{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T16:09:42Z","timestamp":1774368582099,"version":"3.50.1"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T00:00:00Z","timestamp":1605571200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T00:00:00Z","timestamp":1605571200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"the National Key R&D Program of China","award":["No.2017YFC0704200"],"award-info":[{"award-number":["No.2017YFC0704200"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61872053"],"award-info":[{"award-number":["61872053"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61572413"],"award-info":[{"award-number":["61572413"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1636205"],"award-info":[{"award-number":["U1636205"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Research Grants Council, Hong Kong SAR, Chin","award":["12200914"],"award-info":[{"award-number":["12200914"]}]},{"name":"Research Grants Council, Hong Kong SAR, Chin","award":["15238116"],"award-info":[{"award-number":["15238116"]}]},{"name":"Research Grants Council, Hong Kong SAR, Chin","award":["15222118"],"award-info":[{"award-number":["15222118"]}]},{"name":"Research Grants Council, Hong Kong SAR, Chin","award":["C1008-16G"],"award-info":[{"award-number":["C1008-16G"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Distrib Parallel Databases"],"published-print":{"date-parts":[[2021,9]]},"DOI":"10.1007\/s10619-020-07318-7","type":"journal-article","created":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T07:02:52Z","timestamp":1605596572000},"page":"785-811","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["Sensitive attribute privacy preservation of trajectory data publishing based on l-diversity"],"prefix":"10.1007","volume":"39","author":[{"given":"Lin","family":"Yao","sequence":"first","affiliation":[]},{"given":"Zhenyu","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Haibo","family":"Hu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3929-3598","authenticated-orcid":false,"given":"Guowei","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Bin","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,11,17]]},"reference":[{"issue":"2","key":"7318_CR1","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1109\/JIOT.2014.2313981","volume":"1","author":"S Amendola","year":"2014","unstructured":"Amendola, S., Lodato, R., Manzari, S., Occhiuzzi, C.: RFID technology for IoT-based personal healthcare in smart spaces. IEEE Internet of Things J. 1(2), 144\u2013152 (2014)","journal-title":"IEEE Internet of Things J."},{"issue":"12","key":"7318_CR2","doi-asserted-by":"publisher","first-page":"1413","DOI":"10.1016\/j.joca.2011.08.007","volume":"19","author":"AM Davis","year":"2011","unstructured":"Davis, A.M., Perruccio, A.V., Ibrahim, S., Hogg-Johnson, S., Wong, R., Streiner, D.L., Beaton, D.E., Cote, P., Gignac, M.A., Flannery, J.: The trajectory of recovery and the inter-relationships of symptoms, activity and participation in the first year following total hip and knee replacement. Osteoarthr. Cartil. 19(12), 1413 (2011)","journal-title":"Osteoarthr. Cartil."},{"key":"7318_CR3","doi-asserted-by":"crossref","unstructured":"Xu, C., Zheng, W., Hui, P., Zhang, K., Liu, H.: Hygeia: a practical and tailored data collection platform for mobile health. In: IEEE International Conference on Ubiquitous Intelligence and Computing, pp. 20\u201327 (2015)","DOI":"10.1109\/UIC-ATC-ScalCom-CBDCom-IoP.2015.28"},{"key":"7318_CR4","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1016\/j.knosys.2015.11.007","volume":"94","author":"EG Komishani","year":"2016","unstructured":"Komishani, E.G., Abadi, M., Deldar, F.: Pptd: preserving personalized privacy in trajectory data publishing by sensitive attribute generalization and trajectory local suppression. Knowl. Based Syst. 94, 43\u201359 (2016)","journal-title":"Knowl. Based Syst."},{"issue":"1","key":"7318_CR5","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1504\/IJBDI.2016.073904","volume":"3","author":"N Victor","year":"2016","unstructured":"Victor, N., Lopez, D., Abawajy, J.H.: Privacy models for big data: a survey. Int. J. Big Data Intell. 3(1), 61\u201375 (2016)","journal-title":"Int. J. Big Data Intell."