{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T20:58:33Z","timestamp":1771275513635,"version":"3.50.1"},"reference-count":89,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2017,3,8]],"date-time":"2017-03-08T00:00:00Z","timestamp":1488931200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2018,3]]},"DOI":"10.1007\/s11042-017-4469-4","type":"journal-article","created":{"date-parts":[[2017,3,8]],"date-time":"2017-03-08T11:49:49Z","timestamp":1488973789000},"page":"5563-5607","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":57,"title":["Location monitoring approach: multiple mix-zones with location privacy protection based on traffic flow over road networks"],"prefix":"10.1007","volume":"77","author":[{"given":"Qasim Ali","family":"Arain","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Imran","family":"Memon","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Zhongliang","family":"Deng","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Muhammad Hammad","family":"Memon","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Farman Ali","family":"Mangi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Asma","family":"Zubedi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2017,3,8]]},"reference":[{"key":"4469_CR1","doi-asserted-by":"crossref","unstructured":"Adigun A, Amar Bensaber B, Biskri I (2013) Protocol of Change Pseudonyms for VANETs. 9th IEEE International Workshop on Performance and Management of Wireless and Mobile Networks, Local Computer Networks Workshops (LCN Workshops), 2013 I.E. 38th Conference on. pp. 162\u20137, ISBN: 978\u20131\u20134799-0539-3, 21\u201324 October 2013, Sydney, NSW","DOI":"10.1109\/LCNW.2013.6758514"},{"key":"4469_CR2","doi-asserted-by":"crossref","unstructured":"Adu-Gyamfi D, Wang Y, Zhang F, Domenic MK, Memon I, Gustav YH (2013) Modeling the spreading behavior of passive worms in mobile social networks. 6th International Conference on Information Management, Innovation Management and Industrial Engineering (ICIII), 2013.","DOI":"10.1109\/ICIII.2013.6702953"},{"key":"4469_CR3","unstructured":"Akhtar R, Amin NU, Memon I, Shah M (2012) Implementation of secure AODV in MANET. International Conference on Graphic and Image Processing, 876803\u2013876803-5"},{"key":"4469_CR4","doi-asserted-by":"crossref","unstructured":"Akhtar R, Leng S, Wu F, Memon I (2013) Improvement of content delivery in Mobile Social Networks. In: Computational Problem-solving (ICCP), 2013 International Conference on 2013 Oct 26, pp 139\u2013143, IEEE","DOI":"10.1109\/ICCPS.2013.6893572"},{"key":"4469_CR5","unstructured":"Akhtar R, Leng S, Memon I, Ali M, Zhang L (2014) Architecture of hybrid mobile social networks for efficient content delivery. Wirel Pers Commun 80(1):85\u201396"},{"key":"4469_CR6","doi-asserted-by":"publisher","unstructured":"Arain QA, Zhongliang D, Memon I, Arain S, Shaikh FK, Zubedi A, Unar MA, Ashraf A, Shaikh R (2016a) Privacy preserving dynamic pseudonym-based multiple mix-zones authentication protocol over road networks. Wireless Pers Commun 1\u201317. doi: 10.1007\/s11277-016-3906-4","DOI":"10.1007\/s11277-016-3906-4"},{"key":"4469_CR7","doi-asserted-by":"publisher","unstructured":"Arain QA, Uqaili MA, Deng Z, Memon I, Jiao J, Shaikh MA, Zubedi A, Ashraf A, Arain UA (2016b) Clustering based energy efficient and communication protocol for multiple mix-zones over road networks. Wireless Pers Commun 1\u201318. doi: 10.1007\/s11277-016-3900-x","DOI":"10.1007\/s11277-016-3900-x"},{"key":"4469_CR8","unstructured":"Baidu Map. http:\/\/lbsyun.baidu.com\/index.php?title=androidsdk . Accessed 1 Dec 2015"},{"key":"4469_CR9","doi-asserted-by":"crossref","unstructured":"Bamba B, Liu L, Pesti P, Wang T (2008) Supporting anonymous location queries in mobile environments with privacygrid. In: Proceedings of the 17th international conference on World Wide Web 2008 Apr 21, pp 237\u2013246, ACM","DOI":"10.1145\/1367497.1367531"},{"key":"4469_CR10","doi-asserted-by":"crossref","unstructured":"Bao J, Chen H, Ku WS et al. (2009) Pros: a peer-to-peer system for location privacy protection on road networks. In: 17th ACM SIGSPATIAL international conference on advances in geographic information systems (GIS), 2009, p 552\u20133","DOI":"10.1145\/1653771.1653872"},{"key":"4469_CR11","unstructured":"Bing Maps. http:\/\/www.bing.com\/maps"},{"key":"4469_CR12","doi-asserted-by":"crossref","unstructured":"Butty\u00e1n L, Holczer T, Weimerskirch A (Oct 2009) Whyte W (2009) slow: a practical pseudonym changing scheme for location privacy in vanets. IEEE Vehicular Networking Conference 1\u20138","DOI":"10.1109\/VNC.2009.5416380"},{"key":"4469_CR13","doi-asserted-by":"publisher","unstructured":"Yeong-Sheng Chen, Tang-Te Lo, Chiu-Hua Lee, Ai-Chun Pang (2013). Efficient Pseudonym Changing Schemes for Location Privacy Protection in VANETs.2013 International Conference on Connected Vehicles and Expo (ICCVE). doi: 10.1109\/ICCVE.2013.185","DOI":"10.1109\/ICCVE.2013.185"},{"key":"4469_CR14","doi-asserted-by":"crossref","unstructured":"Chow C-Y, Mokbel MF (2007) Enabling private continuous queries for revealed user locations. In: Proceedings of 10th international conference on advances in spatial and temporal databases (SSTD); 2007. p. 258\u201373.","DOI":"10.1007\/978-3-540-73540-3_15"},{"issue":"3","key":"4469_CR15","doi-asserted-by":"crossref","first-page":"571","DOI":"10.1007\/s10707-010-0117-0","volume":"15","author":"C-Y Chow","year":"2011","unstructured":"Chow C-Y, Mokbel MF, Bao J, Liu X et al (2011) Query-aware location anonymization for road networks. GeoInformatica 15(3):571\u2013607","journal-title":"GeoInformatica"},{"key":"4469_CR16","unstructured":"Foursqure. http:\/\/foursquare.com"},{"key":"4469_CR17","unstructured":"Freudiger J, Raya M, F\u00e9legyh\u00e1zi M, Papadimitratos P, Hubaux J-P (2007) Mixzones for location privacy in vehicular networks. ACM Win-ITS, 2007"},{"key":"4469_CR18","first-page":"324","volume-title":"Proceedings of the ACM conference on computer and communications security(CCS)","author":"J Freudiger","year":"2009","unstructured":"Freudiger J, Manshaei H et al (2009) On non-cooperative location privacy: a game-theoretic analysis. In: Proceedings of the ACM conference on computer and communications security(CCS). ACM, Chicago, pp 324\u2013337"},{"key":"4469_CR19","doi-asserted-by":"crossref","unstructured":"Freudiger J, Manshaei MH, Boudec J-YL, Hubaux J-P (2010) On the age of pseudonyms in mobile ad hoc networks. INFOCOM, 2010 Proceedings IEEE, pp 1\u20139, March 2010","DOI":"10.1109\/INFCOM.2010.5461975"},{"key":"4469_CR20","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1186\/s13638-016-0708-z","volume":"2016","author":"K Gao","year":"2016","unstructured":"Gao K, Zhu Y, Gong S, Tan H (2016) Location privacy protection algorithm for mobile networks. J Wireless Com Network 2016:205. doi: 10.1186\/s13638-016-0708-z","journal-title":"J Wireless Com Network"},{"key":"4469_CR21","unstructured":"Google Maps. http:\/\/map.google.com"},{"key":"4469_CR22","unstructured":"Google Maps Has 150 Million Mobile