{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,22]],"date-time":"2025-12-22T18:27:50Z","timestamp":1766428070494,"version":"3.37.3"},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"S1","license":[{"start":{"date-parts":[[2018,1,25]],"date-time":"2018-01-25T00:00:00Z","timestamp":1516838400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1636219"],"award-info":[{"award-number":["U1636219"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"the National Key R&D Program of China","award":["2016YFB0801303","2016QY01W0105"],"award-info":[{"award-number":["2016YFB0801303","2016QY01W0105"]}]},{"name":"the Key Technologies R&D Program of Henan Province","award":["162102210032"],"award-info":[{"award-number":["162102210032"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61379151","61401512"],"award-info":[{"award-number":["61379151","61401512"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61572052"],"award-info":[{"award-number":["61572052"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2019,1]]},"DOI":"10.1007\/s10586-018-1737-7","type":"journal-article","created":{"date-parts":[[2018,1,25]],"date-time":"2018-01-25T14:54:20Z","timestamp":1516892060000},"page":"1679-1690","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["A localization and tracking scheme for target gangs based on big data of Wi-Fi locations"],"prefix":"10.1007","volume":"22","author":[{"given":"Fan","family":"Zhao","sequence":"first","affiliation":[]},{"given":"Wenqi","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Yong","family":"Gan","sequence":"additional","affiliation":[]},{"given":"Ziru","family":"Peng","sequence":"additional","affiliation":[]},{"given":"Xiangyang","family":"Luo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,1,25]]},"reference":[{"key":"1737_CR1","unstructured":"http:\/\/www.cnnic.net.cn\/hlwfzyj\/hlwxzbg\/hlwtjbg\/201701\/P020170123364672657408.pdf"},{"key":"1737_CR2","unstructured":"http:\/\/www.199it.com\/archives\/555094.html"},{"key":"1737_CR3","unstructured":"https:\/\/www.ipass.com\/mobile-network\/"},{"key":"1737_CR4","doi-asserted-by":"publisher","DOI":"10.1002\/9781119083856","volume-title":"People Analytics in the Era of Big Data: Changing the Way You Attract, Acquire, Develop, and Retain Talent","author":"JP Isson","year":"2016","unstructured":"Isson, J.P., Harriott, J.S.: People Analytics in the Era of Big Data: Changing the Way You Attract, Acquire, Develop, and Retain Talent. Wiley, New York (2016)"},{"key":"1737_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cose.2017.08.007","volume":"72","author":"J Li","year":"2018","unstructured":"Li, J., Zhang, Y., Chen, X., et al.: Secure attribute-based data sharing for resource-limited users in cloud computing. Comput. Sec. 72, 1\u201312 (2018)","journal-title":"Comput. Sec."},{"key":"1737_CR6","unstructured":"https:\/\/wigle.net\/"},{"key":"1737_CR7","doi-asserted-by":"publisher","first-page":"964","DOI":"10.1016\/j.future.2016.11.031","volume":"78","author":"C Stergiou","year":"2018","unstructured":"Stergiou, C., Psannis, K.E., Kim, B.G., et al.: Secure integration of IoT and cloud computing. Future Gener. Comput. Syst. 78, 964\u2013975 (2018)","journal-title":"Future Gener. Comput. Syst."},{"key":"1737_CR8","doi-asserted-by":"publisher","unstructured":"Wang, Y., Liu, Q., Hou, H., et al.: Big data driven outlier detection for soybean straw near infrared spectroscopy. J. Comput. Sci. (2017). https:\/\/doi.org\/10.1016\/j.jocs.2017.06.008","DOI":"10.1016\/j.jocs.2017.06.008"},{"issue":"3","key":"1737_CR9","doi-asserted-by":"publisher","first-page":"973","DOI":"10.1007\/s11227-016-1857-x","volume":"73","author":"MA Alsmirat","year":"2017","unstructured":"Alsmirat, M.A., Jararweh, Y., Obaidat, I., et al.: Internet of surveillance: a cloud supported large-scale wireless surveillance system. J. Supercomput. 