization for road networks. GeoInformatica 15(3), 571\u2013607 (2011)","journal-title":"GeoInformatica"},{"issue":"4","key":"20_CR4","first-page":"24","volume":"34","author":"C Chow","year":"2009","unstructured":"Chow, C., Mokbel, M., Aref, W.: Casper*: query processing for location services without compromising privacy. Trans. Database Syst. (TODS) 34(4), 24 (2009)","journal-title":"Trans. Database Syst. (TODS)"},{"key":"20_CR5","doi-asserted-by":"crossref","unstructured":"Chow, C., Mokbel, M., Liu, X.: A peer-to-peer spatial cloaking algorithm for anonymous location-based services. In: GIS, pp. 171\u2013178 (2006)","DOI":"10.1145\/1183471.1183500"},{"issue":"4","key":"20_CR6","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1109\/MPRV.2011.18","volume":"10","author":"M Damiani","year":"2011","unstructured":"Damiani, M., Silvestri, C., Bertino, E.: Fine-grained cloaking of sensitive positions in location-sharing applications. Pervasive Comput. 10(4), 64\u201372 (2011)","journal-title":"Pervasive Comput."},{"key":"20_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1007\/978-3-540-30192-9_55","volume-title":"Current Trends in Database Technology - EDBT 2004 Workshops","author":"D Fogaras","year":"2004","unstructured":"Fogaras, D., R\u00e1cz, B.: A scalable randomized method to compute link-based similarity rank on the web graph. In: Lindner, W., Fischer, F., T\u00fcrker, C., Tzitzikas, Y., Vakali, A.I. (eds.) EDBT 2004. LNCS, vol. 3268, pp. 557\u2013567. Springer, Heidelberg (2004)"},{"key":"20_CR8","doi-asserted-by":"crossref","unstructured":"Gedik, B., Liu, L.: Location privacy in mobile systems: a personalized anonymization model. In: Distributed Computing Systems, pp. 620\u2013629. IEEE (2005)","DOI":"10.1109\/ICDCS.2005.48"},{"key":"20_CR9","doi-asserted-by":"crossref","unstructured":"Ghinita, G., Kalnis, P., Khoshgozaran, A., Shahabi, C., Tan, K.: Private queries in location based services: anonymizers are not necessary. In: SIGMOD, pp. 121\u2013132. ACM (2008)","DOI":"10.1145\/1376616.1376631"},{"issue":"3","key":"20_CR10","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1016\/j.is.2009.10.001","volume":"35","author":"G Ghinita","year":"2010","unstructured":"Ghinita, G., Zhao, K., Papadias, D., Kalnis, P.: A reciprocal framework for spatial k-anonymity. Inf. Syst. 35(3), 299\u2013314 (2010)","journal-title":"Inf. Syst."},{"key":"20_CR11","doi-asserted-by":"crossref","unstructured":"Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of the 1st International Conference on Mobile Systems, Applications and Services, pp. 31\u201342. ACM (2003)","DOI":"10.1145\/1066116.1189037"},{"key":"20_CR12","doi-asserted-by":"crossref","unstructured":"Hu, H., Xu, J.: Non-exposure location anonymity. In: ICDE, pp. 1120\u20131131. IEEE (2009)","DOI":"10.1109\/ICDE.2009.106"},{"issue":"12","key":"20_CR13","first-page":"1719","volume":"19","author":"P Kalnis","year":"2007","unstructured":"Kalnis, P., Ghinita, G., Mouratidis, K., Papadias, D.: Preventing location-based identity inference in anonymous spatial queries. TKDE 19(12), 1719\u20131733 (2007)","journal-title":"TKDE"},{"key":"20_CR14","doi-asserted-by":"crossref","unstructured":"Kido, H., Yanagisawa, Y., Satoh, T.: An anonymous communication technique using dummies for location-based services. In: ICPS, pp. 88\u201397 (2005)","DOI":"10.1109\/ICDE.2005.269"},{"key":"20_CR15","doi-asserted-by":"crossref","unstructured":"Ku, W., Zimmermann, R., Peng, W., Shroff, S.: Privacy protected query processing on spatial networks. In: Data Engineering Workshop, pp. 215\u2013220 (2007)","DOI":"10.1109\/ICDEW.2007.4400994"},{"key":"20_CR16","doi-asserted-by":"crossref","unstructured":"Lee, B., Oh, J., Yu, H., Kim, J.: Protecting location privacy using location semantics. In: SIGKDD (2011)","DOI":"10.1145\/2020408.2020602"},{"issue":"1","key":"20_CR17","first-page":"133","volume":"8","author":"M Li","year":"2014","unstructured":"Li, M., Qin, Z., Wang, C.: Sensitive semantics-aware personality cloaking on road-network environment. Int. J. Secur. 8(1), 133\u2013146 (2014)","journal-title":"Int. J. Secur."