{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T23:35:54Z","timestamp":1743032154766,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":29,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811591280"},{"type":"electronic","value":"9789811591297"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-981-15-9129-7_12","type":"book-chapter","created":{"date-parts":[[2020,10,21]],"date-time":"2020-10-21T23:07:29Z","timestamp":1603321649000},"page":"161-175","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Personalized Preservation Mechanism Satisfying Local Differential Privacy in Location-Based Services"],"prefix":"10.1007","author":[{"given":"Datong","family":"Wu","sequence":"first","affiliation":[]},{"given":"Xiaotong","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Jiaquan","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Genlin","family":"Ji","sequence":"additional","affiliation":[]},{"given":"Xiaolong","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Lianyong","family":"Qi","sequence":"additional","affiliation":[]},{"given":"Wanchun","family":"Dou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,22]]},"reference":[{"key":"12_CR1","doi-asserted-by":"crossref","unstructured":"Chen, R., Li, H., Qin, A.K., Kasiviswanathan, S.P., Jin, H.: Private spatial data aggregation in the local setting. In: Proceedings of 32nd IEEE International Conference on Data Engineering, ICDE, pp. 289\u2013300. IEEE (2016)","DOI":"10.1109\/ICDE.2016.7498248"},{"key":"12_CR2","doi-asserted-by":"crossref","unstructured":"Cormode, G., Kulkarni, T., Srivastava, D.: Marginal release under local differential privacy. In: Proceedings of the 2018 International Conference on Management of Data, SIGMOD, pp. 131\u2013146. ACM (2018)","DOI":"10.1145\/3183713.3196906"},{"issue":"2","key":"12_CR3","doi-asserted-by":"publisher","first-page":"272","DOI":"10.1007\/s11390-019-1910-3","volume":"34","author":"L Cui","year":"2019","unstructured":"Cui, L., Qu, Y., Nosouhi, M.R., Yu, S., Niu, J., Xie, G.: Improving data utility through game theory in personalized differential privacy. J. Comput. Sci. Technol. 34(2), 272\u2013286 (2019)","journal-title":"J. Comput. Sci. Technol."},{"key":"12_CR4","unstructured":"Ding, B., Kulkarni, J., Yekhanin, S.: Collecting telemetry data privately. In: Proceedings of Advances in Neural Information Processing Systems, pp. 3571\u20133580 (2017)"},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"Duchi, J.C., Jordan, M.I., Wainwright, M.J.: Local privacy and statistical minimax rates. In: Proceedings of 54th Annual IEEE Symposium on Foundations of Computer Science, FOCS, pp. 429\u2013438. IEEE (2013)","DOI":"10.1109\/FOCS.2013.53"},{"key":"12_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-79228-4_1","volume-title":"Theory and Applications of Models of Computation","author":"C Dwork","year":"2008","unstructured":"Dwork, C.: Differential privacy: a survey of results. In: Agrawal, M., Du, D., Duan, Z., Li, A. (eds.) TAMC 2008. LNCS, vol. 4978, pp. 1\u201319. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-79228-4_1"},{"key":"12_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1007\/978-3-642-03168-7_13","volume-title":"Privacy Enhancing Technologies","author":"J Freudiger","year":"2009","unstructured":"Freudiger, J., Shokri, R., Hubaux, J.-P.: On the optimal placement of mix zones. In: Goldberg, I., Atallah, M.J. (eds.) PETS 2009. LNCS, vol. 5672, pp. 216\u2013234. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-03168-7_13"},{"issue":"1","key":"12_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TMC.2007.1062","volume":"7","author":"B Gedik","year":"2008","unstructured":"Gedik, B., Liu, L.: Protecting location privacy with personalized k-anonymity: architecture and algorithms. IEEE Trans. Mob. Comput. 7(1), 1\u201318 (2008)","journal-title":"IEEE Trans. Mob. Comput."