{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T20:53:09Z","timestamp":1725915189394},"publisher-location":"Cham","reference-count":10,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319685410"},{"type":"electronic","value":"9783319685427"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-68542-7_19","type":"book-chapter","created":{"date-parts":[[2017,11,1]],"date-time":"2017-11-01T15:23:50Z","timestamp":1509549830000},"page":"230-243","source":"Crossref","is-referenced-by-count":0,"title":["An Enhanced Method of Trajectory Privacy Preservation Through Trajectory Reconstruction"],"prefix":"10.1007","author":[{"given":"Yan","family":"Dai","sequence":"first","affiliation":[]},{"given":"Jie","family":"Shao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,2]]},"reference":[{"key":"19_CR1","doi-asserted-by":"crossref","unstructured":"Chen, R., \u00c1cs, G., Castelluccia, C.: Differentially private sequential data publication via variable-length n-grams. In: The ACM Conference on Computer and Communications Security, CCS 2012, Raleigh, NC, USA, 16\u201318 October 2012, pp. 638\u2013649 (2012)","DOI":"10.1145\/2382196.2382263"},{"key":"19_CR2","doi-asserted-by":"crossref","unstructured":"Chen, R., Fung, B.C.M., Desai, B.C., Sossou, N.M.: Differentially private transit data publication: a case study on the montreal transportation system. In: The 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2012, Beijing, China, 12\u201316 August 2012, pp. 213\u2013221 (2012)","DOI":"10.1145\/2339530.2339564"},{"key":"19_CR3","doi-asserted-by":"crossref","unstructured":"Gid\u00f3falvi, G., Huang, X., Pedersen, T.B.: Privacy: preserving trajectory collection. In: Proceedings of the 16th ACM SIGSPATIAL International Symposium on Advances in Geographic Information Systems, ACM-GIS 2008, Irvine, California, USA, 5\u20137 November 2008, p. 46 (2008)","DOI":"10.1145\/1463434.1463491"},{"key":"19_CR4","doi-asserted-by":"crossref","unstructured":"Gkoulalas-Divanis, A., Verykios, V.S., Mokbel, M.F.: Identifying unsafe routes for network-based trajectory privacy. In: Proceedings of the SIAM International Conference on Data Mining, SDM 2009, Sparks, Nevada, USA, 30 April\u20132 May 2009, pp. 942\u2013953 (2009)","DOI":"10.1137\/1.9781611972795.81"},{"issue":"2","key":"19_CR5","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1109\/MSECP.2004.1281242","volume":"2","author":"M Gruteser","year":"2004","unstructured":"Gruteser, M., Liu, X.: Protecting privacy in continuous location-tracking applications. IEEE Secur. Priv. 2(2), 28\u201334 (2004)","journal-title":"IEEE Secur. Priv."},{"key":"19_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1007\/978-3-642-29038-1_26","volume-title":"Database Systems for Advanced Applications","author":"Z Huo","year":"2012","unstructured":"Huo, Z., Meng, X., Hu, H., Huang, Y.: You Can Walk Alone: trajectory privacy-preserving through significant stays protection. In: Lee, S., Peng, Z., Zhou, X., Moon, Y.-S., Unland, R., Yoo, J. (eds.) DASFAA 2012. LNCS, vol. 7238, pp. 351\u2013366. Springer, Heidelberg (2012). doi:\n10.1007\/978-3-642-29038-1_26"},{"key":"19_CR7","unstructured":"Luper, D., Cameron, D., Miller, J., Arabnia, H.R.: Spatial and temporal target association through semantic analysis and GPS data mining. In: Proceedings of the 2007 International Conference on Information and Knowledge Engineering, IKE 2007, Las Vegas, Nevada, USA, 25\u201328 June 2007, pp. 251\u2013257 (2007)"},{"key":"19_CR8","doi-asserted-by":"crossref","unstructured":"Monreale, A., Trasarti, R., Renso, C., Pedreschi, D., Bogorny, V.: Preserving privacy in semantic-rich trajectories of human mobility. In: Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS, SPRINGL 2010, San Jose, California, USA, 2 November 2010, pp. 47\u201354 (2010)","DOI":"10.1145\/1868470.1868481"},{"key":"19_CR9","doi-asserted-by":"crossref","unstructured":"Naghizade, E., Kulik, L., Tanin, E.: Protection of sensitive trajectory datasets through spatial and temporal exchange. In: Conference on Scientific and Statistical Database Management, SSDBM 2014, Aalborg, Denmark, 30 June\u201302 July 2014, pp. 40:1\u201340:4 (2014)","DOI":"10.1145\/2618243.2618278"},{"issue":"1","key":"19_CR10","first-page":"47","volume":"2","author":"ME Nergiz","year":"2009","unstructured":"Nergiz, M.E., Atzori, M., Saygin, Y., G\u00fc\u00e7, B.: Towards trajectory anonymization: a generalization-based approach. Trans. Data Priv. 2(1), 47\u201375 (2009)","journal-title":"Trans. Data Priv."}],"container-title":["Lecture Notes in Computer Science","Cloud Computing and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-68542-7_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,11,1]],"date-time":"2017-11-01T15:29:22Z","timestamp":1509550162000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-68542-7_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319685410","9783319685427"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-68542-7_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}