Users. http:\/\/news.softpedia.com\/news\/Google-Maps-Has-150-Million-Mobile-Users-189262.shtml"},{"key":"4469_CR23","doi-asserted-by":"crossref","unstructured":"Guo S, Zeng D, Xiang Y (2014) Chameleon Hashing for Secure and Privacy-Preserving Vehicular Communications. Parallel and Distributed Systems, IEEE Transactions on, Issue Date: Nov 2014","DOI":"10.1109\/TPDS.2013.277"},{"key":"4469_CR24","doi-asserted-by":"publisher","unstructured":"Gustav YH, Wang Y, Kamenyi DM, Zhang F, Memon I (2013) Velocity similarity anonymization for continuous query location based services. In 2013 International conference on computational problem-solving (ICCP) p 433\u2013436. doi: 10.1109\/ICCPS.2013.6893578","DOI":"10.1109\/ICCPS.2013.6893578"},{"key":"4469_CR25","doi-asserted-by":"crossref","unstructured":"Haas JJ, Hu Y-C, Laberteaux KP et al. (2009) Real-world VANET security protocol performance. In: Proceedings of the 28th IEEE conference on global telecommunications. Hawaii, USA; 2009. p 2629\u201335","DOI":"10.1109\/GLOCOM.2009.5426188"},{"key":"4469_CR26","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1016\/j.neucom.2016.05.101","volume":"220","author":"S Hao","year":"2017","unstructured":"Hao S, Wang W, Yan Y, Bruzzone L (2017) Class-wise dictionary learning for hyperspectral image classification. Neurocomputing 220:121\u2013129","journal-title":"Neurocomputing"},{"key":"4469_CR27","doi-asserted-by":"crossref","unstructured":"Huan Q, Avramopoulos IC, Kobayashi H, Liu B (2005) Secure data forwarding in wireless ad hoc networks. In: Communications. ICC 2005. 2005 I.E. International Conference on 2005 May 16 (Vol. 5, pp. 3525\u20133531). IEEE","DOI":"10.1109\/ICC.2005.1495075"},{"key":"4469_CR28","first-page":"165","volume-title":"Silent cascade: enhancing location privacy without communication QoS degradation","author":"L Huang","year":"2006","unstructured":"Huang L, Matsuura K, Yamane H, Sezaki K (2006) Silent cascade: enhancing location privacy without communication QoS degradation. Proceedings of SPC, In, pp 165\u2013180"},{"key":"4469_CR29","doi-asserted-by":"publisher","unstructured":"Huang X, Kang J, Yu R (2015) Optimal roadside unit placement with location privacy enhancement in vehicular social network. 5th International Conference on Information Science and Technology (ICIST), 2015. doi: 10.1109\/ICIST.2015.7288978","DOI":"10.1109\/ICIST.2015.7288978"},{"issue":"3","key":"4469_CR30","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1109\/MSP.2004.26","volume":"2","author":"JP Hubaux","year":"2004","unstructured":"Hubaux JP, Capkun S, Luo J et al (2004) The security and privacy of smart vehicles. IEEE Sec Privacy Mag 2(3):49\u201355","journal-title":"IEEE Sec Privacy Mag"},{"issue":"12","key":"4469_CR31","doi-asserted-by":"crossref","first-page":"1719","DOI":"10.1109\/TKDE.2007.190662","volume":"19","author":"P Kainis","year":"2007","unstructured":"Kainis P, Ghinita G, Mouratidis K, Papadias D (2007) Preventing location-based identity inference in anonymous spatial queries. IEEE Trans Knowl Data Eng 19(12):1719\u20131733","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"4469_CR32","doi-asserted-by":"publisher","unstructured":"M. Kamenyi Domenic, Yong Wan, Fengli Zhang, Imran Memon, Yankson H. Gustav (2013) Preserving users' privacy for continuous query services in road networks. 