{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,17]],"date-time":"2026-01-17T04:57:34Z","timestamp":1768625854214,"version":"3.49.0"},"publisher-location":"Singapore","reference-count":28,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819531813","type":"print"},{"value":"9789819531820","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T00:00:00Z","timestamp":1760486400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T00:00:00Z","timestamp":1760486400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-3182-0_4","type":"book-chapter","created":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T19:19:17Z","timestamp":1760555957000},"page":"57-75","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["PerTrajTree-DP: A Personalized Privacy-Preserving Trajectory Publishing Framework for\u00a0Trustworthy AI Systems"],"prefix":"10.1007","author":[{"given":"Yongxin","family":"Zhao","sequence":"first","affiliation":[]},{"given":"Chundong","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Erkang","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Xiangtian","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Hao","family":"Lin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,15]]},"reference":[{"issue":"1","key":"4_CR1","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1109\/TIFS.2018.2848659","volume":"14","author":"W Zhang","year":"2018","unstructured":"Zhang, W., Li, M., Tandon, R., Li, H.: Online location trace privacy: an information theoretic approach. IEEE Trans. Inf. Forensics Secur. 14(1), 235\u2013250 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"4_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2023.107203","volume":"127","author":"G Lombardo","year":"2024","unstructured":"Lombardo, G., Picone, M., Mamei, M., Mordonini, M., Poggi, A.: Digital twin for continual learning in location based services. Eng. Appl. Artif. Intell. 127, 107203 (2024)","journal-title":"Eng. Appl. Artif. Intell."},{"key":"4_CR3","doi-asserted-by":"crossref","unstructured":"Niu, Y., Zhang, J., Tang, Z., Yan, H., Zhu, M., Li, H.: Privacy-preserving spatiotemporal trajectory generalization publishing scheme with differential privacy. Comput. Secur. 104514 (2025)","DOI":"10.1016\/j.cose.2025.104514"},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"Fan, N., Liu, J., Zhao, S., Dai, Y., Fan, W.: Tlpp: deep learning based two-layer privacy preserving mechanism for protecting vehicle trajectory data. IEEE Internet Things J. (2024)","DOI":"10.1109\/JIOT.2024.3439393"},{"key":"4_CR5","doi-asserted-by":"publisher","unstructured":"Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) Automata, Languages and Programming. ICALP 2006. LNCS, vol. 4052, pp. 1\u201312. Springer, Berlin, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11787006_1","DOI":"10.1007\/11787006_1"},{"issue":"4","key":"4_CR6","doi-asserted-by":"publisher","first-page":"2868","DOI":"10.1109\/TII.2021.3116529","volume":"18","author":"Z Yang","year":"2021","unstructured":"Yang, Z., Wang, R., Wu, D., Wang, H., Song, H., Ma, X.: Local trajectory privacy protection in 5g enabled industrial intelligent logistics. IEEE Trans. Ind. Inf. 18(4), 2868\u20132876 (2021)","journal-title":"IEEE Trans. Ind. Inf."},{"key":"4_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.103922","volume":"144","author":"Y Zhao","year":"2024","unstructured":"Zhao, Y., Wang, C.: Protecting privacy and enhancing utility: a novel approach for personalized trajectory data publishing using noisy prefix tree. Comput. Secur. 144, 103922 (2024)","journal-title":"Comput. Secur."},{"key":"4_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.115215","volume":"182","author":"S Yuan","year":"2021","unstructured":"Yuan, S., Pi, D., Zhao, X., Xu, M.: Differential privacy trajectory data protection scheme based on r-tree. Expert Syst. Appl. 182, 115215 (2021)","journal-title":"Expert Syst. Appl."},{"key":"4_CR9","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2020.105940","volume":"198","author":"X Zhao","year":"2020","unstructured":"Zhao, X., Pi, D., Chen, J.: Novel trajectory privacy-preserving method based on prefix tree using differential privacy. Knowl.-Based Syst. 198, 105940 (2020)","journal-title":"Knowl.-Based Syst."},{"key":"4_CR10","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1016\/j.neucom.2021.04.137","volume":"472","author":"W Cheng","year":"2022","unstructured":"Cheng, W., Wen, R., Huang, H., Miao, W., Wang, C.: Optdp: towards optimal personalized trajectory differential privacy for trajectory data publishing. Neurocomputing 472, 201\u2013211 (2022)","journal-title":"Neurocomputing"},{"key":"4_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2020.101526","volume":"92","author":"N Niknami","year":"2020","unstructured":"Niknami, N., Abadi, M., Deldar, F.: A fully spatial personalized differentially private mechanism to provide non-uniform privacy guarantees for spatial databases. Inf. Syst. 92, 101526 (2020)","journal-title":"Inf. Syst."