{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T10:38:08Z","timestamp":1773830288614,"version":"3.50.1"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"17","license":[{"start":{"date-parts":[[2023,11,4]],"date-time":"2023-11-04T00:00:00Z","timestamp":1699056000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,11,4]],"date-time":"2023-11-04T00:00:00Z","timestamp":1699056000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/100014718","name":"Innovative Research Group Project of the National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["No.\u00a061702321"],"award-info":[{"award-number":["No.\u00a061702321"]}],"id":[{"id":"10.13039\/100014718","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-023-17464-6","type":"journal-article","created":{"date-parts":[[2023,11,4]],"date-time":"2023-11-04T08:02:42Z","timestamp":1699084962000},"page":"50225-50243","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Continuous release of temporal correlation location statistics with local differential privacy"],"prefix":"10.1007","volume":"83","author":[{"given":"Renhao","family":"Hu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0642-9046","authenticated-orcid":false,"given":"Hongjiao","family":"Li","sequence":"additional","affiliation":[]},{"given":"Jinguo","family":"Li","sequence":"additional","affiliation":[]},{"given":"Zhaohui","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Baojin","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,11,4]]},"reference":[{"key":"17464_CR1","doi-asserted-by":"crossref","unstructured":"Zhang X, Hamm J, Reiter MK, Zhang Y (2019) Statistical privacy for streaming traffic. In: Proceedings of the 26th ISOC Symposium on network and distributed system security","DOI":"10.14722\/ndss.2019.23210"},{"issue":"4","key":"17464_CR2","first-page":"591","volume":"15","author":"Q Wang","year":"2016","unstructured":"Wang Q, Zhang Y, Lu X, Wang Z, Qin Z, Ren K (2016) Real-time and spatio-temporal crowd-sourced social network data publishing with differential privacy. IEEE Trans Dependable Secure Comput 15(4):591\u2013606","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"17464_CR3","doi-asserted-by":"crossref","unstructured":"Wang T, Hu Z (2021) Real-time stream statistics via local differential privacy in mobile crowdsensing. In: Mobile multimedia communications: 14th EAI international conference, mobimedia 2021, virtual event, proceedings. Springer, pp 432\u2013445","DOI":"10.1007\/978-3-030-89814-4_31"},{"key":"17464_CR4","doi-asserted-by":"crossref","unstructured":"Cunningham T, Cormode G, Ferhatosmanoglu H, Srivastava D (2021) Real-world trajectory sharing with local differential privacy. arXiv preprint arXiv:2108.02084","DOI":"10.14778\/3476249.3476280"},{"issue":"7","key":"17464_CR5","doi-asserted-by":"publisher","first-page":"1281","DOI":"10.1109\/TKDE.2018.2824328","volume":"31","author":"Y Cao","year":"2018","unstructured":"Cao Y, Yoshikawa M, Xiao Y, Xiong L (2018) Quantifying differential privacy in continuous data release under temporal correlations. IEEE Trans Knowl Data Eng 31(7):1281\u20131295","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"17464_CR6","doi-asserted-by":"crossref","unstructured":"Cao Y, Xiong L, Yoshikawa M, Xiao Y, Zhang S (2018) Contpl: controlling temporal privacy leakage in differentially private continuous data release. In: Proceedings of the VLDB endowment. International conference on very large data bases, vol 11. NIH Public Access, p 2090","DOI":"10.14778\/3229863.3236267"},{"key":"17464_CR7","doi-asserted-by":"crossref","unstructured":"Cao X, Cao Y, Yoshikawa M, Nakamura A (2022) Boosting utility of differentially private streaming data release under temporal correlations. In: 2022 IEEE International conference on big data (big data). IEEE, pp 6605\u20136607","DOI":"10.1109\/BigData55660.2022.10021116"},{"key":"17464_CR8","doi-asserted-by":"crossref","unstructured":"Dwork C, Naor M, Pitassi T, Rothblum GN (2010) Differential privacy under continual observation. In: Proceedings of the forty-second ACM symposium on theory of computing, pp 715\u2013724","DOI":"10.1145\/1806689.1806787"},{"key":"17464_CR9","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2020.102633","volume":"55","author":"X Xiong","year":"2020","unstructured":"Xiong X, Liu S, Li D, Cai Z, Niu X (2020) Real-time and private spatio-temporal data aggregation with local differential privacy. Journal of Information Security and Applications 55:102633","journal-title":"Journal of Information Security and Applications"},{"key":"17464_CR10","doi-asserted-by":"crossref","unstructured":"Wang H, Hong H, Xiong L, Qin Z, Hong Y (2022) L-srr: local differential privacy for location-based services with staircase randomized response. In: Proceedings of the 2022 