},{"key":"20_CR18","doi-asserted-by":"crossref","unstructured":"Li, P., Peng, W., Wang, T., Ku, W., Xu, J., Hamilton, J., et al.: A cloaking algorithm based on spatial networks for location privacy. In: Sensor Networks, Ubiquitous and Trustworthy Computing, pp. 90\u201397 (2008)","DOI":"10.1109\/SUTC.2008.56"},{"key":"20_CR19","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"502","DOI":"10.1007\/978-3-540-44871-6_59","volume-title":"Pattern Recognition and Image Analysis","author":"CD Mart\u0142nez-Hinarejos","year":"2003","unstructured":"Mart\u0142nez-Hinarejos, C.D., Juan, A., Casacuberta, F.: Generalized k-medians clustering for strings. In: Perales, F.J., Campilho, A.J.C., de la Blanca, N.P., Sanfeliu, A. (eds.) IbPRIA 2003. LNCS, vol. 2652, pp. 502\u2013509. Springer, Heidelberg (2003)"},{"key":"20_CR20","unstructured":"Mokbel, M., Chow, C., Aref, W.: The new casper: query processing for location services without compromising privacy. In: VLDB, pp. 763\u2013774. VLDB Endowment (2006)"},{"key":"20_CR21","doi-asserted-by":"crossref","unstructured":"Palanisamy, B., Liu, L.: Mobimix: protecting location privacy with mix-zones over road networks. In: ICDE, pp. 494\u2013505. IEEE (2011)","DOI":"10.1109\/ICDE.2011.5767898"},{"key":"20_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"323","DOI":"10.1007\/978-3-319-08010-9_35","volume-title":"Web-Age Information Management","author":"X Pan","year":"2014","unstructured":"Pan, X., Wu, L., Piao, C., Xu, X.: P $$^\\text{3 }$$ 3 RN:personalized privacy protection using query semantics over road networks. In: Li, F., Li, G., Hwang, S., Yao, B., Zhang, Z. (eds.) WAIM 2014. LNCS, vol. 8485, pp. 323\u2013335. Springer, Heidelberg (2014)"},{"key":"20_CR23","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/978-3-540-75177-9_5","volume-title":"Mobility, Data Mining and Privacy","author":"D Pedreschi","year":"2008","unstructured":"Pedreschi, D., Bonchi, F., Turini, F., Verykios, V.S., Atzori, M., Malin, B., Moelans, B., Saygin, Y.: Privacy protection: regulations and technologies, opportunities and threats. In: Giannotti, F., Pedreschi, D. (eds.) Mobility, Data Mining and Privacy, pp. 101\u2013119. Springer, Heidelberg (2008)"},{"issue":"1","key":"20_CR24","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1093\/comjnl\/16.1.30","volume":"16","author":"R Sibson","year":"1973","unstructured":"Sibson, R.: Slink: an optimally efficient algorithm for the single-link cluster method. Comput. J. 16(1), 30\u201334 (1973)","journal-title":"Comput. J."},{"key":"20_CR25","first-page":"619","volume":"3","author":"P Stavros","year":"2010","unstructured":"Stavros, P., Spiridon, B., Dimitri, P.: Nearest neighbor search with strong location privacy. PVLDB 3, 619\u2013629 (2010)","journal-title":"PVLDB"},{"issue":"1","key":"20_CR26","first-page":"1042","volume":"2","author":"T Wang","year":"2009","unstructured":"Wang, T., Liu, L.: Privacy-aware mobile services over road networks. PVLDB 2(1), 1042\u20131053 (2009)","journal-title":"PVLDB"},{"key":"20_CR27","doi-asserted-by":"crossref","unstructured":"Xiao, Z., Xu, J., Meng, X.: p-Sensitivity: a semantic privacy-protection model for location-based services. In: MDMW 2008, pp. 47\u201354. IEEE (2008)","DOI":"10.1109\/MDMW.2008.20"},{"key":"20_CR28","doi-asserted-by":"crossref","unstructured":"Yigitoglu, E., Damiani, M., Abul, O., Silvestri, C.: Privacy-preserving sharing of sensitive semantic locations under road-network constraints. In: MDM, pp. 186\u2013195. IEEE (2012)","DOI":"10.1109\/MDM.2012.48"},{"key":"20_CR29","doi-asserted-by":"crossref","unstructured":"Yiu, M., Jensen, C., Huang, X., Lu, H.: Spacetwist: managing the trade-offs among location privacy, query performance, and query accuracy in mobile services. In: ICDE, pp. 366\u2013375. IEEE (2008)","DOI":"10.1109\/ICDE.2008.4497445"}],"container-title":["Lecture Notes in Computer Science","Database Systems for Advanced Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-32049-6_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T23:20:12Z","timestamp":1748820012000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-32049-6_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319320489","9783319320496"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-32049-6_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}