73(3), 973\u2013992 (2017)","journal-title":"J. Supercomput."},{"issue":"1","key":"1737_CR10","first-page":"1","volume":"7","author":"BB Gupta","year":"2017","unstructured":"Gupta, B.B., Gupta, S., Chaudhary, P.: Enhancing the browser-side context-aware sanitization of suspicious HTML5 code for halting the DOM-based XSS vulnerabilities in cloud. Int. J. Cloud Appl. Comput. (IJCAC) 7(1), 1\u201331 (2017)","journal-title":"Int. J. Cloud Appl. Comput. (IJCAC)"},{"key":"1737_CR11","doi-asserted-by":"crossref","unstructured":"LaMarca, A., Chawathe, Y., Consolvo, S., et al.: Place lab: device positioning using radio beacons in the wild. In: Proceedings of International Conference on Pervasive Computing, pp. 116\u2013133 (2005)","DOI":"10.1007\/11428572_8"},{"key":"1737_CR12","doi-asserted-by":"crossref","unstructured":"Emery, M., Denko, M.K.: IEEE 802.11 WLAN based real-time location tracking in indoor and outdoor environments. In: Proceedings of the Canadian Conference on Electrical and Computer Engineering, pp. 1062\u20131065 (2007)","DOI":"10.1109\/CCECE.2007.271"},{"key":"1737_CR13","doi-asserted-by":"crossref","unstructured":"Vinh, N.K., Long, T.Q., Viet, N.A., et al.: Efficient tracking of industrial equipment using a Wi-Fi based localization system. In: Proceedings of International Conference on Soft Computing and Pattern Recognition, pp. 129\u2013133 (2013)","DOI":"10.1109\/SOCPAR.2013.7054114"},{"issue":"4","key":"1737_CR14","doi-asserted-by":"publisher","first-page":"17","DOI":"10.5121\/ijwmn.2013.5402","volume":"5","author":"Z Xu","year":"2013","unstructured":"Xu, Z., Sandrasegaran, K., Kong, X., et al.: Pedestrain monitoring system using Wi-Fi technology and RSSI based localization. Int. J. Wirel. Mobile Netw. 5(4), 17\u201334 (2013)","journal-title":"Int. J. Wirel. Mobile Netw."},{"key":"1737_CR15","doi-asserted-by":"crossref","unstructured":"Kim, M., Kotz, D., Kim, S.: Extracting a mobility model from real user traces. In: Proceedings of the 25th IEEE International Conference on Computer Communications, pp. 1\u201313 (2006)","DOI":"10.1109\/INFOCOM.2006.173"},{"key":"1737_CR16","doi-asserted-by":"crossref","unstructured":"Sevtsuk, A., Huang, S., Calabrese, F., et al.: Mapping the MIT Campus in Real Time Using Wi-Fi. Handbook of Research on Urban Informatics: The Practice and Promise of the Real-Time City (2009)","DOI":"10.4018\/978-1-60566-152-0.ch022"},{"key":"1737_CR17","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1016\/j.pmcj.2014.12.006","volume":"16","author":"TS Prentow","year":"2015","unstructured":"Prentow, T.S., Ruiz-Ruiz, A.J., Blunck, H., et al.: Spatio-temporal facility utilization analysis from exhaustive Wi-Fi monitoring. Pervasive Mob. Comput. 16, 305\u2013316 (2015)","journal-title":"Pervasive Mob. Comput."},{"issue":"4","key":"1737_CR18","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/s11416-013-0196-1","volume":"10","author":"M Cunche","year":"2014","unstructured":"Cunche, M.: I know your MAC address: targeted tracking of individual using Wi-Fi. J. Comput. Virol. Hacking Tech. 10(4), 219\u2013227 (2014)","journal-title":"J. Comput. Virol. Hacking Tech."