{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:53:03Z","timestamp":1762005183505,"version":"3.37.3"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2020,5,8]],"date-time":"2020-05-08T00:00:00Z","timestamp":1588896000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,5,8]],"date-time":"2020-05-08T00:00:00Z","timestamp":1588896000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"name":"Public Safety Risk Prevention and Control and Emergency Technical Equipment","award":["2018YFC0831002"],"award-info":[{"award-number":["2018YFC0831002"]}]},{"name":"Sichuan science and technology program","award":["2019YFG0206"],"award-info":[{"award-number":["2019YFG0206"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61971105"],"award-info":[{"award-number":["61971105"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["ZYGX2019J004","ZYGX2019J125"],"award-info":[{"award-number":["ZYGX2019J004","ZYGX2019J125"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Telecommun Syst"],"published-print":{"date-parts":[[2020,9]]},"DOI":"10.1007\/s11235-020-00666-w","type":"journal-article","created":{"date-parts":[[2020,5,8]],"date-time":"2020-05-08T16:03:37Z","timestamp":1588953817000},"page":"1-14","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Achieving privacy protection for crowdsourcing application in edge-assistant vehicular networking"],"prefix":"10.1007","volume":"75","author":[{"given":"Hui","family":"Li","sequence":"first","affiliation":[]},{"given":"Lishuang","family":"Pei","sequence":"additional","affiliation":[]},{"given":"Dan","family":"Liao","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2921-5411","authenticated-orcid":false,"given":"Ming","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Du","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Xiong","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,5,8]]},"reference":[{"issue":"1","key":"666_CR1","doi-asserted-by":"crossref","first-page":"423","DOI":"10.1080\/21680566.2018.1434019","volume":"7","author":"K Yang","year":"2019","unstructured":"Yang, K., Menendez, M., & Guler, S. (2019). Implementing transit signal priority in a connected vehicle environment with and without bus stops. Transportmetrica B-Transport Dynamics,7(1), 423\u2013445.","journal-title":"Transportmetrica B-Transport Dynamics"},{"key":"666_CR2","unstructured":"Automotive Industry Trends. (2019). IoT connected smart cars vehicles. http:\/\/www.businessinsider.com\/internet-of-things-connected-smart-cars. Accessed 10 Nov 2019."},{"issue":"2","key":"666_CR3","doi-asserted-by":"crossref","first-page":"594","DOI":"10.1109\/TITS.2018.2817879","volume":"20","author":"F Rodrigues","year":"2019","unstructured":"Rodrigues, F., Henrickson, K., & Pereira, F. (2019). Multi-output gaussian processes for crowdsourced traffic data imputation. IEEE Transactions on Intelligent Transportation Systems,20(2), 594\u2013603.","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"key":"666_CR4","doi-asserted-by":"crossref","unstructured":"He, Z., Cao, J., Liu, X. (2015). High quality participant recruitment in vehicle-based crowdsourcing using predictable mobility. In INFCOM (pp. 2542\u20132559).","DOI":"10.1109\/INFOCOM.2015.7218644"},{"issue":"5","key":"666_CR5","doi-asserted-by":"crossref","first-page":"4527","DOI":"10.1109\/TVT.2018.2791402","volume":"67","author":"P Zhang","year":"2018","unstructured":"Zhang, P., Hu, C., Chen, D., et al. (2018). ShiftRoute: achieving location privacy for map services on smartphones. IEEE Transactions on Vehicular Technology,67(5), 4527\u20134538.","journal-title":"IEEE Transactions on Vehicular Technology"},{"issue":"3","key":"666_CR6","first-page":"1","volume":"5","author":"D Jiang","year":"2018","unstructured":"Jiang, D., Wang, W., Shi, L., et al. (2018). A compressive sensing-based approach to end-to-end network traffic reconstruction. IEEE Transactions on Network Science and