{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,16]],"date-time":"2025-09-16T21:09:53Z","timestamp":1758056993492,"version":"3.44.0"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2025,8,19]],"date-time":"2025-08-19T00:00:00Z","timestamp":1755561600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,8,19]],"date-time":"2025-08-19T00:00:00Z","timestamp":1755561600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100003488","name":"Henan Polytechnic University","doi-asserted-by":"publisher","award":["B2020-32","B2022-16"],"award-info":[{"award-number":["B2020-32","B2022-16"]}],"id":[{"id":"10.13039\/501100003488","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2025,9]]},"DOI":"10.1007\/s10586-025-05148-9","type":"journal-article","created":{"date-parts":[[2025,8,19]],"date-time":"2025-08-19T10:33:46Z","timestamp":1755599626000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["HSLRL-DP: based on Hasse sensitivity levels and reinforcement learning trajectory privacy enhancement mechanism"],"prefix":"10.1007","volume":"28","author":[{"given":"Yanmei","family":"Shen","sequence":"first","affiliation":[]},{"given":"Yabiao","family":"Sang","sequence":"additional","affiliation":[]},{"given":"Hui","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Zihao","family":"Shen","sequence":"additional","affiliation":[]},{"given":"Peiqian","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,8,19]]},"reference":[{"issue":"2","key":"5148_CR1","doi-asserted-by":"publisher","first-page":"617","DOI":"10.26599\/TST.2023.9010072","volume":"29","author":"W Zhang","year":"2023","unstructured":"Zhang, W., et al.: A local differential privacy trajectory protection method based on temporal and spatial restrictions for staying detection. Tsinghua Sci. Technol. 29(2), 617\u2013633 (2023)","journal-title":"Tsinghua Sci. Technol."},{"issue":"8","key":"5148_CR2","doi-asserted-by":"publisher","first-page":"5932","DOI":"10.1109\/JIOT.2021.3064357","volume":"9","author":"B Li","year":"2021","unstructured":"Li, B., et al.: LBS meets blockchain: an efficient method with security preserving trust in SAGIN. IEEE Internet Things J. 9(8), 5932\u20135942 (2021)","journal-title":"IEEE Internet Things J."},{"issue":"1","key":"5148_CR3","first-page":"6338123","volume":"2022","author":"J Zhang","year":"2022","unstructured":"Zhang, J., et al.: Individual attribute and cascade influence capability-based privacy protection method in social networks. Secur. Commun. Netw. 2022(1), 6338123 (2022)","journal-title":"Secur. Commun. Netw."},{"key":"5148_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.future.2021.01.028","volume":"123","author":"M Gheisari","year":"2021","unstructured":"Gheisari, M., et al.: OBPP: an ontology-based framework for privacy-preserving in IoT-based smart city. Future Gener. Comput. Syst. 123, 1\u201313 (2021)","journal-title":"Future Gener. Comput. Syst."},{"issue":"4","key":"5148_CR5","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1049\/cds2.12127","volume":"17","author":"N Jafarzadeh","year":"2023","unstructured":"Jafarzadeh, N., et al.: A novel buffering fault-tolerance approach for network on chip (NoC). IET Circuits Devices Syst. 17(4), 250\u2013257 (2023)","journal-title":"IET Circuits Devices Syst."},{"key":"5148_CR6","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1016\/j.future.2022.01.007","volume":"131","author":"M Wang","year":"2022","unstructured":"Wang, M., et al.: PANDA: lightweight non-interactive privacy-preserving data aggregation for constrained devices. Future Gener. Comput. Syst. 131, 28\u201342 (2022)","journal-title":"Future Gener. Comput. Syst."},{"key":"5148_CR7","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1016\/j.future.2021.05.007","volume":"124","author":"M Gimenez-Aguilar","year":"2021","unstructured":"Gimenez-Aguilar, M., et al.: Achieving cybersecurity in blockchain-based systems: a survey. Future Gener. Comput. Syst. 124, 91\u2013118 (2021)","journal-title":"Future Gener. Comput. Syst."