{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:47:41Z","timestamp":1742914061467,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":30,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811575297"},{"type":"electronic","value":"9789811575303"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-981-15-7530-3_2","type":"book-chapter","created":{"date-parts":[[2020,8,13]],"date-time":"2020-08-13T15:50:27Z","timestamp":1597333827000},"page":"17-27","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Novel Location Privacy Protection Scheme with Generative Adversarial Network"],"prefix":"10.1007","author":[{"given":"Wenxi","family":"Wang","sequence":"first","affiliation":[]},{"given":"Weilong","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Zhang","family":"Jin","sequence":"additional","affiliation":[]},{"given":"Keyan","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Runlin","family":"Zou","sequence":"additional","affiliation":[]},{"given":"Chenrong","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Yuan","family":"Tian","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,14]]},"reference":[{"issue":"3","key":"2_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1108\/LHTN-08-2018-0049","volume":"36","author":"A Siddieq","year":"2019","unstructured":"Siddieq., A., Nurhaida., I.: Mobile application of BTS tower search build upon location based service (LBS). Library Hi Tech News 36(3), 1\u20136 (2019)","journal-title":"Library Hi Tech News"},{"issue":"2","key":"2_CR2","first-page":"123","volume":"3","author":"ML Damiani","year":"2010","unstructured":"Damiani., M.L., Bertino., E., Silvestri., C.: The PROBE framework for the personalized cloaking of private locations. Trans. Data Priv. 3(2), 123\u2013148 (2010)","journal-title":"Trans. Data Priv."},{"key":"2_CR3","doi-asserted-by":"publisher","first-page":"786","DOI":"10.1016\/j.aap.2006.02.005","volume":"38","author":"T Kapoor","year":"2006","unstructured":"Kapoor., T., Altenhof., W., Wang., Q., Howard., A.: Injury potential of a three-year-old hybrid III dummy in forward and rearward facing positions under CMVSS 208 testing conditions. Accid. Anal. Prev. 38, 786\u2013800 (2006)","journal-title":"Accid. Anal. Prev."},{"key":"2_CR4","doi-asserted-by":"publisher","unstructured":"Zhou, C.L., MA, C.G., Yang, S.T.: Location privacy-preserving method for LBS continuous\u00a0KNN query in road networks. J. Comput. Res. Dev. 52(11), 2628\u20132644 (2015).\u00a0\nhttps:\/\/doi.org\/10.7544\/issn1000-1239.2015.20140532","DOI":"10.7544\/issn1000-1239.2015.20140532"},{"key":"2_CR5","doi-asserted-by":"publisher","unstructured":"Lu, R., Lin, X., Luan, TH., et al. Pseudonym changing at social spots: an effective strategy for location privacy in VANETs. IEEE Trans. Veh. Technol. 61(1), 86\u20139 (2012). \nhttps:\/\/doi.org\/10.1109\/tvt.2011.2162864","DOI":"10.1109\/tvt.2011.2162864"},{"issue":"1","key":"2_CR6","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1109\/JSYST.2014.2354235","volume":"11","author":"T Peng","year":"2014","unstructured":"Peng., T., Liu., Q., Wang., G.: Enhanced location privacy preserving scheme in location-based services. IEEE Syst. J. 11(1), 219\u2013230 (2014)","journal-title":"IEEE Syst. J."},{"key":"2_CR7","doi-asserted-by":"crossref","unstructured":"Liao, D., Huang, X., Anand, V., Sun, G., Yu, H.: k-DLCA: An efficient approach for location privacy preservation in location-based services. In: 2016 IEEE International Conference on Communications (ICC), pp. 1\u20136, May 2016","DOI":"10.1109\/ICC.2016.7510687"},{"key":"2_CR8","unstructured":"Arjovsky, M., Chintala, S., Bottou, L.: Wasserstein GAN. arXiv preprint \narXiv:1701.07875\n\n (2017)"},{"key":"2_CR9","unstructured":"Qi, G.J.: Loss-sensitive generative adversarial networks on Lipschitz densities. arXiv preprint \narXiv:1701.06264\n\n (2017)"},{"key":"2_CR10","unstructured":"Radford, A., Metz, L., Chintala, S.: Unsupervised representation learning with deep convolutional generative adversarial networks. arXiv preprint \narXiv:1511.06434\n\n (2015)"},{"key":"2_CR11","unstructured":"Mirza, M., Osindero, S., Conditional generative adversarial nets. arXiv preprint \narXiv:1411.1784\n\n (2014)"},{"key":"2_CR12","doi-asserted-by":"publisher","unstructured":"Rebollo-Monedero, D., Forne, J., Domingo-Ferrer, J.: From t-closeness-like privacy to postrandomization via information theory. IEEE Trans. Knowl. Data Eng. 22(11), 1623\u20131636 (2010). \nhttps:\/\/doi.org\/10.1109\/tkde.2009.190\n\n. ISSN 1041\u20134347","DOI":"10.1109\/tkde.2009.190"},{"key":"2_CR13","unstructured":"Chen, X., Duan, Y., Houthooft, R., Schulman, J., Sutskever, I., Abbeel, P.: Infogan: interpretable representation learning by information maximizing generative adversarial nets. In: Proceedings of the 30th Conference on Neural Information Processing Systems, Barcelona, Spain, NIPS, pp. 2172\u22122180 (2016)"},{"key":"2_CR14","unstructured":"Ioffe, S., Szegedy, C.: Batch normalization: accelerating deep network training by reducing internal covariate shift. In: Proceedings of the 32nd International Conference on Machine Learning, Lille, France, pp. 448\u2212456. PMLR (2015)"},{"key":"2_CR15","unstructured":"Salimans, T., Kingma, D.P.: Weight normalization: a simple reparameterization to accelerate training of deep neural networks. In: Proceedings of the 30th Conference on Neural Information Processing Systems, NIPS, Barcelona, Spain, pp. 901\u2212909 (2016)"},{"key":"2_CR16","unstructured":"Miyato, T., Kataoka, T., Koyama, M., Yoshida, Y.: Spectral normalization for generative adversarial networks. arXiv preprint \narXiv:1802.05957\n\n (2018)"},{"key":"2_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-45014-9_1","volume-title":"Multiple Classifier Systems","author":"TG Dietterich","year":"2000","unstructured":"Dietterich., T.G.: Ensemble methods in machine learning. In: Kittler., J., Roli., F. (eds.) MCS 2000. LNCS, vol. 1857, pp. 1\u201315. Springer, Heidelberg (2000). \nhttps:\/\/doi.org\/10.1007\/3-540-45014-9_1"},{"issue":"1","key":"2_CR18","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1016\/S0004-3702(02)00190-X","volume":"137","author":"ZH Zhou","year":"2002","unstructured":"Zhou., Z.H., Wu., J.X., Tang., W.: Ensembling neural networks: many could be better than all. Artif. Intell. 137(1), 239\u2013263 (2002)","journal-title":"Artif. Intell."},{"key":"2_CR19","unstructured":"Tolstikhin, I., Gelly, S., Bousquet, O., Simon-Gabriel, C.J., Sch\u00a8olkopf, B.: AdaGAN: boosting generative models. arXiv preprint \narXiv:1701.02386\n\n (2017)"},{"key":"2_CR20","unstructured":"Denton, E., Chintala, S., Szlam, A., Fergus, R.: Deep generative image models using a Laplacian pyramid of adversarial networks. In: Proceedings of the 29th Annual Conference on Neural Information Processing Systems, Montreal, Canada, pp. 1486\u22121494. Curran Associates, Inc., (2015)"},{"issue":"11","key":"2_CR21","doi-asserted-by":"publisher","first-page":"2278","DOI":"10.1109\/5.726791","volume":"86","author":"Y Lecun","year":"1998","unstructured":"Lecun., Y., Bottou., L., Bengio., Y., Haffner., P.: Gradient-based learning applied to document recognition. Proc. IEEE 86(11), 2278\u20132324 (1998)","journal-title":"Proc. IEEE"},{"key":"2_CR22","unstructured":"Kido, H., Yanagisawa, Y., Satoh, T.: An anonymous communication technique using dummies for location-based services. In: Krumm, J. (ed.) Proceedings of International Conference on Pervasive Services (ICPS 2005), pp. 88\u201397 (2005)"},{"key":"2_CR23","doi-asserted-by":"crossref","unstructured":"Yiu, M.L., Jensen, C.S., Huang, X., Lu, H.: SpaceTwist: managing the trade-offsamong location privacy, query performance, and query accuracy in mobile services. In: Proceedings