{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,31]],"date-time":"2022-03-31T03:36:39Z","timestamp":1648697799954},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2017,7,5]],"date-time":"2017-07-05T00:00:00Z","timestamp":1499212800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Geoinformatica"],"published-print":{"date-parts":[[2017,10]]},"DOI":"10.1007\/s10707-017-0304-3","type":"journal-article","created":{"date-parts":[[2017,7,5]],"date-time":"2017-07-05T10:27:30Z","timestamp":1499250450000},"page":"733-762","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Privacy-preserving detection of anomalous phenomena in crowdsourced environmental sensing using fine-grained weighted voting"],"prefix":"10.1007","volume":"21","author":[{"given":"Mihai","family":"Maruseac","sequence":"first","affiliation":[]},{"given":"Gabriel","family":"Ghinita","sequence":"additional","affiliation":[]},{"given":"Goce","family":"Trajcevski","sequence":"additional","affiliation":[]},{"given":"Peter","family":"Scheuermann","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,5]]},"reference":[{"key":"304_CR1","first-page":"20","volume-title":"Proceedings of IEEE international conference on data engineering (ICDE)","author":"G Cormode","year":"2012","unstructured":"Cormode G, Procopiuc C, Srivastava D, Shen E, Yu T (2012) Differentially private spatial decompositions. In: Proceedings of IEEE international conference on data engineering (ICDE), pp 20\u201331"},{"key":"304_CR2","volume-title":"Proceedings of IEEE international conference on data engineering (ICDE)","author":"W Qardaji","year":"2013","unstructured":"Qardaji W, Yang W, Li N (2013) Differentially private grids for geospatial data. In: Proceedings of IEEE international conference on data engineering (ICDE)"},{"key":"304_CR3","volume-title":"Proceedings of international conference on management of data (ACM SIGMOD)","author":"W Qardaji","year":"2014","unstructured":"Qardaji W, Yang W, Li N (2014) Priview: practical differentially private release of marginal contingency tables. In: Proceedings of international conference on management of data (ACM SIGMOD)"},{"key":"304_CR4","doi-asserted-by":"crossref","unstructured":"Dwork C (2006) Differential privacy. In: ICALP (2). Springer, pp 1\u201312","DOI":"10.1007\/11787006_1"},{"key":"304_CR5","first-page":"265","volume-title":"TCC","author":"C Dwork","year":"2006","unstructured":"Dwork C, McSherry F, Nissim K, Smith A (2006) Calibrating noise to sensitivity in private data analysis. In: TCC, pp 265\u2013284"},{"issue":"5","key":"304_CR6","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney L (2002) k-Anonymity: A Model for Protecting Privacy. Int J Uncertainty Fuzziness Knowledge Based Syst 10(5):557\u2013570","journal-title":"Int J Uncertainty Fuzziness Knowledge Based Syst"},{"key":"304_CR7","volume-title":"Proceedings of international conference on data engineering (ICDE)","author":"A Machanavajjhala","year":"2006","unstructured":"Machanavajjhala A, Gehrke J, Kifer D, Venkitasubramaniam M (2006) L-diversity: Privacy Beyond k-Anonymity. In: Proceedings of international conference on data engineering (ICDE)"},{"key":"304_CR8","first-page":"106","volume-title":"Proceedings of IEEE international conference on data engineering (ICDE), istanbul","author":"N Li","year":"2007","unstructured":"Li N, Li T, Venkatasubramanian S (2007) T-closeness: Privacy beyond k-anonymity and l-diversity. In: Proceedings of IEEE international conference on data engineering (ICDE), istanbul. IEEE, Turkey, pp 106\u2013115"},{"key":"304_CR9","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1109\/FOCS.2007.66","volume-title":"Proceedings of annual IEEE symposium on foundations of computer science (FOCS)","author":"F McSherry","year":"2007","unstructured":"McSherry F, Talwar K (2007) Mechanism design via differential privacy. In: Proceedings of annual IEEE symposium on