Engineering,5(3), 1\u201312.","journal-title":"IEEE Transactions on Network Science and Engineering"},{"key":"666_CR7","doi-asserted-by":"crossref","first-page":"368","DOI":"10.1016\/j.future.2019.02.038","volume":"96","author":"X Feng","year":"2019","unstructured":"Feng, X., & Wang, L. (2019). PAU: Privacy assessment method with uncertainty consideration for cloud-based vehicular networks. Future Generation Computer Systems,96, 368\u2013375.","journal-title":"Future Generation Computer Systems"},{"key":"666_CR8","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1016\/j.jnca.2013.08.004","volume":"40","author":"W Md","year":"2014","unstructured":"Md, W., Mehdi, S., Abdullah, G., et al. (2014). A survey on vehicular cloud computing. Journal of Network and Computer Applications,40, 325\u2013344.","journal-title":"Journal of Network and Computer Applications"},{"issue":"12","key":"666_CR9","first-page":"5669","volume":"12","author":"S Lee","year":"2018","unstructured":"Lee, S., Lee, J., & Cho, H. (2018). A study of mobile edge computing system architecture for connected car media services on highway. KSII Transactions on Internet and Information Systems,12(12), 5669\u20135684.","journal-title":"KSII Transactions on Internet and Information Systems"},{"issue":"10","key":"666_CR10","doi-asserted-by":"crossref","first-page":"3305","DOI":"10.1109\/TITS.2017.2778939","volume":"19","author":"D Jiang","year":"2018","unstructured":"Jiang, D., Huo, L., Lv, Z., et al. (2018). A joint multi-criteria utility-based network selection approach for vehicle-to-infrastructure networking. IEEE Transactions on Intelligent Transportation Systems,19(10), 3305\u20133319.","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"key":"666_CR11","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/JIOT.2019.2896750","volume":"6","author":"L Zhou","year":"2019","unstructured":"Zhou, L., Yu, L., Du, S., et al. (2019). Achieving differentially private location privacy in edge-assistant connected vehicles. IEEE Internet of Things Journal,6, 1\u201310.","journal-title":"IEEE Internet of Things Journal"},{"issue":"2","key":"666_CR12","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TII.2019.2962996","volume":"16","author":"D Jiang","year":"2020","unstructured":"Jiang, D., Wang, Y., Lv, Z., et al. (2020). Big data analysis-based network behavior insight of cellular networks for industry 4.0 applications. IEEE Transactions on Industrial Informatics, 16(2), 1\u20139.","journal-title":"IEEE Transactions on Industrial Informatics"},{"issue":"1","key":"666_CR13","first-page":"1","volume":"1","author":"D Jiang","year":"2018","unstructured":"Jiang, D., Huo, L., & Song, H. (2018). Rethinking behaviors and activities of base stations in mobile cellular networks based on big data analysis. IEEE Transactions on Network Science and Engineering,1(1), 1\u201312.","journal-title":"IEEE Transactions on Network Science and Engineering"},{"issue":"11","key":"666_CR14","doi-asserted-by":"crossref","first-page":"10190","DOI":"10.1109\/TVT.2018.2867191","volume":"67","author":"T Le","year":"2018","unstructured":"Le, T., & Hu, R. (2018). Mobility-aware edge caching and computing in vehicle networks: a deep reinforcement learning. IEEE Transactions on Vehicular Technology,67(11), 10190\u201310203.","journal-title":"IEEE Transactions on Vehicular Technology"},{"issue":"12","key":"666_CR15","doi-asserted-by":"crossref","first-page":"10660","DOI":"10.1109\/TVT.2017.2714704","volume":"66","author":"J Feng","year":"2017","unstructured":"Feng, J., Liu, Z., Wu, C., et al. (2017). AVE: Autonomous vehicular edge computing framework with ACO-based scheduling. IEEE Transactions on Vehicular Technology,66(12), 10660\u201310675.","journal-title":"IEEE Transactions on Vehicular Technology"},{"issue":"8","key":"666_CR16","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/JSEN.2018.2805427","volume":"18","author":"B