of IEEE International Conference on Data Engineering (ICDE 2008) (2008)","DOI":"10.1109\/ICDE.2008.4497445"},{"key":"2_CR24","doi-asserted-by":"crossref","unstructured":"Shokri, R., Troncoso, C., Diaz, C., Freudiger, J., Hubaux, J.P.: Unraveling an old cloak: K-anonymity for location privacy. In: Proceedings of ACM Workshop on Privacy in the Electronic Society (2010)","DOI":"10.1145\/1866919.1866936"},{"issue":"6","key":"2_CR25","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1109\/MSP.2012.2205597","volume":"29","author":"G Hinton","year":"2012","unstructured":"Hinton., G., Deng., L., Yu., D., Dahl., G.E., Mohamed., A.R., Jaitly., N., et al.: Deep neural networks for acoustic modeling in speech recognition: the shared views of four research groups. IEEE Signal Process. Mag. 29(6), 82\u201397 (2012)","journal-title":"IEEE Signal Process. Mag."},{"key":"2_CR26","doi-asserted-by":"crossref","unstructured":"Ghinita, G., Kalnis, P., Khoshgozaran, A., et al.: Private queries in location based services: anonymizers are not necessary. In: Proceedings of the 2008 ACM SIGMOD International Conference on Management of Data, New York, pp. 121\u2013132. ACM (2008)","DOI":"10.1145\/1376616.1376631"},{"issue":"2","key":"2_CR27","doi-asserted-by":"publisher","first-page":"8:1","DOI":"10.1145\/2910580","volume":"2","author":"G Ghinita","year":"2016","unstructured":"Ghinita., G., Damiani., M.L., Silvestri., C., Bertino., E.: Protecting against velocity-based, proximity-based, and external event attacks in locationcentric social networks. ACM Trans. Spatial Algorithms Syst. 2(2), 8:1\u20138:36 (2016)","journal-title":"ACM Trans. Spatial Algorithms Syst."},{"key":"2_CR28","unstructured":"Goodfellow, I.: Generative adversarial nets. In: Proceedings of the 2014 Conference on Advances in Neural Information Processing Systems 27. Montreal, Canada, pp. 2672\u22122680. Curran Associates, Inc., (2014)"},{"issue":"1","key":"2_CR29","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1561\/2200000006","volume":"2","author":"Y Bengio","year":"2009","unstructured":"Bengio., Y.: Learning deep architectures for AI. Found. Trends Mach. Learni. 2(1), 1\u2013127 (2009)","journal-title":"Found. Trends Mach. Learni."},{"key":"2_CR30","doi-asserted-by":"crossref","unstructured":"Liccardi, I., Abdul-Rahman, A., Chen, M.: I know where you live: inferring details of people\u2019s lives by visualizing publicly shared location data. In: Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, pp. 1\u201312. ACM (2016)","DOI":"10.1145\/2858036.2858272"}],"container-title":["Communications in Computer and Information Science","Big Data and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-7530-3_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,13]],"date-time":"2020-08-13T15:51:59Z","timestamp":1597333919000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-15-7530-3_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9789811575297","9789811575303"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-7530-3_2","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"14 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICBDS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Big Data and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nanjing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 December 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 December 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icbds2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2019.icbds.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"OJS\/PKP","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"251","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"37","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"12","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"15% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}