{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,11]],"date-time":"2026-05-11T10:58:55Z","timestamp":1778497135802,"version":"3.51.4"},"reference-count":57,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T00:00:00Z","timestamp":1750118400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T00:00:00Z","timestamp":1750118400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100001784","name":"Victoria University","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100001784","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Computing"],"published-print":{"date-parts":[[2025,7]]},"abstract":"<jats:title>Abstract<\/jats:title>\n          <jats:p>Trajectory data has grown pervasive, benefiting practical applications, including transportation administration and location-based operations. Nevertheless, trajectories may reveal extremely sensitive information about an individual, including movement patterns, personal profiles, geographical locations, and social contacts, necessitating privacy protection while disseminating trajectory data. Therefore, prioritizing privacy protection is crucial while analyzing trajectory data. Current methods of protecting privacy concentrate on single objective optimizing techniques such as maximizing data utility but often disregard various privacy constraints. To overcome this challenge, this study aims to improve both data privacy and usability by balancing competing goals-maximizing privacy while maintaining useful information-through a Multi-Objective Optimization (MOO) approach in trajectory data publishing. We provide a unique algorithm named Adaptive-Parameter Memetic Algorithm (APMA) that employs a non-dominated sorting multi-objective technique and a Memetic Algorithm (MA). This algorithm utilizes adaptive memory-based mutation and crossover strategies to dynamically adjust the mutation and crossover parameters and improve the solution\u2019s quality. The proposed innovative local search strategy helps to achieve better population diversity and solution quality. Comprehensive studies illustrate the efficacy of the proposed method regarding solution quality and convergence outcomes.<\/jats:p>","DOI":"10.1007\/s00607-025-01504-0","type":"journal-article","created":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T02:54:55Z","timestamp":1750128895000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Adaptive-parameter memetic algorithm for privacy-preserving trajectory data publishing: A multi-objective optimization approach"],"prefix":"10.1007","volume":"107","author":[{"given":"Samsad","family":"Jahan","sequence":"first","affiliation":[]},{"given":"Yong-Feng","family":"Ge","sequence":"additional","affiliation":[]},{"given":"Hua","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Enamul","family":"Kabir","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,17]]},"reference":[{"key":"1504_CR1","doi-asserted-by":"crossref","unstructured":"Abul O, Bonchi F, Nanni M (2008) Never walk alone: Uncertainty for anonymity in moving objects databases. In: 2008 IEEE 24th international conference on data engineering, Ieee, pp 376\u2013385","DOI":"10.1109\/ICDE.2008.4497446"},{"issue":"8","key":"1504_CR2","doi-asserted-by":"publisher","first-page":"884","DOI":"10.1016\/j.is.2010.05.003","volume":"35","author":"O Abul","year":"2010","unstructured":"Abul O, Bonchi F, Nanni M (2010) Anonymization of moving objects databases by clustering and perturbation. Inf Syst 35(8):884\u2013910","journal-title":"Inf Syst"},{"issue":"1","key":"1504_CR3","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1007\/s00607-024-01391-x","volume":"107","author":"Y Assayag","year":"2025","unstructured":"Assayag Y, Souto E, Barreto R et al (2025) Efficient exploration of indoor localization using genetic algorithm and signal propagation model. Computing 