{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T03:27:10Z","timestamp":1762918030496,"version":"3.37.3"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2019,6,29]],"date-time":"2019-06-29T00:00:00Z","timestamp":1561766400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,6,29]],"date-time":"2019-06-29T00:00:00Z","timestamp":1561766400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"The National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61404001"],"award-info":[{"award-number":["61404001"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"The Top Talents Cultivation Project of Anhui Colleges and Universities","award":["gxbjZD15"],"award-info":[{"award-number":["gxbjZD15"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Wireless Inf Networks"],"published-print":{"date-parts":[[2019,9]]},"DOI":"10.1007\/s10776-019-00441-y","type":"journal-article","created":{"date-parts":[[2019,6,29]],"date-time":"2019-06-29T12:02:47Z","timestamp":1561809767000},"page":"165-173","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Node Attributed Query Access Algorithm Based on Improved Personalized Differential Privacy Protection in Social Network"],"prefix":"10.1007","volume":"26","author":[{"given":"Xiaobo","family":"Yin","sequence":"first","affiliation":[]},{"given":"Shunxiang","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Hui","family":"Xu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,6,29]]},"reference":[{"issue":"5","key":"441_CR1","doi-asserted-by":"publisher","first-page":"1104","DOI":"10.1049\/cje.2017.08.008","volume":"27","author":"Y Li","year":"2018","unstructured":"Y. Li, S. Liu, D. Li, et al., Release connection fingerprints in social networks using personalized diffierential privacy, Chinese Journal of Electronics, Vol. 27, No. 5, pp. 1104\u20131110, 2018.","journal-title":"Chinese Journal of Electronics"},{"key":"441_CR2","doi-asserted-by":"crossref","unstructured":"Z. Wang, J. Hu, R. Lv, et al. Personalized privacy-preserving task allocation for mobile crowdsensing. IEEE Transactions on Mobile Computing, 2018.","DOI":"10.1109\/TMC.2018.2861393"},{"issue":"3","key":"441_CR3","doi-asserted-by":"publisher","first-page":"1585","DOI":"10.1007\/s11277-015-2300-y","volume":"82","author":"I Memon","year":"2015","unstructured":"I. Memon, Authentication user\u2019s privacy: an integrating location privacy protection algorithm for secure moving objects in location based services, Wireless Personal Communications, Vol. 82, No. 3, pp. 1585\u20131600, 2015.","journal-title":"Wireless Personal Communications"},{"issue":"8","key":"441_CR4","doi-asserted-by":"publisher","first-page":"3628","DOI":"10.1109\/TII.2017.2773646","volume":"14","author":"C Yin","year":"2017","unstructured":"C. Yin, J. Xi, R. Sun, et al., Location privacy protection based on differential privacy strategy for big data in industrial internet-of-things, IEEE Transactions on Industrial Informatics, Vol. 14, No. 8, pp. 3628\u20133636, 2017.","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"441_CR5","doi-asserted-by":"crossref","unstructured":"J. D. Zhang, and C. Y. Chow. Enabling probabilistic differential privacy protection for location recommendations. IEEE Transactions on Services Computing, 2018.","DOI":"10.1109\/TSC.2018.2810890"},{"issue":"03","key":"441_CR6","doi-asserted-by":"publisher","first-page":"1580006","DOI":"10.1142\/S0218843018500065","volume":"27","author":"Z Hu","year":"2018","unstructured":"Z. Hu, J. Yang and J. Zhang, Personalized trajectory privacy protection method based on user-requirement, International Journal of Cooperative Information Systems, Vol. 27, No. 03, p. 1580006, 2018.","journal-title":"International Journal of Cooperative Information Systems"},{"issue":"4","key":"441_CR7","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/s10916-016-0446-0","volume":"40","author":"C Lin","year":"2016","unstructured":"C. Lin, Z. Song, H. Song, et al., Differential privacy preserving in big data analytics for connected health, Journal of Medical Systems, Vol. 40, No. 4, p. 97, 2016.","journal-title":"Journal of Medical Systems"},{"issue":"7","key":"441_CR8","doi-asserted-by":"publisher","first-page":"8911","DOI":"10.1007\/s11042-018-6680-3","volume":"78","author":"Y Jin","year":"2019","unstructured":"Y. Jin, Z. Qian and G. Sun, A real-time multimedia streaming transmission control mechanism based on