foundations of computer science (FOCS), pp 94\u2013103"},{"key":"304_CR10","doi-asserted-by":"crossref","unstructured":"Samet H (1990) The Design and Analysis of Spatial Data Structures. Addison-Wesley","DOI":"10.1007\/3-540-52208-5_28"},{"issue":"11","key":"304_CR11","doi-asserted-by":"crossref","first-page":"1340","DOI":"10.14778\/2350229.2350251","volume":"5","author":"N Li","year":"2012","unstructured":"Li N, Qardaji W, Su D, Cao J (2012) Privbasis: Frequent itemset mining with differential privacy. Proc VLDB Endow 5(11):1340\u20131351","journal-title":"Proc VLDB Endow"},{"key":"304_CR12","doi-asserted-by":"crossref","first-page":"266","DOI":"10.1017\/S0305004100010112","volume":"28","author":"REAC Paley","year":"1932","unstructured":"Paley REAC, Zygmund A (1932) A note on analytic functions in the unit circle. Proc Camb Philos Soc 28:266","journal-title":"Proc Camb Philos Soc"},{"key":"304_CR13","doi-asserted-by":"crossref","unstructured":"Li W, Bao J, Shen W (2011) Collaborative wireless sensor networks: A survey. In: Proceedings of the IEEE international conference on systems, man and cybernetics, Anchorage, Alaska, USA, October 9-12, 2011. IEEE, pp 2614\u20132619","DOI":"10.1109\/ICSMC.2011.6084070"},{"issue":"3","key":"304_CR14","doi-asserted-by":"crossref","first-page":"287","DOI":"10.1504\/IJKWI.2012.050860","volume":"3","author":"LMR Peralta","year":"2012","unstructured":"Peralta LMR, de Brito LMPL, Santos JFF (2012) Improving users\u2019 manipulation and control on wsns through collaborative sessions. I J Knowledge and Web Intelligence 3(3):287\u2013311","journal-title":"I J Knowledge and Web Intelligence"},{"issue":"1","key":"304_CR15","first-page":"6","volume":"8","author":"W He","year":"2011","unstructured":"He W, Liu X, Nguyen HV, Nahrstedt K, Abdelzaher TF (2011) PDA: privacy-preserving data aggregation for information collection. TOSN 8(1):6","journal-title":"TOSN"},{"key":"304_CR16","first-page":"30","volume-title":"ALGOSENSORS","author":"S Gandhi","year":"2008","unstructured":"Gandhi S, Kumar R, Suri S (2008) Target counting under minimal sensing: complexity and approximations. In: ALGOSENSORS, pp 30\u201342"},{"key":"304_CR17","doi-asserted-by":"crossref","unstructured":"Zhu X, Sarkar R, Gao J, Mitchell J (2008) Light-weight contour tracking in wireless sensor networks. In: INFOCOM 2008. The 27th conference on computer communications. IEEE","DOI":"10.1109\/INFOCOM.2008.173"},{"issue":"6","key":"304_CR18","doi-asserted-by":"crossref","first-page":"1259","DOI":"10.1016\/j.adhoc.2008.12.001","volume":"7","author":"M Fayed","year":"2009","unstructured":"Fayed M, Mouftah HT (2009) Localised alpha-shape computations for boundary recognition in sensor networks. Ad Hoc Netw 7(6):1259\u20131269","journal-title":"Ad Hoc Netw"},{"key":"304_CR19","first-page":"121","volume-title":"Proceedings of international conference on management of data (ACM SIGMOD)","author":"G Ghinita","year":"2008","unstructured":"Ghinita G, Kalnis P, Khoshgozaran A, Shahabi C, Tan KL (2008) Private queries in location based services: anonymizers are not necessary. In: Proceedings of international conference on management of data (ACM SIGMOD), pp 121\u2013132"},{"key":"304_CR20","volume-title":"USENIX Mobisys","author":"M Gruteser","year":"2003","unstructured":"Gruteser M, Grunwald D (2003) anonymous usage of location-based services through spatial and temporal cloaking. In: USENIX Mobisys"},{"key":"304_CR21","volume-title":"Proceedings of VLDB","author":"MF Mokbel","year":"2006","unstructured":"Mokbel MF, Chow CY, Aref WG (2006) The new casper: Query processing for location services without compromising privacy. In: Proceedings of VLDB"},{"key":"304_CR22","doi-asserted-by":"crossref","unstructured":"Gedik B, Liu L (2005) Location privacy in mobile systems: A personalized anonymization model. In: ICDCS conference proceedings. IEEE, pp 