},{"issue":"4","key":"7318_CR6","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1145\/1749603.1749605","volume":"42","author":"B Fung","year":"2010","unstructured":"Fung, B., Wang, K., Chen, R., Philip, S.Y.: Privacy-preserving data publishing: a survey of recent developments. ACM Comput. Surv. (CSUR) 42(4), 14 (2010)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"7318_CR7","doi-asserted-by":"crossref","unstructured":"Li, N., Li, T., Venkatasubramanian, S.: t-closeness: privacy beyond k-anonymity and l-diversity. In: International Conference on Data Engineering, pp. 106\u2013115 (2007)","DOI":"10.1109\/ICDE.2007.367856"},{"issue":"1","key":"7318_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1217299.1217300","volume":"1","author":"A Machanavajjhala","year":"2007","unstructured":"Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: L -diversity: privacy beyond k-anonymity. ACM Trans. Knowl. Discov. From Data 1(1), 1\u201312 (2007)","journal-title":"ACM Trans. Knowl. Discov. From Data"},{"key":"7318_CR9","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/j.ins.2011.07.035","volume":"231","author":"R Chen","year":"2013","unstructured":"Chen, R., Fung, B.C.M., Mohammed, N., Desai, B.C., Wang, K.: Privacy-preserving trajectory data publishing by local suppression. Inf. Sci. 231, 83\u201397 (2013)","journal-title":"Inf. Sci."},{"key":"7318_CR10","first-page":"1","volume":"400","author":"M Li","year":"2017","unstructured":"Li, M., Zhu, L., Zhang, Z., Rixin, X.: Achieving differential privacy of trajectory data publishing in participatory sensing. Inf. Sci. 400, 1\u201313 (2017)","journal-title":"Inf. Sci."},{"key":"7318_CR11","doi-asserted-by":"crossref","unstructured":"Gramaglia, M., Fiore, M., Tarable, A., Banchs, A.: Preserving mobile subscriber privacy in open datasets of spatiotemporal trajectories. In: INFOCOM 2017-IEEE Conference on Computer Communications, IEEE, pp. 1\u20139. IEEE (2017)","DOI":"10.1109\/INFOCOM.2017.8056979"},{"key":"7318_CR12","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1016\/j.ins.2016.10.038","volume":"378","author":"Y Xin","year":"2017","unstructured":"Xin, Y., Xie, Z.Q., Yang, J.: The privacy preserving method for dynamic trajectory releasing based on adaptive clustering. Inf. Sci. 378, 131\u2013143 (2017)","journal-title":"Inf. Sci."},{"key":"7318_CR13","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1016\/j.knosys.2018.01.007","volume":"148","author":"Y Dong","year":"2018","unstructured":"Dong, Y., Pi, D.: Novel privacy-preserving algorithm based on frequent path for trajectory data publishing. Knowl. Based Syst. 148, 55\u201365 (2018)","journal-title":"Knowl. Based Syst."},{"key":"7318_CR14","doi-asserted-by":"crossref","unstructured":"Yarovoy, R., Bonchi, F., Lakshmanan, L.V. S., Wang, W.H.: Anonymizing moving objects: how to hide a mob in a crowd? In: International Conference on Extending Database Technology, pp. 72\u201383 (2009)","DOI":"10.1145\/1516360.1516370"},{"issue":"2","key":"7318_CR15","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1016\/j.trc.2013.12.003","volume":"39","author":"M Ghasemzadeh","year":"2014","unstructured":"Ghasemzadeh, M., Fung, B.C.M., Chen, R., Awasthi, A.: Anonymizing trajectory data for passenger flow analysis. Transport. Res. C 39(2), 63\u201379 (2014)","journal-title":"Transport. Res. C"},{"key":"7318_CR16","doi-asserted-by":"crossref","unstructured":"Brito, Felipe\u00a0T., Neto, Ant\u00f4nio C\u00a0Ara\u00fajo, Costa, Camila\u00a0F., Mendon\u00e7a, Andr\u00e9\u00a0L.C., Machado, Javam\u00a0C.: A distributed approach for privacy preservation in the publication of trajectory data. In: Proceedings of the 2nd Workshop on Privacy in Geographic Information Collection and Analysis, p. 5. ACM (2015)","DOI":"10.1145\/2830834.2830835"},{"issue":"7","key":"7318_CR17","doi-asserted-by":"publisher","first-page":"1466","DOI":"10.1109\/TKDE.2017.2675420","volume":"29","author":"M Terrovitis","year":"2017","unstructured":"Terrovitis, M., Poulis, G., Mamoulis, N., Skiadopoulos, S.: Local suppression and splitting techniques for privacy preserving publication of trajectories. IEEE Trans. Knowl. Data Eng. 29(7), 1466\u20131479 (2017)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"7318_CR18","unstructured":"Fiore, M., Katsikouli, P., Zavou, E., Cunche, M., Fessant, F., Hello, D.L., Aivodji, U.M., Olivier, B., Quertier, T., Stanica, R.: Privacy in trajectory micro-data publishing: a survey and security. arXiv: Cryptography (2019)"},{"key":"7318_CR19","unstructured":"Chen, R., Fung, B., Desai, B.C.: Differentially private trajectory data publication. arXiv preprint. arXiv:1112.2020 (2011)"},{"key":"7318_CR20","doi-asserted-by":"crossref","unstructured":"Shao, D., Jiang, K., Kister, T., Bressan, S., Tan, K.: Publishing trajectory with differential privacy: a priori vs. a posteriori sampling mechanisms. In: Proceedings of the 24th International Conference on Database and Expert Systems Applications, pp. 357\u2013365 (2013)","DOI":"10.1007\/978-3-642-40285-2_31"},{"key":"7318_CR21","doi-asserted-by":"crossref","unstructured":"Chen, R., Fung, B.C.M., Desai, B.C., Sossou, N.M.: Differentially private transit data publication: a case study on the Montreal transportation