6th International Conference on Information Management, Innovation Management and Industrial Engineering (ICIII), 2013. doi: 10.1109\/ICIII.2013.6702947","DOI":"10.1109\/ICIII.2013.6702947"},{"issue":"24","key":"4469_CR33","first-page":"9857","volume":"9","author":"DM Kamenyi","year":"2013","unstructured":"Kamenyi DM, Wang Y, Zhang F, Memon I (2013) Authenticated privacy preserving for continuous query in location based services. J Comput Inf Syst 9(24):9857\u20139864","journal-title":"J Comput Inf Syst"},{"key":"4469_CR34","doi-asserted-by":"crossref","unstructured":"Kolahdouzan M, Shahabi C (2004) Voronoi-based K nearest neighbor search for spatial network databases. In: Thirtieth international conference on very large data bases, vol. 30 (VLDB), p 840\u201351","DOI":"10.1016\/B978-012088469-8.50074-7"},{"key":"4469_CR35","unstructured":"Ku WS, Zimmermann R, Peng WC (2007) Shroff S. Privacy protected query processing on spatial networks. In: 2007 I.E. 23rd international conference on data engineering workshop (PDM), p 215\u201320"},{"key":"4469_CR36","volume-title":"Search me if you can: privacy-preserving location query service","author":"XY Li","year":"2013","unstructured":"Li XY, Jung T (2013) Search me if you can: privacy-preserving location query service. Proceedings of the IEEE INFOCOM, In"},{"key":"4469_CR37","doi-asserted-by":"crossref","unstructured":"Liu F, Hua KA, Cai Y (2009) Query l-diversity in location-based services. In: Mobile Data Management: Systems, Services and Middleware. MDM\u201909. Tenth International Conference on 2009 May 18 (pp. 436\u2013442), IEEE","DOI":"10.1109\/MDM.2009.72"},{"key":"4469_CR38","first-page":"972","volume":"2012","author":"XX Liu","year":"2012","unstructured":"Liu XX, Zhao H, Pan M, Yue H, Li X, Fang Y et al (2012a) Traffic-aware multiple mix zone placement for protecting location privacy. In YIEEE INFOCOM 2012:972\u2013980","journal-title":"In YIEEE INFOCOM"},{"key":"4469_CR39","doi-asserted-by":"publisher","unstructured":"Xinxin Liu, Han Zhao, Miao Pan, Hao Yue, Xiaolin Li and Yuguang Fang (2012b) Traffic-Aware Multiple Mix Zone Placement for Protecting Location Privacy. Proceedings IEEE INFOCOM, pp 972\u2013980. doi: 10.1109\/INFCOM.2012.6195848","DOI":"10.1109\/INFCOM.2012.6195848"},{"issue":"1","key":"4469_CR40","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1109\/TVT.2011.2162864","volume":"61","author":"R Lu","year":"2012","unstructured":"Lu R, Lin X, Luan TH, Liang X, Shen XS (2012) Pseudonym changing at social spots: an effective strategy for location privacy in vanets. IEEE Trans Veh Technol 61(1):86\u201396","journal-title":"IEEE Trans Veh Technol"},{"issue":"3","key":"4469_CR41","doi-asserted-by":"crossref","first-page":"1585","DOI":"10.1007\/s11277-015-2300-y","volume":"82","author":"I Memon","year":"2015","unstructured":"Memon I (2015a) Authentication User\u2019s privacy: an integrating location privacy protection algorithm for secure moving objects in location based services. Wirel Pers Commun 82(3):1585\u20131600","journal-title":"Wirel Pers Commun"},{"issue":"3","key":"4469_CR42","doi-asserted-by":"crossref","first-page":"1167","DOI":"10.1007\/s11277-015-2833-0","volume":"85","author":"I Memon","year":"2015","unstructured":"Memon I (2015b) A secure and efficient communication scheme with authenticated key establishment protocol for road networks. Wirel Pers Commun 85(3):1167\u20131191","journal-title":"Wirel Pers Commun"},{"key":"4469_CR43","doi-asserted-by":"publisher","unstructured":"Memon I, Arain QA (2016) Dynamic path privacy protection framework for continuous query service over road networks. World Wide Web:1\u201333. doi: 10.1007\/s11280-016-0403-3","DOI":"10.1007\/s11280-016-0403-3"},{"issue":"2","key":"4469_CR44","first-page":"3","volume":"10","author":"I Memon","year":"2013","unstructured":"Memon