107(1):30","journal-title":"Computing"},{"issue":"5","key":"1504_CR4","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1109\/MCC.2018.053711666","volume":"5","author":"M Barhamgi","year":"2018","unstructured":"Barhamgi M, Perera C, Ghedira C et al (2018) User-centric privacy engineering for the internet of things. IEEE Cloud Comput 5(5):47\u201357","journal-title":"IEEE Cloud Comput"},{"key":"1504_CR5","doi-asserted-by":"crossref","unstructured":"Barhamgi M, Huhns MN, Perera C et\u00a0al (2021) Introduction to the special section on human-centered security, privacy, and trust in the internet of things","DOI":"10.1145\/3445790"},{"key":"1504_CR6","doi-asserted-by":"crossref","unstructured":"Barhamgi M, Masmoudi A, Lara-Cabrera R et\u00a0al (2024) Social networks data analysis with semantics: application to the radicalization problem. J Ambient Intell Humaniz Comput pp 1\u201315","DOI":"10.1007\/s12652-018-0968-z"},{"key":"1504_CR7","doi-asserted-by":"crossref","unstructured":"Bindschaedler V, Shokri R (2016) Synthesizing plausible privacy-preserving location traces. In: 2016 IEEE symposium on security and privacy (SP), IEEE, pp 546\u2013563","DOI":"10.1109\/SP.2016.39"},{"issue":"3","key":"1504_CR8","first-page":"1507","volume":"51","author":"H Chen","year":"2019","unstructured":"Chen H, Wu G, Pedrycz W et al (2019) An adaptive resource allocation strategy for objective space partition-based multiobjective optimization. IEEE Trans Syst Man Cybern A Syst 51(3):1507\u20131522","journal-title":"IEEE Trans Syst Man Cybern A Syst"},{"key":"1504_CR9","doi-asserted-by":"crossref","unstructured":"Chiba T, Sei Y, Tahara Y et al (2019) Trajectory anonymization: Balancing usefulness about position information and timestamp. 2019 10th IFIP international conference on new technologies. IEEE, Mobility and Security (NTMS), pp 1\u20136","DOI":"10.1109\/NTMS.2019.8763833"},{"issue":"2","key":"1504_CR10","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1109\/4235.996017","volume":"6","author":"K Deb","year":"2002","unstructured":"Deb K, Pratap A, Agarwal S et al (2002) A fast and elitist multiobjective genetic algorithm: Nsga-ii. IEEE Trans Evol Comput 6(2):182\u2013197","journal-title":"IEEE Trans Evol Comput"},{"key":"1504_CR11","doi-asserted-by":"crossref","unstructured":"Dwork C (2006) Differential privacy. In: International colloquium on automata, languages, and programming, Springer, pp 1\u201312","DOI":"10.1007\/11787006_1"},{"key":"1504_CR12","doi-asserted-by":"publisher","unstructured":"Ge YF, Cao J, Wang H et\u00a0al (2020) Distributed differential evolution for anonymity-driven vertical fragmentation in outsourced data storage. In: Web information systems engineering \u2013 WISE 2020. Springer International Publishing, p 213\u2013226, https:\/\/doi.org\/10.1007\/978-3-030-62008-0_15","DOI":"10.1007\/978-3-030-62008-0_15"},{"key":"1504_CR13","doi-asserted-by":"publisher","first-page":"107325","DOI":"10.1016\/j.knosys.2021.107325","volume":"229","author":"YF Ge","year":"2021","unstructured":"Ge YF, Orlowska M, Cao J et al (2021) Knowledge transfer-based distributed differential evolution for dynamic database fragmentation. Knowl-Based Syst 229:107325. https:\/\/doi.org\/10.1016\/j.knosys.2021.107325","journal-title":"Knowl-Based Syst"},{"key":"1504_CR14","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-021-00718-w","author":"YF Ge","year":"2022","unstructured":"Ge YF, Orlowska M, Cao J et al (2022) MDDE: Multitasking distributed differential evolution for privacy-preserving database fragmentation. VLDB J. https:\/\/doi.org\/10.1007\/s00778-021-00718-w","journal-title":"VLDB J"},{"key":"1504_CR15","doi-asserted-by":"crossref","unstructured":"Ge YF, Wang H, Cao J et\u00a0al (2022b) An information-driven genetic algorithm for privacy-preserving data publishing. In: International conference on web information systems engineering, Springer, pp 