},{"key":"1737_CR19","doi-asserted-by":"crossref","unstructured":"Musa, A.B.M., Eriksson, J.: Tracking unmodified smartphones using Wi-Fi monitors. In: Proceedings of the 10th ACM Conference on Embedded Network Sensor Systems, pp. 281\u2013294 (2012)","DOI":"10.1145\/2426656.2426685"},{"key":"1737_CR20","doi-asserted-by":"crossref","unstructured":"Vu, L., Nahrstedt, K., Retika, S., et al.: Joint bluetooth\/Wi-Fi scanning framework for characterizing and leveraging people movement in university campus. In: Proceedings of the 13th ACM International Conference on Modeling, Analysis, and Simulation of Wireless and Mobile Systems, pp. 257\u2013265 (2010)","DOI":"10.1145\/1868521.1868563"},{"key":"1737_CR21","doi-asserted-by":"crossref","unstructured":"Farshad, A., Marina, M.K., Garcia, F.: Urban Wi-Fi characterization via mobile Crowdsensing. In: Proceedings of the IEEE Conference on Network Operations and Management Symposium, pp. 1\u20139 (2014)","DOI":"10.1109\/NOMS.2014.6838233"},{"key":"1737_CR22","doi-asserted-by":"crossref","unstructured":"Fukuzaki, Y., Mochizuki, M., Murao, K., et al.: A pedestrian flow analysis system using Wi-Fi packet sensors to a real environment. In: Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication, 721\u2013730 (2014)","DOI":"10.1145\/2638728.2641312"},{"key":"1737_CR23","doi-asserted-by":"crossref","unstructured":"Barbera, M.V., Epasto, A., Mei, A., et al.: Signals from the crowd: uncovering social relationships through smartphone probes. In: Proceedings of the 2013 ACM Conference on Internet measurement, pp. 265\u2013276 (2013)","DOI":"10.1145\/2504730.2504742"},{"key":"1737_CR24","doi-asserted-by":"crossref","unstructured":"Chon, Y., Kim, S., Lee, S., et al.: Sensing Wi-Fi packets in the air: practicality and implications in urban mobility monitoring. In: Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, pp. 189\u2013200 (2014)","DOI":"10.1145\/2632048.2636066"},{"issue":"3","key":"1737_CR25","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1109\/TMC.2011.70","volume":"11","author":"X Fu","year":"2012","unstructured":"Fu, X., Zhang, N., Pingley, A., et al.: The digital Marauder\u2019s map: a Wi-Fi forensic positioning tool. IEEE Trans. Mob. Comput. 11(3), 377\u2013389 (2012)","journal-title":"IEEE Trans. Mob. Comput."},{"key":"1737_CR26","unstructured":"Wilkinson, G.: Digital terrestrial tracking: the future of surveillance. In: DEFCON 22 (2014)"},{"issue":"12","key":"1737_CR27","doi-asserted-by":"publisher","first-page":"927","DOI":"10.1155\/2013\/927940","volume":"9","author":"W Qin","year":"2013","unstructured":"Qin, W., Zhang, J., Li, B., et al.: Discovering human presence activities with smartphones using nonintrusive Wi-Fi sniffer sensors: the big data prospective. Int. J. Distrib. Sens. Netw. 9(12), 927\u2013940 (2013)","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"1737_CR28","unstructured":"O\u2019Connor, B.: CreepyDOL: Cheap. Distributed Stalking. Technical Paper by Malice Afterthought, Inc (2013)"},{"key":"1737_CR29","doi-asserted-by":"crossref","unstructured":"Demir, L., Cunche, M., Lauradoux, C.: Analysing the privacy policies of Wi-Fi trackers. In: Proceedings of the ACM Workshop on Physical Analytics, pp. 39\u201344 (2014)","DOI":"10.1145\/2611264.2611266"},{"key":"1737_CR30","doi-asserted-by":"crossref","unstructured":"Scheuner, J., Mazlami, G., Schoni, D., et al.: Probr\u2014a generic and passive WiFi tracking system. In: Proceedings of IEEE Conference on Local Computer Networks, pp. 495\u2013502 (2016)","DOI":"10.1109\/LCN.2016.30"},{"key":"1737_CR31","doi-asserted-by":"publisher","unstructured":"Li, P., Li, J., Huang, Z., et al.: Privacy-preserving outsourced classification in cloud computing. Clust. Comput. https:\/\/doi.org\/10.1007\/s10586-017-0849-9 (2017)","DOI":"10.1007\/s10586-017-0849-9"},{"key":"1737_CR32","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1016\/j.future.2017.02.006","volume":"74","author":"P Li","year":"2017","unstructured":"Li, P., Li, J., Huang, Z., et al.: Multi-key privacy-preserving deep learning in cloud computing. Future Gener. Comput. Syst. 74, 76\u201385 (2017)","journal-title":"Future Gener. Comput. Syst."