{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T18:24:29Z","timestamp":1770229469066,"version":"3.49.0"},"publisher-location":"Singapore","reference-count":12,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819698714","type":"print"},{"value":"9789819698721","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-9872-1_39","type":"book-chapter","created":{"date-parts":[[2025,7,23]],"date-time":"2025-07-23T14:34:37Z","timestamp":1753281277000},"page":"470-481","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Research on Synthetic Trajectory Data Publication Resisting Location Inference Attacks Based on Differential Privacy"],"prefix":"10.1007","author":[{"given":"Wanqing","family":"Wu","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Zhican","family":"Zhang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2025,7,24]]},"reference":[{"key":"39_CR1","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1016\/j.compenvurbsys.2017.05.004","volume":"65","author":"G Boeing","year":"2017","unstructured":"Boeing, G.: Osmnx: new methods for acquiring, constructing, analyzing, and visualizing complex street networks. Comput. Environ. Urban Syst. 65, 126\u2013139 (2017)","journal-title":"Comput. Environ. Urban Syst."},{"issue":"15","key":"39_CR2","doi-asserted-by":"publisher","first-page":"3784","DOI":"10.1109\/JIOT.2023.3262964","volume":"10","author":"X Du","year":"2023","unstructured":"Du, X., Zhu, H., Zheng, Y., et al.: A semantic-preserving scheme to trajectory synthesis using differential privacy. IEEE Internet Things J. 10(15), 3784\u201313797 (2023)","journal-title":"IEEE Internet Things J."},{"key":"39_CR3","doi-asserted-by":"crossref","unstructured":"Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. In: Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4\u20137, 2006. Proceedings 3. pp. 265\u2013284. Springer (2006)","DOI":"10.1007\/11681878_14"},{"key":"39_CR4","doi-asserted-by":"crossref","unstructured":"Dwork, C., Roth, A., et al.: The algorithmic foundations of differential privacy. Foundations and Trends\u00ae in Theoretical Computer Science 9(3\u20134), 211\u2013407 (2014)","DOI":"10.1561\/0400000042"},{"issue":"4","key":"39_CR5","doi-asserted-by":"publisher","first-page":"2611","DOI":"10.1109\/JIOT.2019.2943719","volume":"7","author":"S Ghane","year":"2019","unstructured":"Ghane, S., Kulik, L., Ramamohanarao, K.: Tgm: a generative mechanism for publishing trajectories with differential privacy. IEEE Internet Things J. 7(4), 2611\u20132621 (2019)","journal-title":"IEEE Internet Things J."},{"key":"39_CR6","doi-asserted-by":"publisher","first-page":"202","DOI":"10.1007\/s40534-015-0079-x","volume":"23","author":"L Gong","year":"2015","unstructured":"Gong, L., Sato, H., Yamamoto, T., et al.: Identification of activity stop locations in GPS trajectories by density-based clustering method combined with support vector machines. Journal of Modern Transportation 23, 202\u2013213 (2015)","journal-title":"Journal of Modern Transportation"},{"issue":"10","key":"39_CR7","doi-asserted-by":"publisher","first-page":"2315","DOI":"10.1109\/TMC.2018.2874008","volume":"18","author":"M Gursoy","year":"2018","unstructured":"Gursoy, M., Liu, L., Truex, S., et al.: Differentially private and utility preserving publication of trajectory data. IEEE Trans. Mob. Comput. 18(10), 2315\u20132329 (2018)","journal-title":"IEEE Trans. Mob. Comput."},{"key":"39_CR8","doi-asserted-by":"crossref","unstructured":"Gursoy, M., Liu, L., Truex, S., et al.: Utility-aware synthesis of differentially private and attack-resilient location traces. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp. 196\u2013211 (2018)","DOI":"10.1145\/3243734.3243741"},{"issue":"11","key":"39_CR9","doi-asserted-by":"publisher","first-page":"1154","DOI":"10.14778\/2809974.2809978","volume":"8","author":"X He","year":"2015","unstructured":"He, X., Cormode, G., Machanavajjhala, A., et al.: Dpt: differentially private trajectory synthesis using hierarchical reference systems. Proceedings of the VLDB Endowment 8(11), 1154\u20131165 (2015)","journal-title":"Proceedings of the VLDB Endowment"},{"issue":"1","key":"39_CR10","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1109\/TKDE.2023.3288154","volume":"36","author":"X Sun","year":"2023","unstructured":"Sun, X., Ye, Q., Hu, H., et al.: Puts: privacy-preserving and utility-enhancing framework for trajectory synthesization. IEEE Trans. Knowl. Data Eng. 36(1), 296\u2013310 (2023)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"3","key":"39_CR11","doi-asserted-by":"publisher","first-page":"2433","DOI":"10.1109\/TDSC.2022.3184279","volume":"20","author":"W Tong","year":"2022","unstructured":"Tong, W., Tong, Y., Xia, C., et al.: Understanding location privacy of the point-of-interest aggregate data via practical attacks and defenses. IEEE Trans. Dependable Secure Comput. 20(3), 2433\u20132449 (2022)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"39_CR12","doi-asserted-by":"crossref","unstructured":"Wu, L., Qin, C., Xu, Z., et al.: Tcpp: achieving privacy-preserving trajectory correlation with differential privacy. IEEE Transactions on Information Forensics and Security (2023)","DOI":"10.1109\/TIFS.2023.3290486"}],"container-title":["Lecture Notes in Computer Science","Advanced Intelligent Computing Technology and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-9872-1_39","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T06:23:39Z","timestamp":1770186219000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-9872-1_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819698714","9789819698721"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-9872-1_39","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"24 July 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICIC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ningbo","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 July 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 July 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icic2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.ic-icc.cn\/icg\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}