Gu","year":"2018","unstructured":"Gu, B., Chen, Y., Liao, H., et al. (2018). A distributed and context-aware task assignment mechanism for collaborative mobile edge computing. Sensors,18(8), 1\u201317.","journal-title":"Sensors"},{"key":"666_CR17","doi-asserted-by":"crossref","first-page":"17741","DOI":"10.1109\/ACCESS.2018.2820679","volume":"6","author":"C Huang","year":"2018","unstructured":"Huang, C., Chiang, M., Dao, D., et al. (2018). V2V data offloading for cellular network based on the software defined network (SDN) inside mobile edge computing (MEC) architecture. IEEE Access,6, 17741\u201317755.","journal-title":"IEEE Access"},{"issue":"5","key":"666_CR18","first-page":"1","volume":"13","author":"D Jiang","year":"2018","unstructured":"Jiang, D., Huo, L., & Li, Y. (2018). Fine-granularity inference and estimations to network traffic for SDN. PLoS ONE,13(5), 1\u201323.","journal-title":"PLoS ONE"},{"issue":"3","key":"666_CR19","first-page":"1","volume":"15","author":"J Sun","year":"2019","unstructured":"Sun, J., Gu, Q., Zheng, T., et al. (2019). Joint communication and computing resource allocation in vehicular edge computing. International Journal of Distributed Sensor Networks,15(3), 1\u201313.","journal-title":"International Journal of Distributed Sensor Networks"},{"issue":"11","key":"666_CR20","first-page":"1","volume":"10","author":"T Nguyen","year":"2018","unstructured":"Nguyen, T., Nguyen, V., Pham, A., et al. (2018). Cost-effective resource sharing in an internet of vehicles-employed mobile edge computing environment. Symmetry,10(11), 1\u201319.","journal-title":"Symmetry"},{"key":"666_CR21","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.simpat.2019.04.004","volume":"95","author":"C Shailsh","year":"2019","unstructured":"Shailsh, C., Naik, R., & Jose, J. (2019). Crowdsourcing-based traffic simulation for smart freight mobility. Simulation Modelling Practice and Theory,95, 1\u201315.","journal-title":"Simulation Modelling Practice and Theory"},{"key":"666_CR22","doi-asserted-by":"crossref","unstructured":"Ali, K., Al-Yaseen, D., Ejaz, A., et al. (2012). CrowdITS: Crowdsourcing in intelligent transportation systems. In Wireless communications and networking conference (WCNC) (pp. 3307\u20133311).","DOI":"10.1109\/WCNC.2012.6214379"},{"key":"666_CR23","doi-asserted-by":"crossref","first-page":"1","DOI":"10.3141\/2414-01","volume":"2414","author":"A Misra","year":"2014","unstructured":"Misra, A., Gooze, A., Watkins, K., et al. (2014). Crowdsourcing and its application to transportation data collection and management. Transportation Research Record,2414, 1\u20138.","journal-title":"Transportation Research Record"},{"issue":"4","key":"666_CR24","doi-asserted-by":"crossref","first-page":"2387","DOI":"10.1007\/s11277-019-06323-z","volume":"106","author":"S Metlo","year":"2019","unstructured":"Metlo, S., Memon, M., Shaikh, F., et al. (2019). Crowdsource based vehicle tracking system. Wireless Personal Communications,106(4), 2387\u20132405.","journal-title":"Wireless Personal Communications"},{"issue":"12","key":"666_CR25","doi-asserted-by":"crossref","first-page":"3417","DOI":"10.1109\/TMC.2017.2690995","volume":"16","author":"F Andrew","year":"2017","unstructured":"Andrew, F., Kumar, B., Chen, J., et al. (2017). Multi-lane pothole detection from crowdsourced undersampled vehicle sensor data. IEEE Transactions on Mobile Computing,16(12), 3417\u20133430.","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"666_CR26","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1016\/j.pmcj.2017.06.002","volume":"40","author":"S Gurdit","year":"2017","unstructured":"Gurdit, S., Divya, B., & Sanieev, S. (2017). Smart patrolling: An efficient road surface monitoring using smartphone sensors and crowdsourcing. Pervasive and Mobile Computing,40, 71\u201388.","journal-title":"Pervasive and Mobile Computing"},{"key":"666_CR27","doi-asserted-by":"crossref","first-page":"168","DOI":"10.1016\/j.trc.2018.02.007","volume":"89","author":"X