},{"key":"1737_CR33","unstructured":"Greenstein, B., Gummadi, R., Pang, J., et al.: Can Ferris Bueller still have his day off? Protecting privacy in the wireless era. In: Proceedings of HotOS (2007)"},{"key":"1737_CR34","doi-asserted-by":"crossref","unstructured":"Gupta, B.B., Agrawal, D.P., Yamaguchi, S.: Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security. Springer, Berlin (2016)","DOI":"10.4018\/978-1-5225-0105-3"},{"key":"1737_CR35","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1016\/j.pmcj.2013.04.001","volume":"11","author":"M Cunche","year":"2014","unstructured":"Cunche, M., Kaafar, M.A., Boreli, R.: Linking wireless devices using information contained in Wi-Fi probe requests. Pervasive Mob. Comput. 11, 56\u201369 (2014)","journal-title":"Pervasive Mob. Comput."},{"key":"1737_CR36","doi-asserted-by":"publisher","unstructured":"Huang, Z., Liu, S., Mao, X,. et al.: Insight of the protection for data security under selective opening attacks. Inf. Sci. https:\/\/doi.org\/10.1016\/j.ins.2017.05.031 (2017)","DOI":"10.1016\/j.ins.2017.05.031"},{"issue":"3","key":"1737_CR37","doi-asserted-by":"publisher","first-page":"584","DOI":"10.1109\/TIFS.2015.2507542","volume":"11","author":"M Chernyshev","year":"2016","unstructured":"Chernyshev, M., Valli, C., Hannay, P.: On 802.11 Access point locatability and named entity recognition in service set identifiers. IEEE Trans. Inf. Forensics Sec. 11(3), 584\u2013593 (2016)","journal-title":"IEEE Trans. Inf. Forensics Sec."},{"key":"1737_CR38","unstructured":"http:\/\/www.skyhookwireless.com\/"},{"issue":"6","key":"1737_CR39","doi-asserted-by":"publisher","first-page":"1615","DOI":"10.1109\/TPDS.2013.284","volume":"25","author":"J Li","year":"2014","unstructured":"Li, J., Chen, X., Li, M., et al.: Secure deduplication with efficient and reliable convergent key management. IEEE Trans. Parallel Distrib. Syst. 25(6), 1615\u20131625 (2014)","journal-title":"IEEE Trans. Parallel Distrib. Syst."}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10586-018-1737-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-018-1737-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-018-1737-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,13]],"date-time":"2022-08-13T05:44:12Z","timestamp":1660369452000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10586-018-1737-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,1,25]]},"references-count":39,"journal-issue":{"issue":"S1","published-print":{"date-parts":[[2019,1]]}},"alternative-id":["1737"],"URL":"https:\/\/doi.org\/10.1007\/s10586-018-1737-7","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"type":"print","value":"1386-7857"},{"type":"electronic","value":"1573-7543"}],"subject":[],"published":{"date-parts":[[2018,1,25]]},"assertion":[{"value":"6 November 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 December 2017","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 January 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 January 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with Ethical Standards"}},{"value":"The authors declare that there is no conflict of interests regarding the publication of this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}}]}}