I, Mangi FA, Jamro DA (2013) Collision avoidance of intelligent service robot for industrial security system. IJCSI Intern J Comp Sci Issue 10(2):3","journal-title":"IJCSI Intern J Comp Sci Issue"},{"issue":"1","key":"4469_CR45","doi-asserted-by":"crossref","first-page":"661","DOI":"10.1007\/s11277-014-1879-8","volume":"79","author":"I Memon","year":"2014","unstructured":"Memon I, Mohammed MR, Akhtar R, Memon H, Memon MH, Shaikh RA (2014) Design and implementation to authentication over a GSM system using certificate-less public key cryptography (CL-PKC). Wirel Pers Commun 79(1):661\u2013686","journal-title":"Wirel Pers Commun"},{"key":"4469_CR46","doi-asserted-by":"publisher","first-page":"1347","DOI":"10.1007\/s11277-014-2082-7","volume":"80","author":"I Memon","year":"2015","unstructured":"Memon I, Chen L, Majid A, Lv M, Hussain I, Chen G (2015a) Travel recommendation using geo-tagged photos in social Medi a for tourist. Wirel Pers Commun 80:1347\u20131362. doi: 10.1007\/s11277-014-2082-7","journal-title":"Wirel Pers Commun"},{"issue":"2","key":"4469_CR47","doi-asserted-by":"crossref","first-page":"1487","DOI":"10.1007\/s11277-015-2699-1","volume":"84","author":"I Memon","year":"2015","unstructured":"Memon I, Hussain I, Akhtar R, Chen G (2015b) Enhanced privacy and authentication: an efficient and secure anonymous communication for location based service using asymmetric cryptography scheme. Wirel Pers Commun 84(2):1487\u20131508","journal-title":"Wirel Pers Commun"},{"key":"4469_CR48","doi-asserted-by":"publisher","unstructured":"Memon I, Ali Q, Zubedi A, Mangi FA (2016a) DPMM: dynamic pseudonym-based multiple mix-zones generation for mobile traveler. Multimed Tools Appl:1\u201330. doi: 10.1007\/s11042\u2013016-4154-z","DOI":"10.1007\/s11042-016-4154-z"},{"key":"4469_CR49","doi-asserted-by":"publisher","unstructured":"Memon MH, Li J-P, Memon I, Arain QA (2016b) GEO matching regions: multiple regions of interests using content based image retrieval based on relative locations. Multimed Tool Appl:1\u201335. doi: 10.1007\/s11042\u2013016-3834-z","DOI":"10.1007\/s11042-016-3834-z"},{"key":"4469_CR50","volume-title":"Hiding stars with fireworks: location privacy through camouflage","author":"J Meyerowitz","year":"2009","unstructured":"Meyerowitz J, Choudhury R (2009) Hiding stars with fireworks: location privacy through camouflage. MOBICOM, In"},{"key":"4469_CR51","unstructured":"Mokbel MF, Chow CY, Aref WG (2006) The new Casper: query processing for location services without compromising privacy. In: Proceedings of the 32nd International Conference on very large data bases 2006 Sep 1, pp 763\u2013774, VLDB Endowment"},{"issue":"1","key":"4469_CR52","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1109\/TKDE.2009.48","volume":"22","author":"K Mouratidis","year":"2010","unstructured":"Mouratidis K, Yiu ML (2010) Anonymous query processing in road networks. IEEE Trans Knowl Data Eng 22(1):2\u201315","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"4469_CR53","volume-title":"Location privacy via private proximity testing","author":"A Narayanan","year":"2011","unstructured":"Narayanan A, Thiagarajan N, Lakhani M, Hamburg M, Boneh D et al (2011) Location privacy via private proximity testing. Proceedings of the network distributed system security conference, In"},{"key":"4469_CR54","doi-asserted-by":"crossref","unstructured":"Olumofin F, Tysowski PK, Goldberg I, Hengartner U (2010). Achieving efficient query privacy for location based services. In: 10th international conference on privacy enhancing technologies (PETS), p 93\u2013110","DOI":"10.1007\/978-3-642-14527-8_6"},{"key":"4469_CR55","doi-asserted-by":"crossref","unstructured":"Palanisamy B, Liu L (2011a) MobiMix: Protecting location privacy with mix-zones over road networks. In: 2011 I.E. 27th international conference on data engineering (ICDE), p 494\u2013505","DOI":"10.1109\/ICDE.2011.5767898"},{"key":"4469_CR56","doi-asserted-by":"crossref","unstructured":"Palanisamy B, Liu L (2011b) MobiMix: protecting location privacy with mix zones over road networks. Proc. of 27th IEEE International Conference on Data Engineering (ICDE\u201911), pp 494\u2013505","DOI":"10.1109\/ICDE.2011.5767898"},{"issue":"3","key":"4469_CR57","doi-asserted-by":"crossref","first-page":"495","DOI":"10.1109\/TMC.2014.2321747","volume":"14","author":"B Palanisamy","year":"2015","unstructured":"Palanisamy B, Liu L (2015) Attack-resilient mix-zones over road networks: architecture and algorithms. IEEE Trans Mob Comput 14(3):495\u2013508","journal-title":"IEEE Trans Mob Comput"},{"key":"4469_CR58","doi-asserted-by":"crossref","first-page":"1599","DOI":"10.1016\/j.jnca.2013.02.003","volume":"36","author":"Y Pan","year":"2013","unstructured":"Pan Y, Li J (2013) Cooperative pseudonym change scheme based on the number of neighbors in VANETs. J Netw Comput Appl 36:1599\u20131609","journal-title":"J Netw Comput Appl"},{"issue":"8","key":"4469_CR59","doi-asserted-by":"crossref","first-page":"1506","DOI":"10.1109\/TKDE.2011.105","volume":"24","author":"X Pan","year":"2012","unstructured":"Pan X, Xu J, Meng X (2012) Protecting location privacy against location-dependent attacks in mobile services. IEEE Trans Knowl Data Eng 24(8):1506\u20131519","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"4469_CR60","volume-title":"Nearest neighbor search with strong location privacy","author":"S Papadopoulos","year":"2010","unstructured":"Papadopoulos S, Bakiras S, Papadias D (2010) Nearest neighbor search with strong location privacy. Proceedings of the VLDB endowment, In"},{"key":"4469_CR61","volume-title":"Weber M (2009) GTMobiSIM: a mobile trace generator for road networks","author":"P Pesti","year":"2009","unstructured":"Pesti P, Bamba B, Doo M, Liu L, Palanisamy B (2009) http:\/\/code.google.com\/p\/gt-mobisim\/ Weber M (2009) GTMobiSIM: a mobile trace generator for road networks. College of Computing, Georgia Institute of Technology"},{"key":"4469_CR62","doi-asserted-by":"crossref","unstructured":"Pingley A, Zhang N, Fu XW, Choi H-A, Subramaniam S, Zhao W et al. (2011a) Protection of query privacy for continuous location based services. IEEE INFOCOM, pp 1710\u20131718","DOI":"10.1109\/INFCOM.2011.5934968"},{"key":"4469_CR63","doi-asserted-by":"crossref","unstructured":"Pingley A, Zhang N, Fu XW, Choi H-A, Subramaniam S, Zhao W (2011b) Protection of query privacy for continuous location based services. IEEE INFOCOM, pp 1710\u20131718","DOI":"10.1109\/INFCOM.2011.5934968"},{"key":"4469_CR64","first-page":"15","volume":"2010","author":"P Sadhukhan","year":"2010","unstructured":"Sadhukhan P, Chatterjee N, Das A (Dec 2010) Das PK (2010) a scalable location-based services infrastructure combining gps and bluetooth based positioning for providing services in ubiquitous environment. IMSAA 2010:15\u201317","journal-title":"IMSAA"},{"key":"4469_CR65","unstructured":"Samarati P, Sweeney L (1998) Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. Technical Report SRI-CSL-98-04. Computer Science Laboratory, SRI International"},{"key":"4469_CR66","unstructured":"Shiode N, Li C, Batty M, Longley P, Maguire