340\u2013354","DOI":"10.1007\/978-3-031-20891-1_24"},{"issue":"1","key":"1504_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3613962","volume":"18","author":"YF Ge","year":"2023","unstructured":"Ge YF, Bertino E, Wang H et al (2023) Distributed cooperative coevolution of data publishing privacy and transparency. ACM Trans Knowl Discov Data 18(1):1\u201323","journal-title":"ACM Trans Knowl Discov Data"},{"issue":"4","key":"1504_CR17","doi-asserted-by":"publisher","first-page":"2296","DOI":"10.1109\/TDSC.2023.3302284","volume":"21","author":"YF Ge","year":"2024","unstructured":"Ge YF, Wang H, Bertino E et al (2024) Evolutionary dynamic database partitioning optimization for privacy and utility. IEEE Trans Dependable Secure Comput 21(4):2296\u20132311","journal-title":"IEEE Trans Dependable Secure Comput"},{"issue":"1","key":"1504_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11280-024-01241-y","volume":"27","author":"YF Ge","year":"2024","unstructured":"Ge YF, Wang H, Cao J et al (2024) Privacy-preserving data publishing: An information-driven distributed genetic algorithm. World Wide Web 27(1):1","journal-title":"World Wide Web"},{"key":"1504_CR19","doi-asserted-by":"crossref","unstructured":"Ge YF, Wang H, Cao J et\u00a0al (2024c) Federated genetic algorithm: Two-layer privacy-preserving trajectory data publishing. In: Proceedings of the genetic and evolutionary computation conference, pp 749\u2013758","DOI":"10.1145\/3638529.3654200"},{"key":"1504_CR20","doi-asserted-by":"crossref","unstructured":"Gramaglia M, Fiore M (2015) Hiding mobile traffic fingerprints with glove. In: Proceedings of the 11th ACM conference on emerging networking experiments and technologies, pp 1\u201313","DOI":"10.1145\/2716281.2836111"},{"key":"1504_CR21","doi-asserted-by":"crossref","unstructured":"Gursoy ME, Liu L, Truex S et\u00a0al (2018) Utility-aware synthesis of differentially private and attack-resilient location traces. In: Proceedings of the 2018 ACM SIGSAC conference on computer and communications security, pp 196\u2013211","DOI":"10.1145\/3243734.3243741"},{"issue":"12","key":"1504_CR22","doi-asserted-by":"publisher","first-page":"4109","DOI":"10.1007\/s00607-024-01345-3","volume":"106","author":"SA Haider","year":"2024","unstructured":"Haider SA, Zubairi JA, Idwan S (2024) Mapping and just-in-time traffic congestion mitigation for emergency vehicles in smart cities. Computing 106(12):4109\u20134130","journal-title":"Computing"},{"issue":"11","key":"1504_CR23","doi-asserted-by":"publisher","first-page":"1154","DOI":"10.14778\/2809974.2809978","volume":"8","author":"X He","year":"2015","unstructured":"He X, Cormode G, Machanavajjhala A et al (2015) Dpt: Differentially private trajectory synthesis using hierarchical reference systems. Proc VLDB Endow 8(11):1154\u20131165","journal-title":"Proc VLDB Endow"},{"key":"1504_CR24","doi-asserted-by":"publisher","first-page":"488","DOI":"10.1016\/j.cose.2018.05.001","volume":"77","author":"Z Hu","year":"2018","unstructured":"Hu Z, Yang J, Zhang J (2018) Trajectory privacy protection method based on the time interval divided. Comput Security 77:488\u2013499","journal-title":"Comput Security"},{"key":"1504_CR25","doi-asserted-by":"crossref","unstructured":"Jahan S, Ge YF, Kabir E et\u00a0al (2023) Analysis and protection of public medical dataset: From privacy perspective. In: International conference on health information science, Springer, pp 79\u201390","DOI":"10.1007\/978-981-99-7108-4_7"},{"key":"1504_CR26","doi-asserted-by":"crossref","unstructured":"Jahan S, Ge YF, Wang H et\u00a0al (2024) Dynamic-parameter genetic algorithm for multi-objective privacy-preserving trajectory data publishing. In: International conference on web information systems engineering, Springer, pp 46\u201357","DOI":"10.1007\/978-981-96-0576-7_4"},{"issue":"6","key":"1504_CR27","first-page":"5577","volume":"35","author":"F Jin","year":"2022","unstructured":"Jin F, Hua W, Francia M et al (2022) A