},{"key":"5148_CR8","doi-asserted-by":"publisher","first-page":"511","DOI":"10.1016\/j.future.2018.12.044","volume":"95","author":"AA Omar","year":"2019","unstructured":"Omar, A.A., et al.: Privacy-friendly platform for healthcare data in cloud based on blockchain environment. Future Gener. Comput. Syst. 95, 511\u2013521 (2019)","journal-title":"Future Gener. Comput. Syst."},{"issue":"6","key":"5148_CR9","doi-asserted-by":"publisher","first-page":"2021","DOI":"10.3390\/s21062021","volume":"21","author":"X Zhiping","year":"2021","unstructured":"Zhiping, X., et al.: Spatiotemporal mobility based trajectory privacy-preserving algorithm in location-based services. Sensors 21(6), 2021 (2021)","journal-title":"Sensors"},{"issue":"41","key":"5148_CR10","doi-asserted-by":"publisher","first-page":"eabk3283","DOI":"10.1126\/sciadv.abk3283","volume":"7","author":"CT Kenny","year":"2021","unstructured":"Kenny, C.T., et al.: The use of differential privacy for census data and its impact on redistricting: the case of the 2020 US Census. Sci. Adv. 7(41), eabk3283 (2021)","journal-title":"Sci. Adv."},{"key":"5148_CR11","doi-asserted-by":"publisher","first-page":"324","DOI":"10.1016\/j.future.2019.02.016","volume":"96","author":"S Meng","year":"2019","unstructured":"Meng, S., et al.: Privacy-preserving and sparsity-aware location-based prediction method for collaborative recommender systems. Future Gener. Comput. Syst. 96, 324\u2013335 (2019)","journal-title":"Future Gener. Comput. Syst."},{"key":"5148_CR12","doi-asserted-by":"publisher","first-page":"792","DOI":"10.1016\/j.future.2017.08.002","volume":"87","author":"S Wang","year":"2018","unstructured":"Wang, S., Sinnott, R., Nepal, S.: Privacy-protected statistics publication over social media user trajectory streams. Future Gener. Comput. Syst. 87, 792\u2013802 (2018)","journal-title":"Future Gener. Comput. Syst."},{"key":"5148_CR13","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1016\/j.future.2014.11.003","volume":"55","author":"D Li","year":"2016","unstructured":"Li, D., et al.: An algorithm for efficient privacy-preserving item-based collaborative filtering. Future Gener. Comput. Syst. 55, 311\u2013320 (2016)","journal-title":"Future Gener. Comput. Syst."},{"key":"5148_CR14","doi-asserted-by":"publisher","first-page":"2256","DOI":"10.1109\/TIFS.2022.3181855","volume":"17","author":"Z Zheng","year":"2022","unstructured":"Zheng, Z., et al.: Semantic-aware privacy-preserving online location trajectory data sharing. IEEE Trans. Inf. Forensics Secur. 17, 2256\u20132271 (2022)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"5148_CR15","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1016\/j.neucom.2021.04.137","volume":"472","author":"W Cheng","year":"2022","unstructured":"Cheng, W., et al.: OPTDP: towards optimal personalized trajectory differential privacy for trajectory data publishing. Neurocomputing 472, 201\u2013211 (2022)","journal-title":"Neurocomputing"},{"key":"5148_CR16","doi-asserted-by":"publisher","first-page":"692","DOI":"10.1016\/j.future.2022.12.011","volume":"141","author":"Z Zhang","year":"2023","unstructured":"Zhang, Z., Xiaolong, X., Xiao, F.: LGAN-DP: a novel differential private publication mechanism of trajectory data. Future Gener. Comput. Syst. 141, 692\u2013703 (2023)","journal-title":"Future Gener. Comput. Syst."},{"issue":"1","key":"5148_CR17","first-page":"1","volume":"17","author":"G Zhen","year":"2023","unstructured":"Zhen, G., Zhang, G.: Trajectory data publication based on differential privacy. Int. J. Inf. Secur. Priv. 17(1), 1\u201315 (2023)","journal-title":"Int. J. Inf. Secur. Priv."},{"issue":"9","key":"5148_CR18","doi-asserted-by":"publisher","first-page":"16534","DOI":"10.1109\/TITS.2021.3130978","volume":"23","author":"S Cai","year":"2021","unstructured":"Cai, S., et al.: A trajectory released scheme for the internet of vehicles based on differential privacy. IEEE Trans. Intell. Transp. Syst. 23(9), 16534\u201316547 (2021)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"5148_CR19","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2020.105940","volume":"198","author":"X Zhao","year":"2020","unstructured":"Zhao, X., Pi, D., Chen, J.: Novel trajectory privacy-preserving method based on prefix tree using differential privacy. Knowl.