D (2002) The impact and penetration of location-based services. CASA Working Paper 50 http:\/\/www.casa.ucl.ac.uk\/working_papers\/paper50.pdf . Accessed 23 June 2010"},{"key":"4469_CR67","doi-asserted-by":"crossref","first-page":"1108","DOI":"10.1007\/s12083-014-0269-z","volume":"8","author":"Y Sun","year":"2015","unstructured":"Sun Y, Zhang B, Zhao B, Xiangyu S, Jinshu S (2015) Mix-zones optimal deployment for protecting location privacy in VANET. Peer-to-Peer Netw Appl 8:1108\u20131121","journal-title":"Peer-to-Peer Netw Appl"},{"key":"4469_CR68","doi-asserted-by":"publisher","unstructured":"G Sun, D Liao, H Li, H Yu, V Chang (2016) L2P2: A location-label based approach for privacy preserving in LBS. Future Generation Computer Systems. 9th September 2016. doi: 10.1016\/j.future.2016.08.023","DOI":"10.1016\/j.future.2016.08.023"},{"key":"4469_CR69","unstructured":"U.S. Census Bureau.TIGER, TIGER\/Line and TIGER-related products. Available at http:\/\/www.census.gov\/geo\/www\/tiger\/"},{"key":"4469_CR70","unstructured":"U.S. Geological Survey. http:\/\/www.usgs.gov"},{"key":"4469_CR71","doi-asserted-by":"crossref","unstructured":"Virrantaus K, Markkula J, Garmash A, Terziyan V, Veijalainen J, Katanosov A et al. (2001) Developing GIS-supported location-based services. In: Proc. of the international conference on Web information systems engineering (Vol. 2, pp 66\u201375)","DOI":"10.1109\/WISE.2001.996708"},{"key":"4469_CR72","doi-asserted-by":"crossref","unstructured":"Wang T, Liu L (2009a) Privacy-Aware Mobile Services over Road Networks. In VLDB","DOI":"10.14778\/1687627.1687745"},{"issue":"1","key":"4469_CR73","doi-asserted-by":"crossref","first-page":"1042","DOI":"10.14778\/1687627.1687745","volume":"2","author":"T Wang","year":"2009","unstructured":"Wang T, Liu L (2009b) Privacy-aware mobile services over road networks. Proceedings of the VLDB endowment 2(1):1042\u20131053","journal-title":"Proceedings of the VLDB endowment"},{"key":"4469_CR74","doi-asserted-by":"crossref","unstructured":"Wang Y, Xia Y, Hou J, Gao SM, Nie X, Wang Q (2015) A fast privacy-preserving framework for continuous location-based queries in road networks. J Netw Comput Appl 53:57\u201373","DOI":"10.1016\/j.jnca.2015.01.004"},{"key":"4469_CR75","first-page":"2378","volume-title":"Recurrent face aging","author":"W Wang","year":"2016","unstructured":"Wang W, Cui Z, Yan Y, Feng J, Yan S, Shu X, Sebe N (2016a) Recurrent face aging. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, In, pp 2378\u20132386"},{"issue":"3","key":"4469_CR76","doi-asserted-by":"crossref","first-page":"1465","DOI":"10.1109\/TIP.2016.2523340","volume":"25","author":"W Wang","year":"2016","unstructured":"Wang W, Yan Y, Winkler S, Sebe N (2016b) Category specific dictionary learning for attribute specific feature selection. IEEE Trans Image Process 25(3):1465\u20131478","journal-title":"IEEE Trans Image Process"},{"issue":"4","key":"4469_CR77","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1109\/MMUL.2016.69","volume":"23","author":"W Wang","year":"2016","unstructured":"Wang W, Yan Y, Zhang L, Hong R, Sebe N (2016c) Collaborative sparse coding for multiview action recognition. IEEE MultiMedia 23(4):80\u201387","journal-title":"IEEE MultiMedia"},{"key":"4469_CR78","unstructured":"Yahoo Maps. http:\/\/maps.yahoo.com"},{"key":"4469_CR79","doi-asserted-by":"crossref","unstructured":"Yan C, Zhang Y, Dai F, Li L (2013) Highly parallel framework for HEVC motion estimation on many-core platform. In Data Compression Conference (DCC), 2013 Mar 20, pp 