system. In: Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 213\u2013221 (2012)","DOI":"10.1145\/2339530.2339564"},{"key":"7318_CR22","doi-asserted-by":"crossref","unstructured":"Bonomi, L., Xiong, L.: A two-phase algorithm for mining sequential patterns with differential privacy. In: Proceedings of the 22Nd ACM International Conference on Information & Knowledge Management, pp. 269\u2013278 (2013)","DOI":"10.1145\/2505515.2505553"},{"key":"7318_CR23","doi-asserted-by":"crossref","unstructured":"Qardaji, W., Yang, W., Li, N.: Differentially private grids for geospatial data. In: IEEE 29th International Conference on Data Engineering, pp. 757\u2013768 (2013)","DOI":"10.1109\/ICDE.2013.6544872"},{"key":"7318_CR24","doi-asserted-by":"crossref","unstructured":"Zhang, J., Xiao, X., Xie, X.: PrivTree: a differentially private algorithm for hierarchical decompositions. In: Proceedings of the 2016 International Conference on Management of Data, pp. 155\u2013170 (2016)","DOI":"10.1145\/2882903.2882928"},{"key":"7318_CR25","doi-asserted-by":"crossref","unstructured":"He, X., Cormode, G., Machanavajjhala, A., Procopiuc, C.M., Srivastava, D.: Dpt: differentially private trajectory synthesis using hierarchical reference systems. In: Proceedings of VLDB, pp. 1154\u20131165 (2015)","DOI":"10.14778\/2809974.2809978"},{"key":"7318_CR26","doi-asserted-by":"crossref","unstructured":"Hua, J., Gao, Y., Zhong, S.: Differentially private publication of general time-serial trajectory data. In: Computer Communications, pp. 549\u2013557 (2015)","DOI":"10.1109\/INFOCOM.2015.7218422"},{"issue":"4","key":"7318_CR27","first-page":"591","volume":"15","author":"Q Wang","year":"2018","unstructured":"Wang, Q., Zhang, Y., Xiao, L., Wang, Z., Qin, Z., Ren, K.: Real-time and spatio-temporal crowd-sourced social network data publishing with differential privacy. IEEE Trans. Depend. Secure Comput. 15(4), 591\u2013606 (2018)","journal-title":"IEEE Trans. Depend. Secure Comput."},{"key":"7318_CR28","first-page":"9","volume":"14","author":"L Ou","year":"2018","unstructured":"Ou, L., Qin, Z., Liao, S., Hong, Y., Jia, X.: Releasing correlated trajectories: towards high utility and optimal differential privacy. IEEE Trans. Depend. Secure Comput. 14, 9\u201321 (2018)","journal-title":"IEEE Trans. Depend. Secure Comput."},{"issue":"10","key":"7318_CR29","doi-asserted-by":"publisher","first-page":"2315","DOI":"10.1109\/TMC.2018.2874008","volume":"18","author":"ME Gursoy","year":"2019","unstructured":"Gursoy, M.E., Liu, L., Truex, S., Lei, Y.: Differentially private and utility preserving publication of trajectory data. IEEE Trans. Mob. Comput. 18(10), 2315\u20132329 (2019)","journal-title":"IEEE Trans. Mob. Comput."},{"key":"7318_CR30","doi-asserted-by":"crossref","unstructured":"Yao, L., Wang, X., Wang, X., Hu, H., Wu, G.: Publishing sensitive trajectory data under enhanced l-diversity model. In: The 20th IEEE International Conference on Mobile Data Management, pp. 160\u2013169 (2019)","DOI":"10.1109\/MDM.2019.00-61"},{"key":"7318_CR31","doi-asserted-by":"crossref","unstructured":"Cho, E., Myers, S.A., Leskovec, J.: Friendship and mobility: user movement in location-based social networks. In: ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, San Diego, CA, pp. 1082\u20131090 (2011)","DOI":"10.1145\/2020408.2020579"},{"key":"7318_CR32","doi-asserted-by":"publisher","first-page":"160035","DOI":"10.1038\/sdata.2016.35","volume":"3","author":"AEW Johnson","year":"2016","unstructured":"Johnson, A.E.W., Pollard, T.J., Shen, L., Lehman, L.H., Feng, M., Ghassemi, M., Moody, B., Szolovits, P., Celi, L.A., Mark, R.G.: Mimic-iii, a freely accessible critical care database. Sci. Data 3, 160035 (2016)","journal-title":"Sci. Data"}],"container-title":["Distributed and Parallel Databases"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10619-020-07318-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10619-020-07318-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10619-020-07318-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,8]],"date-time":"2025-04-08T05:46:01Z","timestamp":1744091161000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10619-020-07318-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,17]]},"references-count":32,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2021,9]]}},"alternative-id":["7318"],"URL":"https:\/\/doi.org\/10.1007\/s10619-020-07318-7","relation":{},"ISSN":["0926-8782","1573-7578"],"issn-type":[{"value":"0926-8782","type":"print"},{"value":"1573-7578","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,11,17]]},"assertion":[{"value":"5 November 2020","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 November 2020","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}