},{"key":"12_CR9","doi-asserted-by":"publisher","unstructured":"Gu, B.S., Gao, L., Wang, X., Qu, Y., Jin, J., Yu, S.: Privacy on the edge: customizable privacy-preserving context sharing in hierarchical edge computing. IEEE Trans. Netw. Sci. Eng. (2019, in press). https:\/\/doi.org\/10.1109\/TNSE.2019.2933639","DOI":"10.1109\/TNSE.2019.2933639"},{"key":"12_CR10","unstructured":"Kairouz, P., Oh, S., Viswanath, P.: Extremal mechanisms for local differential privacy. In: Proceedings of Annual Conference on Neural Information Processing Systems, pp. 2879\u20132887 (2014)"},{"key":"12_CR11","first-page":"17:1","volume":"17","author":"P Kairouz","year":"2016","unstructured":"Kairouz, P., Oh, S., Viswanath, P.: Extremal mechanisms for local differential privacy. J. Mach. Learn. Res. 17, 17:1\u201317:51 (2016)","journal-title":"J. Mach. Learn. Res."},{"key":"12_CR12","unstructured":"Microsoft: GPS trajectory dataset of Geolife project. https:\/\/www.microsoft.com\/en-us\/download\/details.aspx?id=52367"},{"key":"12_CR13","doi-asserted-by":"crossref","unstructured":"Qardaji, W.H., Yang, W., Li, N.: Differentially private grids for geospatial data. In: Proceedings of 29th International Conference on Data Engineering, ICDE, pp. 757\u2013768. IEEE (2013)","DOI":"10.1109\/ICDE.2013.6544872"},{"key":"12_CR14","doi-asserted-by":"crossref","unstructured":"Qin, Z., Yang, Y., Yu, T., Khalil, I., Xiao, X., Ren, K.: Heavy hitter estimation over set-valued data with local differential privacy. In: Proceedings of the 2016 SIGSAC Conference on Computer and Communications Security, CCS, pp. 192\u2013203. ACM (2016)","DOI":"10.1145\/2976749.2978409"},{"key":"12_CR15","doi-asserted-by":"crossref","unstructured":"Qin, Z., Yu, T., Yang, Y., Khalil, I., Xiao, X., Ren, K.: Generating synthetic decentralized social graphs with local differential privacy. In: Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, CCS, pp. 425\u2013438. ACM (2017)","DOI":"10.1145\/3133956.3134086"},{"issue":"3","key":"12_CR16","doi-asserted-by":"publisher","first-page":"773","DOI":"10.1109\/TCSS.2018.2861775","volume":"5","author":"Y Qu","year":"2018","unstructured":"Qu, Y., Yu, S., Gao, L., Zhou, W., Peng, S.: A hybrid privacy protection scheme in cyber-physical social networks. IEEE Trans. Comput. Soc. Syst. 5(3), 773\u2013784 (2018)","journal-title":"IEEE Trans. Comput. Soc. Syst."},{"issue":"6","key":"12_CR17","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1109\/MWC.2017.1800112","volume":"25","author":"Y Qu","year":"2018","unstructured":"Qu, Y., Yu, S., Zhou, W., Peng, S., Wang, G., Xiao, K.: Privacy of things: emerging challenges and opportunities in wireless internet of things. IEEE Wirel. Commun. 25(6), 91\u201397 (2018)","journal-title":"IEEE Wirel. Commun."},{"key":"12_CR18","doi-asserted-by":"publisher","unstructured":"Qu, Y., Yu, S., Zhou, W., Tian, Y.: GAN-driven personalized spatial-temporal private data sharing in cyber-physical social systems. IEEE Trans. Netw. Sci. Eng. (2020, in press). https:\/\/doi.org\/10.1109\/TNSE.2020.3001061","DOI":"10.1109\/TNSE.2020.3001061"},{"key":"12_CR19","unstructured":"Wang, T., Blocki, J., Li, N., Jha, S.: Locally differentially private protocols for frequency estimation. In: Proceedings of 26th USENIX Security Symposium, pp. 729\u2013745. USENIX (2017)"},{"issue":"309","key":"12_CR20","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1080\/01621459.1965.10480775","volume":"60","author":"SL Warner","year":"1965","unstructured":"Warner, S.L.: Randomized response: a survey technique for eliminating evasive answer bias. J. Am. Stat. Assoc. 60(309), 63\u201369 (1965)","journal-title":"J. Am. Stat. Assoc."