edge cloud computing and opportunistic approximation optimization, Multimedia Tools and Applications, Vol. 78, No. 7, pp. 8911\u20138926, 2019.","journal-title":"Multimedia Tools and Applications"},{"issue":"6","key":"441_CR9","doi-asserted-by":"publisher","first-page":"1217","DOI":"10.1109\/TMM.2016.2537216","volume":"18","author":"P Zhou","year":"2016","unstructured":"P. Zhou, Y. Zhou, D. O. Wu, et al., Differentially private online learning for cloud-based video recommendation with multimedia big data in social networks, IEEE Transactions on Multimedia, Vol. 18, No. 6, pp. 1217\u20131229, 2016.","journal-title":"IEEE Transactions on Multimedia"},{"key":"441_CR10","doi-asserted-by":"crossref","unstructured":"L. Ou, Z. Qin, Y. Liu, et al. Multi-user location correlation protection with differential privacy. In 2016 IEEE 22nd International Conference on Parallel and Distributed Systems (ICPADS). IEEE, 2016.","DOI":"10.1109\/ICPADS.2016.0064"},{"issue":"04","key":"441_CR11","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1142\/S0219691317500333","volume":"15","author":"W Nie","year":"2017","unstructured":"W. Nie and C. Wang, Probability comprehension of differential privacy for privacy protection algorithms: a new measure, International Journal of Wavelets, Multiresolution and Information Processing, Vol. 15, No. 04, p. 12, 2017.","journal-title":"International Journal of Wavelets, Multiresolution and Information Processing"},{"issue":"3","key":"441_CR12","doi-asserted-by":"publisher","first-page":"358","DOI":"10.1214\/17-STS641","volume":"33","author":"Y Rinott","year":"2018","unstructured":"Y. Rinott, C. M. O\u2019Keefe, N. Shlomo, et al., Confidentiality and differential privacy in the dissemination of frequency tables, Statistical Science, Vol. 33, No. 3, pp. 358\u2013385, 2018.","journal-title":"Statistical Science"},{"key":"441_CR13","doi-asserted-by":"crossref","unstructured":"B. Chakraborty, S. Verma, K. P. Singh. Staircase based differential privacy with branching mechanism for location privacy preservation in wireless sensor networks. Computers & Security, 2018: S016740481830227X.","DOI":"10.1016\/j.cose.2018.03.002"},{"issue":"8","key":"441_CR14","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/MCOM.2018.1701080","volume":"56","author":"X Chugui","year":"2018","unstructured":"X. Chugui, R. Ju, Z. Deyu, et al., Distilling at the edge: a local differential privacy obfuscation framework for IoT data analytics, IEEE Communications Magazine, Vol. 56, No. 8, pp. 20\u201325, 2018.","journal-title":"IEEE Communications Magazine"},{"key":"441_CR15","doi-asserted-by":"crossref","unstructured":"S. Wang, L. Huang, Y. Nie, et al. Local differential private data aggregation for discrete distribution estimation. IEEE Transactions on Parallel and Distributed Systems, 2019.","DOI":"10.1109\/TPDS.2019.2899097"},{"issue":"2","key":"441_CR16","doi-asserted-by":"publisher","first-page":"410","DOI":"10.3390\/s18020410","volume":"18","author":"W Jun","year":"2018","unstructured":"W. Jun, Z. Rongbo, L. Shubo, et al., Node location privacy protection based on differentially private grids in industrial wireless sensor networks, Sensors, Vol. 18, No. 2, p. 410, 2018.","journal-title":"Sensors"},{"key":"441_CR17","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1016\/j.knosys.2018.04.027","volume":"153","author":"J Soria-Comas","year":"2018","unstructured":"J. Soria-Comas and J. Domingo-Ferrer, Differentially private data publishing via optimal univariate microaggregation and record perturbation, Knowledge-Based Systems, Vol. 153, pp. 78\u201390, 2018.","journal-title":"Knowledge-Based Systems"},{"issue":"4","key":"441_CR18","first-page":"591","volume":"15","author":"Q Wang","year":"2018","unstructured":"Q. Wang, et al., Real-time and spatio-temporal crowd-sourced social network data publishing with differential privacy, IEEE Transactions on Dependable and Secure Computing, Vol. 15, No. 4, pp. 591\u2013606, 2018.