survey and experimental study on privacy-preserving trajectory data publishing. IEEE Trans Knowl Data Eng 35(6):5577\u20135596","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"1504_CR28","doi-asserted-by":"crossref","unstructured":"Jin F, Hua W, Ruan B et\u00a0al (2022b) Frequency-based randomization for guaranteeing differential privacy in spatial trajectories. In: 2022 IEEE 38th International conference on data engineering (ICDE), IEEE, pp 1727\u20131739","DOI":"10.1109\/ICDE53745.2022.00175"},{"issue":"2","key":"1504_CR29","doi-asserted-by":"publisher","first-page":"408","DOI":"10.1109\/tcc.2015.2469649","volume":"8","author":"ME Kabir","year":"2020","unstructured":"Kabir ME, Mahmood AN, Wang H et al (2020) Microaggregation sorting framework for k-anonymity statistical disclosure control in cloud computing. IEEE Trans Cloud Comput 8(2):408\u2013417. https:\/\/doi.org\/10.1109\/tcc.2015.2469649","journal-title":"IEEE Trans Cloud Comput"},{"key":"1504_CR30","unstructured":"Kopanaki D, Theodossopoulos V, Pelekis N et\u00a0al (2016) Who cares about others\u2019 privacy: Personalized anonymization of moving object trajectories. In: EDBT, pp 425\u2013436"},{"key":"1504_CR31","doi-asserted-by":"crossref","unstructured":"Li F, Gao F, Yao L et\u00a0al (2016) Privacy preserving in the publication of large-scale trajectory databases. In: Big data computing and communications: Second international conference, BigCom 2016, Shenyang, China, July 29-31, 2016. Proceedings 2, Springer, pp 367\u2013376","DOI":"10.1007\/978-3-319-42553-5_31"},{"key":"1504_CR32","doi-asserted-by":"crossref","unstructured":"Li N, Li T, Venkatasubramanian S (2006) t-closeness: Privacy beyond k-anonymity and l-diversity. In: 2007 IEEE 23rd international conference on data engineering, IEEE, pp 106\u2013115","DOI":"10.1109\/ICDE.2007.367856"},{"key":"1504_CR33","doi-asserted-by":"crossref","unstructured":"Machanavajjhala A, Kifer D, Gehrke J et al (2007) l-diversity: Privacy beyond k-anonymity. ACM Trans Knowl Discov Data (TKDD) 1(1):3\u2013es","DOI":"10.1145\/1217299.1217302"},{"key":"1504_CR34","doi-asserted-by":"crossref","unstructured":"Meyerson A, Williams R (2004) On the complexity of optimal k-anonymity. In: Proceedings of the twenty-third ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems, pp 223\u2013228","DOI":"10.1145\/1055558.1055591"},{"issue":"2","key":"1504_CR35","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/s00607-025-01416-z","volume":"107","author":"F Monte Sousa","year":"2025","unstructured":"Monte Sousa F, Callou G (2025) Analysis of evolutionary multi-objective algorithms for data center electrical systems. Computing 107(2):65","journal-title":"Computing"},{"issue":"6","key":"1504_CR36","first-page":"838","volume":"20","author":"W Sheng","year":"2016","unstructured":"Sheng W, Chen S, Sheng M et al (2016) Adaptive multisubpopulation competition and multiniche crowding-based memetic algorithm for automatic data clustering. IEEE Trans Evol Comput 20(6):838\u2013858","journal-title":"IEEE Trans Evol Comput"},{"issue":"05","key":"1504_CR37","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney L (2002) k-anonymity: A model for protecting privacy. Int J Uncertain Fuzziness Knowledge-Based Syst 10(05):557\u2013570","journal-title":"Int J Uncertain Fuzziness Knowledge-Based Syst"},{"key":"1504_CR38","doi-asserted-by":"crossref","unstructured":"Tachioka Y (2022) Privacy preservation satisfying utility requirements based on multi-objective optimization. In: 2022 joint 12th international conference on soft computing and intelligent systems and 23rd international symposium on advanced intelligent systems (SCIS &ISIS), IEEE, pp 1\u20134","DOI":"10.1109\/SCISISIS55246.2022.10002081"},{"key":"1504_CR39","doi-asserted-by":"publisher","first-page":"54264","DOI":"10.1109\/ACCESS.2021.3071407","volume":"9","author":"C Tian","year":"2021","unstructured":"Tian