620\u2013629","DOI":"10.1109\/ICDCS.2005.48"},{"key":"304_CR23","doi-asserted-by":"crossref","unstructured":"Kalnis P, Ghinita G, Mouratidis K, Papadias D (2007) Preventing location-based identity inference in anonymous spatial queries. IEEE Transactions on Knowledge and Data Engineering","DOI":"10.1109\/TKDE.2007.190662"},{"issue":"2","key":"304_CR24","first-page":"123","volume":"3","author":"M Damiani","year":"2010","unstructured":"Damiani M, Bertino E, Silvestri C (2010) The PROBE framework for the personalized cloaking of private locations. Transactions on Data Privacy 3(2):123\u2013148","journal-title":"Transactions on Data Privacy"},{"issue":"4","key":"304_CR25","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1109\/MPRV.2011.18","volume":"10","author":"ML Damiani","year":"2011","unstructured":"Damiani ML, Silvestri C, Bertino E. (2011) Fine-Grained cloaking of sensitive positions in Location-Sharing applications. IEEE Pervasive Comput 10(4):64\u201372","journal-title":"IEEE Pervasive Comput"},{"key":"304_CR26","volume-title":"Symposium hotpets 2013. online version: http:\/\/freehaven.net\/anonbib\/papers\/pets2013\/paper_57.pdf","author":"K Chatzikokolakis","year":"2013","unstructured":"Chatzikokolakis K, Andr\u00e9s ME, Bordenabe NE, Palamidessi C (2013) Broadening the scope of differential privacy using metrics. In: Symposium hotpets 2013. online version: http:\/\/freehaven.net\/anonbib\/papers\/pets2013\/paper_57.pdf"},{"key":"304_CR27","volume-title":"2013 ACM SIGSAC conference on computer and communications security","author":"M Andr\u00e9s","year":"2013","unstructured":"Andr\u00e9s M, Bordenabe E, Chatzikokolakis K, Palamidessi C (2013) Geo-indistinguishability: differential privacy for location-based systems. In: 2013 ACM SIGSAC conference on computer and communications security"},{"issue":"10","key":"304_CR28","first-page":"919","volume":"7","author":"H To","year":"2014","unstructured":"To H, Ghinita G, Shahabi C (2014) A framework for protecting worker location privacy in spatial crowdsourcing. PVLDB 7(10):919\u2013930","journal-title":"PVLDB"},{"key":"304_CR29","first-page":"3:1","volume-title":"Proceedings of the 2nd workshop on privacy in geographic information collection and analysis, GeoPrivacy@SIGSPATIAL 2015, Bellevue, WA, USA, November 3-6, 2015","author":"H To","year":"2015","unstructured":"To H, Fan L, Shahabi C (2015) Differentially private h-tree. In: Proceedings of the 2nd workshop on privacy in geographic information collection and analysis, GeoPrivacy@SIGSPATIAL 2015, Bellevue, WA, USA, November 3-6, 2015, pp 3:1\u20133:8"},{"key":"304_CR30","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1007\/978-3-319-22363-6_17","volume-title":"Proceedings of international symposium on spatial and temporal databases (SSTD)","author":"M Maruseac","year":"2015","unstructured":"Maruseac M, Ghinita G, Avci B, Trajcevski G, Scheuermann P (2015) Privacy-preserving detection of anomalous phenomena in crowdsourced environmental sensing. In: Proceedings of international symposium on spatial and temporal databases (SSTD), pp 313\u2013332"}],"container-title":["GeoInformatica"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10707-017-0304-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10707-017-0304-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10707-017-0304-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,28]],"date-time":"2019-09-28T14:11:44Z","timestamp":1569679904000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10707-017-0304-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7,5]]},"references-count":30,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2017,10]]}},"alternative-id":["304"],"URL":"https:\/\/doi.org\/10.1007\/s10707-017-0304-3","relation":{},"ISSN":["1384-6175","1573-7624"],"issn-type":[{"value":"1384-6175","type":"print"},{"value":"1573-7624","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,7,5]]}}}