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"441_CR19","doi-asserted-by":"crossref","unstructured":"Y. Wang, L. Yang, X. Chen, et al. Enhancing social network privacy with accumulated non-zero prior knowledge. Information Sciences, 2018: S0020025517300828.","DOI":"10.1016\/j.ins.2018.02.031"},{"key":"441_CR20","doi-asserted-by":"crossref","unstructured":"R. Wei, H. Tian, H. Shen. Improving, k -anonymity based privacy preservation for collaborative filtering. Computers & Electrical Engineering, 2018: S0045790617319377.","DOI":"10.1016\/j.compeleceng.2018.02.017"},{"key":"441_CR21","doi-asserted-by":"crossref","unstructured":"Z. Wei, Y. Wu, Y. Yang, et al. AutoPrivacy: automatic privacy protection and tagging suggestion for mobile social photo. Computers & Security, 2018: S0167404817302626.","DOI":"10.1016\/j.cose.2017.12.002"},{"issue":"1","key":"441_CR22","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1109\/TMM.2017.2728479","volume":"20","author":"S Ciftci","year":"2017","unstructured":"S. Ciftci, A. O. Akyuz and T. Ebrahimi, A reliable and reversible image privacy protection based on false colors, IEEE Transactions on Multimedia, Vol. 20, No. 1, pp. 68\u201381, 2017.","journal-title":"IEEE Transactions on Multimedia"},{"issue":"4","key":"441_CR23","first-page":"934","volume":"16","author":"H To","year":"2017","unstructured":"H. To, G. Ghinita, L. Fan, et al., Differentially private location protection for worker datasets in spatial crowdsourcing, IEEE Transactions on Mobile Computing, Vol. 16, No. 4, pp. 934\u2013949, 2017.","journal-title":"IEEE Transactions on Mobile Computing"},{"issue":"7","key":"441_CR24","doi-asserted-by":"publisher","first-page":"6561","DOI":"10.1109\/TVT.2018.2808347","volume":"67","author":"X Dong","year":"2018","unstructured":"X. Dong, Y. Gong, J. Ma, et al., Protecting operation-time privacy of primary users in downlink cognitive two-tier networks, IEEE Transactions on Vehicular Technology, Vol. 67, No. 7, pp. 6561\u20136572, 2018.","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"441_CR25","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1016\/j.cose.2016.12.010","volume":"66","author":"J Le","year":"2017","unstructured":"J. Le, X. Liao and B. Yang, Full autonomy: a novel individualized anonymity model for privacy preserving, Computers & Security, Vol. 66, pp. 204\u2013217, 2017.","journal-title":"Computers & Security"},{"issue":"1","key":"441_CR26","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1007\/s12083-015-0410-7","volume":"10","author":"H Bao","year":"2017","unstructured":"H. Bao and R. Lu, A lightweight data aggregation scheme achieving privacy preservation and data integrity with differential privacy and fault tolerance, Peer-to-Peer Networking and Applications, Vol. 10, No. 1, pp. 106\u2013121, 2017.","journal-title":"Peer-to-Peer Networking and Applications"},{"issue":"6","key":"441_CR27","doi-asserted-by":"publisher","first-page":"777","DOI":"10.1007\/s00778-010-0193-7","volume":"19","author":"AC Squicciarini","year":"2010","unstructured":"A. C. Squicciarini, M. Shehab and J. Wede, Privacy policies for shared content in social network sites, Vldb Journal, Vol. 19, No. 6, pp. 777\u2013796, 2010.","journal-title":"Vldb Journal"},{"issue":"3","key":"441_CR28","doi-asserted-by":"publisher","first-page":"829","DOI":"10.1109\/TMC.2016.2561281","volume":"16","author":"AM Olteanu","year":"2016","unstructured":"A. M. Olteanu, K. Huguenin, R. Shokri, et al., Quantifying interdependent privacy risks with location data, IEEE Transactions on Mobile Computing, Vol. 16, No. 3, pp. 829\u2013842, 2016.","journal-title":"IEEE Transactions on Mobile Computing"}],"container-title":["International Journal of Wireless Information Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10776-019-00441-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10776-019-00441-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10776-019-00441-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,27]],"date-time":"2020-06-27T23:14:45Z","timestamp":1593299685000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10776-019-00441-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6,29]]},"references-count":28,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2019,9]]}},"alternative-id":["441"],"URL":"https:\/\/doi.org\/10.1007\/s10776-019-00441-y","relation":{},"ISSN":["1068-9605","1572-8129"],"issn-type":[{"type":"print","value":"1068-9605"},{"type":"electronic","value":"1572-8129"}],"subject":[],"published":{"date-parts":[[2019,6,29]]},"assertion":[{"value":"11 May 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 June 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 June 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 June 2019","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}