C, Xu H, Lu T et al (2021) Semantic and trade-off aware location privacy protection in road networks via improved multi-objective particle swarm optimization. IEEE Access 9:54264\u201354275","journal-title":"IEEE Access"},{"issue":"3","key":"1504_CR40","doi-asserted-by":"publisher","first-page":"463","DOI":"10.1145\/1016028.1016030","volume":"29","author":"G Trajcevski","year":"2004","unstructured":"Trajcevski G, Wolfson O, Hinrichs K et al (2004) Managing uncertainty in moving objects databases. ACM Trans Database Syst (TODS) 29(3):463\u2013507","journal-title":"ACM Trans Database Syst (TODS)"},{"issue":"1","key":"1504_CR41","doi-asserted-by":"publisher","first-page":"264","DOI":"10.1109\/tnsm.2018.2877790","volume":"16","author":"Z Tu","year":"2019","unstructured":"Tu Z, Zhao K, Xu F et al (2019) Protecting trajectory from semantic attack considering $$k$$-anonymity, $$l$$-diversity, and $$t$$-closeness. IEEE Trans Netw Serv Manage 16(1):264\u2013278. https:\/\/doi.org\/10.1109\/tnsm.2018.2877790","journal-title":"IEEE Trans Netw Serv Manage"},{"issue":"12","key":"1504_CR42","doi-asserted-by":"publisher","first-page":"8519","DOI":"10.1109\/TII.2022.3165636","volume":"18","author":"GG Wang","year":"2022","unstructured":"Wang GG, Gao D, Pedrycz W (2022) Solving multiobjective fuzzy job-shop scheduling problem by a hybrid adaptive differential evolution algorithm. IEEE Trans Industr Inf 18(12):8519\u20138528","journal-title":"IEEE Trans Industr Inf"},{"key":"1504_CR43","doi-asserted-by":"crossref","unstructured":"Wang H, Zhang Y, Cao J (2006) Ubiquitous computing environments and its usage access control. In: Proceedings of the 1st international conference on Scalable information systems, pp 6\u2013es","DOI":"10.1145\/1146847.1146853"},{"key":"1504_CR44","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1016\/j.ins.2015.05.040","volume":"318","author":"H Wang","year":"2015","unstructured":"Wang H, Jiang X, Kambourakis G (2015) Special issue on security, privacy and trust in network-based big data. Inf Sci 318:48\u201350","journal-title":"Inf Sci"},{"issue":"11","key":"1504_CR45","doi-asserted-by":"publisher","first-page":"4732","DOI":"10.1109\/TSMC.2018.2861879","volume":"50","author":"J Wang","year":"2018","unstructured":"Wang J, Ren W, Zhang Z et al (2018) A hybrid multiobjective memetic algorithm for multiobjective periodic vehicle routing problem with time windows. IEEE Trans Syst Man Cybern A Syst 50(11):4732\u20134745","journal-title":"IEEE Trans Syst Man Cybern A Syst"},{"issue":"3","key":"1504_CR46","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3474839","volume":"13","author":"L Yao","year":"2022","unstructured":"Yao L, Chen Z, Hu H et al (2022) Privacy preservation for trajectory publication based on differential privacy. ACM Trans Intell Syst Technol (TIST) 13(3):1\u201321","journal-title":"ACM Trans Intell Syst Technol (TIST)"},{"issue":"4","key":"1504_CR47","doi-asserted-by":"publisher","first-page":"5593","DOI":"10.1109\/TII.2022.3192027","volume":"19","author":"J Yin","year":"2022","unstructured":"Yin J, Tang M, Cao J et al (2022) Knowledge-driven cybersecurity intelligence: Software vulnerability coexploitation behavior discovery. IEEE Trans Industr Inf 19(4):5593\u20135601","journal-title":"IEEE Trans Industr Inf"},{"issue":"4","key":"1504_CR48","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/s11280-024-01275-2","volume":"27","author":"J Yin","year":"2024","unstructured":"Yin J, Chen G, Hong W et al (2024) A heterogeneous graph-based semi-supervised learning framework for access control decision-making. World Wide Web 27(4):35","journal-title":"World Wide Web"},{"issue":"2","key":"1504_CR49","doi-asserted-by":"publisher","first-page":"827","DOI":"10.1007\/s11280-022-01076-5","volume":"26","author":"M You","year":"2023","unstructured":"You M, Yin J, Wang H et al (2023) A knowledge graph empowered online learning