-Based Syst. 198, 105940 (2020)","journal-title":"Knowl.-Based Syst."},{"issue":"7","key":"5148_CR20","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4069","volume":"32","author":"JA Alzubi","year":"2021","unstructured":"Alzubi, J.A.: Bipolar fully recurrent deep structured neural learning based attack detection for securing industrial sensor networks. Trans. Emerg. Telecommun. Technol. 32(7), e4069 (2021)","journal-title":"Trans. Emerg. Telecommun. Technol."},{"issue":"1","key":"5148_CR21","doi-asserted-by":"publisher","first-page":"1080","DOI":"10.1109\/TII.2022.3189170","volume":"19","author":"JA Alzubi","year":"2022","unstructured":"Alzubi, J.A., et al.: Cloud-IIoT-based electronic health record privacy-preserving by CNN and blockchain-enabled federated learning. IEEE Trans. Ind. Inf. 19(1), 1080\u20131087 (2022)","journal-title":"IEEE Trans. Ind. Inf."},{"issue":"3","key":"5148_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3446428","volume":"39","author":"W Zeng","year":"2021","unstructured":"Zeng, W., et al.: Reinforcement learning-based collective entity alignment with adaptive features. ACM Trans. Inf. Syst. 39(3), 1\u201331 (2021)","journal-title":"ACM Trans. Inf. Syst."},{"key":"5148_CR23","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102446","volume":"110","author":"X Chen","year":"2021","unstructured":"Chen, X., et al.: An optimized differential privacy scheme with reinforcement learning in VANET. Comput. Secur. 110, 102446 (2021)","journal-title":"Comput. Secur."},{"key":"5148_CR24","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1016\/j.future.2023.01.008","volume":"142","author":"J Zhang","year":"2023","unstructured":"Zhang, J., et al.: Hasse sensitivity level: a sensitivity-aware trajectory privacy-enhanced framework with Reinforcement Learning. Future Gener. Comput. Syst. 142, 301\u2013313 (2023)","journal-title":"Future Gener. Comput. Syst."},{"key":"5148_CR25","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2022.103459","volume":"206","author":"JW Kim","year":"2022","unstructured":"Kim, J.W., Jang, B.: Deep learning-based privacy-preserving framework for synthetic trajectory generation. J. Netw. Comput. Appl. 206, 103459 (2022)","journal-title":"J. Netw. Comput. Appl."},{"issue":"6191","key":"5148_CR26","doi-asserted-by":"publisher","first-page":"1492","DOI":"10.1126\/science.1242072","volume":"344","author":"A Rodriguez","year":"2014","unstructured":"Rodriguez, A., Laio, A.: Clustering by fast search and find of density peaks. Science 344(6191), 1492\u20131496 (2014)","journal-title":"Science"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05148-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-025-05148-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05148-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,15]],"date-time":"2025-09-15T19:06:19Z","timestamp":1757963179000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-025-05148-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,19]]},"references-count":26,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2025,9]]}},"alternative-id":["5148"],"URL":"https:\/\/doi.org\/10.1007\/s10586-025-05148-9","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"type":"print","value":"1386-7857"},{"type":"electronic","value":"1573-7543"}],"subject":[],"published":{"date-parts":[[2025,8,19]]},"assertion":[{"value":"13 July 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 December 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 January 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 August 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"All authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"490"}}