ACM SIGSAC Conference on computer and communications security, pp 2809\u20132823","DOI":"10.1145\/3548606.3560636"},{"key":"17464_CR11","doi-asserted-by":"crossref","unstructured":"Erlingsson \u00da, Pihur V, Korolova A (2014) Rappor: randomized aggregatable privacy-preserving ordinal response. In: Proceedings of the 2014 ACM SIGSAC Conference on computer and communications security, pp 1054\u20131067","DOI":"10.1145\/2660267.2660348"},{"key":"17464_CR12","doi-asserted-by":"crossref","unstructured":"Chen Y, Machanavajjhala A, Hay M, Miklau G (2017) Pegasus: data-adaptive differentially private stream processing. In: Proceedings of the 2017 ACM SIGSAC Conference on computer and communications security, pp 1375\u20131388","DOI":"10.1145\/3133956.3134102"},{"key":"17464_CR13","doi-asserted-by":"crossref","unstructured":"Fan L, Xiong L (2012) Real-time aggregate monitoring with differential privacy. In: Proceedings of the 21st ACM International conference on information and knowledge management, pp 2169\u20132173","DOI":"10.1145\/2396761.2398595"},{"issue":"12","key":"17464_CR14","doi-asserted-by":"publisher","first-page":"1155","DOI":"10.14778\/2732977.2732989","volume":"7","author":"G Kellaris","year":"2014","unstructured":"Kellaris G, Papadopoulos S, Xiao X, Papadias D (2014) Differentially private event sequences over infinite streams. Proceedings of the VLDB endowment 7(12):1155\u20131166","journal-title":"Proceedings of the VLDB endowment"},{"key":"17464_CR15","doi-asserted-by":"crossref","unstructured":"Wang Z, Liu W, Pang X, Ren J, Liu Z, Chen Y (2020) Towards pattern-aware privacy-preserving real-time data collection. In: IEEE INFOCOM 2020-IEEE Conference on computer communications. IEEE, pp 109\u2013118","DOI":"10.1109\/INFOCOM41043.2020.9155290"},{"key":"17464_CR16","doi-asserted-by":"crossref","unstructured":"Ren X, Shi L, Yu W, Yang S, Zhao C, Xu Z (2022) Ldp-ids: local differential privacy for infinite data streams. In: Proceedings of the 2022 International conference on management of data, pp 1064\u20131077","DOI":"10.1145\/3514221.3526190"},{"key":"17464_CR17","doi-asserted-by":"crossref","unstructured":"He Y, Wang F, Deng X, Ni J, Feng J, Liu S (2022) Ordinal data stream collection with condensed local differential privacy. In: 2022 IEEE 24th Int conf on high performance computing & communications; 8th Int conf on data science & systems; 20th Int conf on smart city; 8th Int conf on dependability in sensor, cloud & big data systems & application (HPCC\/DSS\/SmartCity\/DependSys). IEEE, pp 562\u2013569","DOI":"10.1109\/HPCC-DSS-SmartCity-DependSys57074.2022.00102"},{"key":"17464_CR18","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1016\/j.future.2021.05.020","volume":"124","author":"FZ Errounda","year":"2021","unstructured":"Errounda FZ, Liu Y (2021) Collective location statistics release with local differential privacy. Futur Gener Comput Syst 124:174\u2013186","journal-title":"Futur Gener Comput Syst"},{"key":"17464_CR19","doi-asserted-by":"crossref","unstructured":"Errounda FZ, Liu Y (2018) Continuous location statistics sharing algorithm with local differential privacy. In: 2018 IEEE International conference on big data (big data), pp 5147\u20135152","DOI":"10.1109\/BigData.2018.8621876"},{"key":"17464_CR20","doi-asserted-by":"crossref","unstructured":"Xiao Y, Xiong L (2015) Protecting locations with differential privacy under temporal correlations. In: Proceedings of the 22nd ACM SIGSAC conference on computer and communications security, pp 1298\u20131309","DOI":"10.1145\/2810103.2813640"},{"key":"17464_CR21","doi-asserted-by":"crossref","unstructured":"Fang R, Han J, Yu J, Yao X, Peng H, Lu J (2021) Differentially private location preservation with staircase mechanism under temporal correlations. In: Proceedings of the 16th EAI International conference. Springer, pp 75\u201392","DOI":"10.1007\/978-3-030-67540-0_5"},{"issue":"3","key":"17464_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2043621.2043626","volume":"14","author":"T-HH Chan","year":"2011","unstructured":"Chan T-HH, Shi E, Song D (2011) Private and continual release of statistics. ACM Transactions on Information and System Security (TISSEC) 14(3):1\u201324","journal-title":"ACM Transactions on Information and System Security (TISSEC)"},{"issue":"9","key":"17464_CR23","doi-asserted-by":"crossref","first-page":"2094","DOI":"10.1109\/TKDE.2013.96","volume":"26","author":"L Fan","year":"2013","unstructured":"Fan L, Xiong L (2013) An adaptive approach to real-time aggregate monitoring with differential privacy. IEEE Trans Knowl Data Eng 26(9):2094\u20132106","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"17464_CR24","doi-asserted-by":"crossref","unstructured":"Wang Q, Zhang Y, Lu X, Wang Z, Qin Z, Ren K (2016) Rescuedp: real-time spatio-temporal crowd-sourced data publishing with differential privacy. In: IEEE INFOCOM 2016-The 35th Annual IEEE International conference on computer communications. IEEE, pp 1\u20139","DOI":"10.1109\/INFOCOM.2016.7524458"},{"key":"17464_CR25","unstructured":"Joseph M, Roth A, Ullman J, Waggoner B (2018) Local differential privacy for evolving data. Advances in Neural Information Processing Systems 31"},{"key":"17464_CR26","doi-asserted-by":"publisher","first-page":"1650","DOI":"10.1007\/s12083-021-01078-6","volume":"14","author":"D Hemkumar","year":"2021","unstructured":"Hemkumar D, Ravichandra S, Somayajulu DV (2021) Impact of data correlation on privacy budget allocation in continuous publication of location statistics. Peer-to-Peer Networking and Applications 14:1650\u20131665","journal-title":"Peer-to-Peer Networking and Applications"},{"issue":"3\u20134","key":"17464_CR27","first-page":"211","volume":"9","author":"C Dwork","year":"2014","unstructured":"Dwork C, Roth A et al (2014) The algorithmic foundations of differential privacy. Foundations and Trends\u00ae in Theoretical Computer Science 9(3\u20134):211\u2013407","journal-title":"Foundations and Trends\u00ae in Theoretical Computer Science"},{"issue":"9","key":"17464_CR28","doi-asserted-by":"publisher","first-page":"2342","DOI":"10.1109\/TIFS.2019.2895970","volume":"14","author":"Y Li","year":"2019","unstructured":"Li Y, Ren X, Yang S, Yang X (2019) Impact of prior knowledge and data correlation on privacy leakage: a unified analysis. IEEE Trans Inf Forensics Secur 14(9):2342\u20132357","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"4","key":"17464_CR29","first-page":"784","volume":"7","author":"J Chen","year":"2017","unstructured":"Chen J, Ma H, Zhao D, Liu L (2017) Correlated differential privacy protection for mobile crowdsensing. IEEE Transactions on Big Data 7(4):784\u2013795","journal-title":"IEEE Transactions on Big Data"},{"key":"17464_CR30","doi-asserted-by":"crossref","unstructured":"Rafiei M, Elkoumy G, Aalst WM (2022) Quantifying temporal privacy leakage in continuous event data publishing. In: Cooperative information systems: 28th International conference, CoopIS 2022, proceedings. Springer, pp 75\u201394","DOI":"10.1007\/978-3-031-17834-4_5"},{"issue":"1","key":"17464_CR31","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1109\/TKDE.2011.200","volume":"25","author":"J Yuan","year":"2011","unstructured":"Yuan J, Zheng Y, Xie X, Sun G (2011) T-drive: enhancing driving directions with taxi drivers\u2019 intelligence. IEEE Trans Knowl Data Eng 25(1):220\u2013232","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"17464_CR32","doi-asserted-by":"crossref","unstructured":"Sch\u00e4ler C, H\u00fctter T, Sch\u00e4ler M (2022) Benchmarking the utility of w-event differential privacy mechanisms\u2013when baselines become mighty competitors","DOI":"10.14778\/3594512.3594515"},{"key":"17464_CR33","doi-asserted-by":"crossref","unstructured":"Cocchia A (2014) Smart and digital city: a systematic literature review. Smart city: how to create public and economic value with high technology in urban space, 13\u201343","DOI":"10.1007\/978-3-319-06160-3_2"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-17464-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-023-17464-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-17464-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,15]],"date-time":"2024-05-15T07:15:13Z","timestamp":1715757313000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-023-17464-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,4]]},"references-count":33,"journal-issue":{"issue":"17","published-online":{"date-parts":[[2024,5]]}},"alternative-id":["17464"],"URL":"https:\/\/doi.org\/10.1007\/s11042-023-17464-6","relation":{},"ISSN":["1573-7721"],"issn-type":[{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,11,4]]},"assertion":[{"value":"24 May 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 September 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 October 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 November 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This study only base on the theoretical basic research. It is not involving humans.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to participate"}},{"value":"All authors give consent for the publication of identifable details, which can include photograph(s) and\/or videos and\/or case history and\/or details within the text (\u201cMaterial\u201d) to be published in the Journal of Multimedia Tools and Applications.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare that they have no conflict of interest.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conficts of interest\/Competing interests"}}]}}