},{"key":"12_CR21","doi-asserted-by":"crossref","unstructured":"Wu, X., Li, S., Yang, J., Dou, W.: A cost sharing mechanism for location privacy preservation in big trajectory data. In: Proceedings of International Conference on Communications, ICC, pp. 1\u20136. IEEE (2017)","DOI":"10.1109\/ICC.2017.7997368"},{"key":"12_CR22","doi-asserted-by":"publisher","unstructured":"Wu, X., Wu, T., Khan, M., Ni, Q., Dou, W.: Game theory based correlated privacy preserving analysis in big data. IEEE Trans. Big Data 1 (2017, in press). https:\/\/doi.org\/10.1109\/TBDATA.2017.2701817","DOI":"10.1109\/TBDATA.2017.2701817"},{"key":"12_CR23","doi-asserted-by":"crossref","unstructured":"Xiong, X., Liu, S., Li, D., Wang, J., Niu, X.: Locally differentially private continuous location sharing with randomized response. IJDSN 15(8), 1\u201313 (2019)","DOI":"10.1177\/1550147719870379"},{"key":"12_CR24","doi-asserted-by":"crossref","unstructured":"Xu, X., He, C., Xu, Z., Qi, L., Wan, S., Bhuiyan, Z.A.: Joint optimization of offloading utility and privacy for edge computing enabled IoT. IEEE Internet Things J. 7(4), 2622\u20132629 (2019)","DOI":"10.1109\/JIOT.2019.2944007"},{"issue":"6","key":"12_CR25","doi-asserted-by":"publisher","first-page":"1407","DOI":"10.1109\/TCSS.2019.2909137","volume":"6","author":"X Xu","year":"2019","unstructured":"Xu, X., Liu, Q., Zhang, X., Zhang, J., Qi, L., Dou, W.: A blockchain-powered crowdsourcing method with privacy preservation in mobile environment. IEEE Trans. Comput. Soc. Syst. 6(6), 1407\u20131419 (2019)","journal-title":"IEEE Trans. Comput. Soc. Syst."},{"key":"12_CR26","doi-asserted-by":"crossref","unstructured":"Xu, X., Liu, X., Xu, Z., Dai, F., Zhang, X., Qi, L.: Trust-oriented IoT service placement for smart cities in edge computing. IEEE Internet Things J. 7(5), 4084\u20134091 (2019)","DOI":"10.1109\/JIOT.2019.2959124"},{"key":"12_CR27","doi-asserted-by":"publisher","first-page":"2751","DOI":"10.1109\/ACCESS.2016.2577036","volume":"4","author":"S Yu","year":"2016","unstructured":"Yu, S.: Big privacy: challenges and opportunities of privacy study in the age of big data. IEEE Access 4, 2751\u20132763 (2016)","journal-title":"IEEE Access"},{"key":"12_CR28","doi-asserted-by":"publisher","first-page":"31435","DOI":"10.1109\/ACCESS.2019.2899099","volume":"7","author":"X Zhao","year":"2019","unstructured":"Zhao, X., Li, Y., Yuan, Y., Bi, X., Wang, G.: Ldpart: effective location-record data publication via local differential privacy. IEEE Access 7, 31435\u201331445 (2019)","journal-title":"IEEE Access"},{"key":"12_CR29","doi-asserted-by":"publisher","unstructured":"Zhou, C., Fu, A., Yu, S., Yang, W., Wang, H., Zhang, Y.: Privacy-preserving federated learning in fog computing. IEEE Internet Things J. (2020, in press). https:\/\/doi.org\/10.1109\/JIOT.2020.2987958","DOI":"10.1109\/JIOT.2020.2987958"}],"container-title":["Communications in Computer and Information Science","Security and Privacy in Digital Economy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-9129-7_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,25]],"date-time":"2021-04-25T02:24:02Z","timestamp":1619317442000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-15-9129-7_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9789811591280","9789811591297"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-9129-7_12","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"22 October 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SPDE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security and Privacy in Digital Economy","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Quzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 October 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 November 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"spde2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/spde2020.csp.escience.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"132","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"48","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}