Yang","year":"2018","unstructured":"Yang, X., Tang, U., Niu, L., et al. (2018). Generating lane-based intersection maps from crowdsourcing big trace data. Transportation Research Part C-Emerging Technologies,89, 168\u2013187.","journal-title":"Transportation Research Part C-Emerging Technologies"},{"issue":"8","key":"666_CR28","doi-asserted-by":"crossref","first-page":"2627","DOI":"10.1109\/TITS.2017.2764095","volume":"19","author":"J Kang","year":"2018","unstructured":"Kang, J., Yu, R., Huang, X., et al. (2018). Privacy-preserved pseudonym scheme for fog computing supported internet of vehicles. IEEE Transactions on Intelligent Transportation Systems,19(8), 2627\u20132637.","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"key":"666_CR29","doi-asserted-by":"crossref","first-page":"43776","DOI":"10.1109\/ACCESS.2018.2861430","volume":"6","author":"J Wei","year":"2018","unstructured":"Wei, J., Wang, X., Li, N., et al. (2018). A privacy-preserving fog computing framework for vehicular crowdsensing networks. IEEE Access,6, 43776\u201343784.","journal-title":"IEEE Access"},{"issue":"5","key":"666_CR30","doi-asserted-by":"crossref","first-page":"786","DOI":"10.1109\/TSC.2018.2825986","volume":"12","author":"L Ma","year":"2019","unstructured":"Ma, L., Liu, X., Pei, Q., et al. (2019). Privacy-preserving reputation management for edge computing enhanced mobile crowdsensing. IEEE Transactions on Services Computing,12(5), 786\u2013799.","journal-title":"IEEE Transactions on Services Computing"},{"issue":"3","key":"666_CR31","doi-asserted-by":"crossref","first-page":"772","DOI":"10.1109\/JIOT.2017.2666783","volume":"4","author":"S Basudan","year":"2017","unstructured":"Basudan, S., Lin, X., & Sankaranarayanan, K. (2017). A privacy-preserving vehicular crowdsensing-based road surface condition monitoring system using fog computing. IEEE Internet of Things Journal,4(3), 772\u2013782.","journal-title":"IEEE Internet of Things Journal"},{"key":"666_CR32","first-page":"1","volume":"99","author":"M Li","year":"2019","unstructured":"Li, M., Zhu, L., & Lin, X. (2019). Privacy-preserving traffic monitoring with false report filtering via fog-assisted vehicular crowdsensing. IEEE Transaction on Services Computing, 99, 1\u201311.","journal-title":"IEEE Transaction on Services Computing"},{"issue":"5","key":"666_CR33","doi-asserted-by":"crossref","first-page":"8038","DOI":"10.1109\/JIOT.2019.2904323","volume":"68","author":"J Onieva","year":"2019","unstructured":"Onieva, J., Rios, R., Roman, R., et al. (2019). Edge-assisted vehicular networks security. IEEE Internet of Things Journal,68(5), 8038\u20138045.","journal-title":"IEEE Internet of Things Journal"},{"key":"666_CR34","first-page":"26","volume-title":"Probability and mathematical statistics","author":"L Li","year":"2010","unstructured":"Li, L., & Wang, F. (2010). Probability and mathematical statistics (pp. 26\u201334). Beijing: Chemical Industry Press."}],"container-title":["Telecommunication Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-020-00666-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11235-020-00666-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-020-00666-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,8]],"date-time":"2021-05-08T01:29:12Z","timestamp":1620437352000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11235-020-00666-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,5,8]]},"references-count":34,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,9]]}},"alternative-id":["666"],"URL":"https:\/\/doi.org\/10.1007\/s11235-020-00666-w","relation":{},"ISSN":["1018-4864","1572-9451"],"issn-type":[{"type":"print","value":"1018-4864"},{"type":"electronic","value":"1572-9451"}],"subject":[],"published":{"date-parts":[[2020,5,8]]},"assertion":[{"value":"8 May 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}