},{"key":"4_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2024.101074","volume":"25","author":"P Liu","year":"2024","unstructured":"Liu, P., Wu, D., Shen, Z., Wang, H., Liu, K.: Personalized trajectory privacy data publishing scheme based on differential privacy. Internet Things 25, 101074 (2024)","journal-title":"Internet Things"},{"key":"4_CR13","doi-asserted-by":"crossref","unstructured":"Qardaji, W., Yang, W., Li, N.: Differentially private grids for geospatial data. In: 2013 IEEE 29th International Conference on Data Engineering (ICDE), pp. 757\u2013768. IEEE (2013)","DOI":"10.1109\/ICDE.2013.6544872"},{"key":"4_CR14","doi-asserted-by":"crossref","unstructured":"Cormode, G., Procopiuc, C., Srivastava, D., Shen, E., Yu, T.: Differentially private spatial decompositions. In: 2012 IEEE 28th International Conference on Data Engineering, pp. 20\u201331. IEEE (2012)","DOI":"10.1109\/ICDE.2012.16"},{"key":"4_CR15","doi-asserted-by":"crossref","unstructured":"Hua, J., Gao, Y., Zhong, S.: Differentially private publication of general time-serial trajectory data. In: 2015 IEEE Conference on Computer Communications (INFOCOM), pp. 549\u2013557. IEEE (2015)","DOI":"10.1109\/INFOCOM.2015.7218422"},{"key":"4_CR16","doi-asserted-by":"publisher","first-page":"692","DOI":"10.1016\/j.future.2022.12.011","volume":"141","author":"Z Zhang","year":"2023","unstructured":"Zhang, Z., Xu, X., Xiao, F.: Lgan-dp: a novel differential private publication mechanism of trajectory data. Futur. Gener. Comput. Syst. 141, 692\u2013703 (2023)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"4_CR17","doi-asserted-by":"crossref","unstructured":"Hu, Y., et al.: Real-time trajectory synthesis with local differential privacy. In: 2024 IEEE 40th International Conference on Data Engineering (ICDE), pp. 1685\u20131698. IEEE (2024)","DOI":"10.1109\/ICDE60146.2024.00137"},{"key":"4_CR18","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2024.107686","volume":"166","author":"R Zhang","year":"2025","unstructured":"Zhang, R., Ni, W., Fu, N., Hou, L., Zhang, D., Zhang, Y.: Dp-ltgan: differentially private trajectory publishing via locally-aware transformer-based gan. Futur. Gener. Comput. Syst. 166, 107686 (2025)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"4_CR19","unstructured":"Chen, R., Fung, B.C.M., Desai, B.C.: Differentially private trajectory data publication (2011). https:\/\/arxiv.org\/abs\/1112.2020"},{"issue":"8","key":"4_CR20","doi-asserted-by":"publisher","first-page":"3628","DOI":"10.1109\/TII.2017.2773646","volume":"14","author":"C Yin","year":"2017","unstructured":"Yin, C., Xi, J., Sun, R., Wang, J.: Location privacy protection based on differential privacy strategy for big data in industrial internet of things. IEEE Trans. Ind. Inf. 14(8), 3628\u20133636 (2017)","journal-title":"IEEE Trans. Ind. Inf."},{"key":"4_CR21","doi-asserted-by":"publisher","first-page":"875","DOI":"10.1007\/s11280-017-0489-2","volume":"21","author":"Y Dai","year":"2018","unstructured":"Dai, Y., Shao, J., Wei, C., Zhang, D., Shen, H.T.: Personalized semantic trajectory privacy preservation through trajectory reconstruction. World Wide Web 21, 875\u2013914 (2018)","journal-title":"World Wide Web"},{"issue":"1","key":"4_CR22","first-page":"67","volume":"49","author":"K Zuo","year":"2022","unstructured":"Zuo, K., Liu, R., Zhao, J., Shen, Z., Chen, F.: Method for the protection of spatiotemporal correlation location privacy with semantic information. J. Xidian Univ. 49(1), 67\u201377 (2022)","journal-title":"J. Xidian Univ."},{"key":"4_CR23","unstructured":"Wang, T., Blocki, J., Li, N., Jha, S.: Locally differentially private protocols for frequency estimation. In: 26th USENIX Security Symposium (USENIX Security 17), pp. 729\u2013745 (2017)"},{"issue":"10","key":"4_CR24","doi-asserted-by":"publisher","first-page":"2315","DOI":"10.1109\/TMC.2018.2874008","volume":"18","author":"ME Gursoy","year":"2018","unstructured":"Gursoy, M.E., Liu, L., Truex, S., Yu, L.: Differentially private and utility preserving publication of trajectory data. IEEE Trans. Mob. Comput. 18(10), 2315\u20132329 (2018)","journal-title":"IEEE Trans. Mob. Comput."},{"issue":"3","key":"4_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2743025","volume":"6","author":"Y Zheng","year":"2015","unstructured":"Zheng, Y.: Trajectory data mining: an overview. ACM Trans. Intell. Syst. Technol. (TIST) 6(3), 1\u201341 (2015)","journal-title":"ACM Trans. Intell. Syst. Technol. (TIST)"},{"key":"4_CR26","doi-asserted-by":"crossref","unstructured":"Aizawa, A.: An information-theoretic perspective of tf-idf measures. Inf. Process. Manag. 39(1), 45\u201365 (2003)","DOI":"10.1016\/S0306-4573(02)00021-3"},{"key":"4_CR27","doi-asserted-by":"crossref","unstructured":"Andr\u00e9s, M.E., Bordenabe, N.E., Chatzikokolakis, K., Palamidessi, C.: Geo-indistinguishability: differential privacy for location-based systems. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, pp. 901\u2013914 (2013)","DOI":"10.1145\/2508859.2516735"},{"key":"4_CR28","doi-asserted-by":"crossref","unstructured":"Yuan, J., et al.: T-drive: driving directions based on taxi trajectories. In: Proceedings of the 18th SIGSPATIAL International Conference on Advances in Geographic Information Systems, pp. 99\u2013108 (2010)","DOI":"10.1145\/1869790.1869807"}],"container-title":["Lecture Notes in Computer Science","Data Security and Privacy Protection"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-3182-0_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T19:19:21Z","timestamp":1760555961000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-3182-0_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,15]]},"ISBN":["9789819531813","9789819531820"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-3182-0_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,15]]},"assertion":[{"value":"15 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"DSPP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Data Security and Privacy Protection","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Xi'an","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dspp2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/dspp2025.xidian.edu.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}