63\u201372. IEEE","DOI":"10.1109\/DCC.2013.14"},{"key":"4469_CR80","doi-asserted-by":"crossref","unstructured":"Yan C, Zhang Y, Xu J, Dai F, Li L, Dai Q, Wu F (2014a) A highly parallel framework for HEVC coding unit partitioning tree decision on many-core processors. IEEE Signal Process Lett 21(5):573\u2013576","DOI":"10.1109\/LSP.2014.2310494"},{"issue":"12","key":"4469_CR81","doi-asserted-by":"crossref","first-page":"2077","DOI":"10.1109\/TCSVT.2014.2335852","volume":"24","author":"C Yan","year":"2014","unstructured":"Yan C, Zhang Y, Xu J, Dai F, Zhang J, Dai Q, Wu F (2014b) Efficient parallel framework for HEVC motion estimation on many-core processors. IEEE Trans Circ Sys Vid Technol 24(12):2077\u20132089","journal-title":"IEEE Trans Circ Sys Vid Technol"},{"key":"4469_CR82","doi-asserted-by":"crossref","unstructured":"Yan C, Zhang Y, Dai F, Wang X, Li L, Dai Q ( 2014c) Parallel deblocking filter for HEVC on many-core processor. Electronics Letters. 27:50(5):367\u20138.","DOI":"10.1049\/el.2013.3235"},{"key":"4469_CR83","doi-asserted-by":"crossref","unstructured":"Yan C, Zhang Y, Dai F, Zhang J, Li L, Dai Q (2014d) Efficient parallel HEVC intra-prediction on many-core processor. Electronics Letters 22;50(11):805\u20136.","DOI":"10.1049\/el.2014.0611"},{"key":"4469_CR84","doi-asserted-by":"publisher","unstructured":"KT Yang, GM Chiu, HJ Lyu, DJ Huang (2012) Path privacy protection in continuous location-based services over road networks .IEEE 8th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), 2012. doi: 10.1109\/WiMOB.2012.6379110","DOI":"10.1109\/WiMOB.2012.6379110"},{"key":"4469_CR85","unstructured":"Yelp. http:\/\/www.yelp.com"},{"key":"4469_CR86","doi-asserted-by":"crossref","unstructured":"Ying B, Makraki D (2015) Reputation-based Pseudonym Change for Location Privacy in Vehicular Networks. IEEE ICC 2015- Communications software, services and multimedia applicaations symposium","DOI":"10.1109\/ICC.2015.7249449"},{"key":"4469_CR87","doi-asserted-by":"publisher","unstructured":"Ying B, Makrakis D (2015) Pseudonym changes scheme based on candidate-location-list in vehicular networks. In: IEEE international conference on communications (ICC), p 2015. doi: 10.1109\/ICC.2015.7249491","DOI":"10.1109\/ICC.2015.7249491"},{"issue":"1","key":"4469_CR88","first-page":"3","volume":"13","author":"R Yu","year":"2016","unstructured":"Yu R, Kang J, Huang X, Xie S, Zhang Y (2016) MixGroup: accumulative pseudonym exchanging for location privacy enhancement in vehicular social networks. IEEE Trans Depend Secure Comp 13(1):3\u2013105","journal-title":"IEEE Trans Depend Secure Comp"},{"key":"4469_CR89","volume-title":"Secure mix-zones for privacy protection of road network location based services users","author":"R Zuberi","year":"2016","unstructured":"Zuberi R, Ahmad S (2016) Secure mix-zones for privacy protection of road network location based services users. J Comput Netw Commun"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-017-4469-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-017-4469-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-017-4469-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,16]],"date-time":"2025-06-16T04:38:48Z","timestamp":1750048728000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-017-4469-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3,8]]},"references-count":89,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2018,3]]}},"alternative-id":["4469"],"URL":"https:\/\/doi.org\/10.1007\/s11042-017-4469-4","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,3,8]]}}}