{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T06:55:23Z","timestamp":1725951323502},"publisher-location":"Singapore","reference-count":17,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811081224"},{"type":"electronic","value":"9789811081231"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-981-10-8123-1_19","type":"book-chapter","created":{"date-parts":[[2018,2,23]],"date-time":"2018-02-23T09:11:46Z","timestamp":1519377106000},"page":"211-221","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Segment Clustering Based Privacy Preserving Algorithm for Trajectory Data Publishing"],"prefix":"10.1007","author":[{"given":"Li","family":"Fengyun","sequence":"first","affiliation":[]},{"given":"Xue","family":"Junchao","sequence":"additional","affiliation":[]},{"given":"Sun","family":"Dawei","sequence":"additional","affiliation":[]},{"given":"Gao","family":"Yanfang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,2,24]]},"reference":[{"issue":"9","key":"19_CR1","first-page":"46","volume":"37","author":"L Zhang","year":"2016","unstructured":"Zhang, L., Liu, Y., Wang, R.C.: Location publishing technology based on differential privacy-preserving for big data services. Chin. J. Commun. 37(9), 46\u201354 (2016)","journal-title":"Chin. J. Commun."},{"key":"19_CR2","doi-asserted-by":"crossref","unstructured":"Zhang, L., Cormode, G., Procopiuc, C.M., Srivastava, D.: PrivBayes: private data release via Bayesian networks. In: ACM SIGMOD International Conference on Management of Data, pp. 1423\u20131434. ACM Press, Snowbird (2014)","DOI":"10.1145\/2588555.2588573"},{"key":"19_CR3","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1016\/j.knosys.2015.11.007","volume":"94","author":"GK Elahe","year":"2016","unstructured":"Elahe, G.K., Mahdi, A., Fatemeh, D.: PPTD: preserving personalized privacy in trajectory data publishing by sensitive attribute generalization and trajectory local suppression. Knowl. Based Syst. 94, 43\u201359 (2016)","journal-title":"Knowl. Based Syst."},{"issue":"115","key":"19_CR4","first-page":"1","volume":"40","author":"Z Huo","year":"2017","unstructured":"Huo, Z., Meng, X.F.: A trajectory data publication method under differential privacy. Chin. J. Comput. 40(115), 1\u20139 (2017)","journal-title":"Chin. J. Comput."},{"key":"19_CR5","doi-asserted-by":"crossref","unstructured":"Chen, R., Xiao, Q., Zhang, Y.: Differentially private high-dimensional data publication via sampling-based inference. In: 21th ACM SIGKDD Conference on Knowledge Discovery and Data Mining (SIGKDD), pp. 129\u2013138. ACM Press, Sydney (2015)","DOI":"10.1145\/2783258.2783379"},{"key":"19_CR6","doi-asserted-by":"crossref","unstructured":"Gidofalvi, G., Huang, X., Pedersen, T.B: Privacy-preserving data mining on moving object trajectories. In: International Conference on Mobile Data Management, pp. 60\u201368. IEEE Press, Mannheim (2007)","DOI":"10.1109\/MDM.2007.18"},{"key":"19_CR7","doi-asserted-by":"crossref","unstructured":"Yarovoy, R., Bonchi, F., Lakshmanan, L.V.S.: Anonymizing moving objects: how to hide a MOB in a crowd. In: 12th International Conference on Extending Database Technology, pp. 72\u201383. ACM Press, Saint Petersburg (2009)","DOI":"10.1145\/1516360.1516370"},{"issue":"8","key":"19_CR8","doi-asserted-by":"crossref","first-page":"1089","DOI":"10.1109\/TMC.2010.62","volume":"9","author":"B Hoh","year":"2010","unstructured":"Hoh, B., Gruteser, M., Xiong, H.: Achieving guaranteed anonymity in GPS traces via uncertainty-aware path cloaking. IEEE Trans. Mob. Comput. 9(8), 1089\u20131107 (2010)","journal-title":"IEEE Trans. Mob. Comput."},{"issue":"8","key":"19_CR9","doi-asserted-by":"crossref","first-page":"884","DOI":"10.1016\/j.is.2010.05.003","volume":"35","author":"O Abul","year":"2010","unstructured":"Abul, O., Bonchi, F., Nanni, M.: Anonymization of moving objects databases by clustering and perturbation. Inf. Syst. 35(8), 884\u2013910 (2010)","journal-title":"Inf. Syst."},{"issue":"5","key":"19_CR10","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 10(5), 557\u2013570 (2002)","journal-title":"Int. J. Uncertain. Fuzziness Knowl. Based Syst."},{"key":"19_CR11","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1016\/j.jnca.2015.01.008","volume":"53","author":"S Arunkumar","year":"2015","unstructured":"Arunkumar, S., Srivatsa, M., Rajarajan, M.: A review paper on preserving privacy in mobile environments. J. Netw. Comput. Appl. 53, 74\u201390 (2015)","journal-title":"J. Netw. Comput. Appl."},{"key":"19_CR12","doi-asserted-by":"crossref","unstructured":"Abul, O., Bonchim, F., Nanni, M.: Never walk alone: uncertainty for anonymity in moving objects databases. In: 24th IEEE International Conference on Data Engineering (ICDE 2008), pp. 376\u2013385. IEEE Press, Cancun (2008)","DOI":"10.1109\/ICDE.2008.4497446"},{"key":"19_CR13","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1016\/j.datak.2014.09.004","volume":"94","author":"AH Khalil","year":"2014","unstructured":"Khalil, A.H., Benjamin, C.M.F., William, K.C.: Privacy-preserving trajectory stream publishing. Data Knowl. Eng. 94, 89\u2013109 (2014)","journal-title":"Data Knowl. Eng."},{"key":"19_CR14","doi-asserted-by":"crossref","unstructured":"Nergiz, M.E., Atzori, M., Saygin, Y.: Towards trajectory anonymization: a generalization-based approach. In: SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS, pp. 52\u201361. ACM Press, Irvine (2008)","DOI":"10.1145\/1503402.1503413"},{"key":"19_CR15","doi-asserted-by":"crossref","first-page":"20","DOI":"10.7551\/mitpress\/1114.001.0001","volume-title":"Advances in Minimum Description Length: Theory and Applications","author":"PD Grunwald","year":"2005","unstructured":"Grunwald, P.D., Myung, I.J., Pitt, M.A.: Advances in Minimum Description Length: Theory and Applications, pp. 20\u201328. MIT Press, Cambridge (2005)"},{"key":"19_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1007\/978-3-319-42553-5_31","volume-title":"Big Data Computing and Communications","author":"F Li","year":"2016","unstructured":"Li, F., Gao, F., Yao, L., Pan, Y.: Privacy preserving in the publication of large-scale trajectory databases. In: Wang, Y., Yu, G., Zhang, Y., Han, Z., Wang, G. (eds.) BigCom 2016. LNCS, vol. 9784, pp. 367\u2013376. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-42553-5_31"},{"issue":"2","key":"19_CR17","first-page":"19","volume":"26","author":"T Brinkhoff","year":"2003","unstructured":"Brinkhoff, T.: Generating traffic data. IEEE Data Eng. Bull. 26(2), 19\u201325 (2003)","journal-title":"IEEE Data Eng. Bull."}],"container-title":["Communications in Computer and Information Science","Wireless Sensor Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-8123-1_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,11]],"date-time":"2019-10-11T17:38:29Z","timestamp":1570815509000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-8123-1_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9789811081224","9789811081231"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-8123-1_19","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2018]]}}}