framework for access control decision-making. World Wide Web 26(2):827\u2013848","journal-title":"World Wide Web"},{"issue":"4","key":"1504_CR50","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1007\/s11280-024-01286-z","volume":"27","author":"M You","year":"2024","unstructured":"You M, Ge YF, Wang K et al (2024) Hierarchical adaptive evolution framework for privacy-preserving data publishing. World Wide Web 27(4):49","journal-title":"World Wide Web"},{"key":"1504_CR51","doi-asserted-by":"crossref","unstructured":"Yuan J, Zheng Y, Zhang C et\u00a0al (2010) T-drive: driving directions based on taxi trajectories. In: Proceedings of the 18th SIGSPATIAL international conference on advances in geographic information systems, pp 99\u2013108","DOI":"10.1145\/1869790.1869807"},{"key":"1504_CR52","doi-asserted-by":"crossref","unstructured":"Yuan J, Zheng Y, Xie X et\u00a0al (2011) Driving with knowledge from the physical world. In: Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining, pp 316\u2013324","DOI":"10.1145\/2020408.2020462"},{"key":"1504_CR53","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1016\/j.future.2022.12.027","volume":"142","author":"J Zhang","year":"2023","unstructured":"Zhang J, Huang Q, Huang Y et al (2023) Dp-trajgan: A privacy-aware trajectory generation model with differential privacy. Futur Gener Comput Syst 142:25\u201340","journal-title":"Futur Gener Comput Syst"},{"issue":"6","key":"1504_CR54","doi-asserted-by":"publisher","first-page":"712","DOI":"10.1109\/TEVC.2007.892759","volume":"11","author":"Q Zhang","year":"2007","unstructured":"Zhang Q, Li H (2007) Moea\/d: A multiobjective evolutionary algorithm based on decomposition. IEEE Trans Evol Comput 11(6):712\u2013731","journal-title":"IEEE Trans Evol Comput"},{"issue":"6","key":"1504_CR55","doi-asserted-by":"publisher","first-page":"761","DOI":"10.1109\/TEVC.2014.2378512","volume":"19","author":"X Zhang","year":"2014","unstructured":"Zhang X, Tian Y, Jin Y (2014) A knee point-driven evolutionary algorithm for many-objective optimization. IEEE Trans Evol Comput 19(6):761\u2013776","journal-title":"IEEE Trans Evol Comput"},{"key":"1504_CR56","doi-asserted-by":"crossref","unstructured":"Zhao B, Chen WN, Wei FF, et\u00a0al (2024) Pega: A privacy-preserving genetic algorithm for combinatorial optimization. IEEE Trans Cybern","DOI":"10.1109\/TCYB.2023.3346863"},{"key":"1504_CR57","doi-asserted-by":"publisher","first-page":"2256","DOI":"10.1109\/TIFS.2022.3181855","volume":"17","author":"Z Zheng","year":"2022","unstructured":"Zheng Z, Li Z, Jiang H et al (2022) Semantic-aware privacy-preserving online location trajectory data sharing. IEEE Trans Inf Forensics Secur 17:2256\u20132271","journal-title":"IEEE Trans Inf Forensics Secur"}],"container-title":["Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-025-01504-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00607-025-01504-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-025-01504-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,6]],"date-time":"2025-09-06T19:40:56Z","timestamp":1757187656000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00607-025-01504-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,17]]},"references-count":57,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2025,7]]}},"alternative-id":["1504"],"URL":"https:\/\/doi.org\/10.1007\/s00607-025-01504-0","relation":{},"ISSN":["0010-485X","1436-5057"],"issn-type":[{"value":"0010-485X","type":"print"},{"value":"1436-5057","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,6,17]]},"assertion":[{"value":"28 February 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 May 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 June 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no Conflict of interest to declare that are relevant to the content of this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"151"}}