{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T11:08:56Z","timestamp":1772881736384,"version":"3.50.1"},"reference-count":46,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2020,5,27]],"date-time":"2020-05-27T00:00:00Z","timestamp":1590537600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,5,27]],"date-time":"2020-05-27T00:00:00Z","timestamp":1590537600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"name":"Post Doctoral Fund Project in China","award":["2019M661260"],"award-info":[{"award-number":["2019M661260"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2020,10]]},"DOI":"10.1007\/s11276-020-02378-0","type":"journal-article","created":{"date-parts":[[2020,5,27]],"date-time":"2020-05-27T19:02:30Z","timestamp":1590606150000},"page":"5013-5033","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["A \u03b5-sensitive indistinguishable scheme for privacy preserving"],"prefix":"10.1007","volume":"26","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5532-8423","authenticated-orcid":false,"given":"Lei","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Meina","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Desheng","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Lili","family":"He","sequence":"additional","affiliation":[]},{"given":"Chao","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yue","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Bin","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,5,27]]},"reference":[{"key":"2378_CR1","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-019-03104-0","author":"P Zhao","year":"2019","unstructured":"Zhao, P., Zhang, G., Wan, S., et al. (2019). A survey of local differential privacy for securing internet of vehicles. The Journal of Supercomputing. https:\/\/doi.org\/10.1007\/s11227-019-03104-0","journal-title":"The Journal of Supercomputing"},{"issue":"8","key":"2378_CR2","doi-asserted-by":"publisher","first-page":"3628","DOI":"10.1109\/TII.2017.2773646","volume":"14","author":"C Yin","year":"2018","unstructured":"Yin, C., et al. (2018). Location privacy protection based on differential privacy strategy for big data in industrial internet of things. IEEE Transactions on Industrial Informatics, 14(8), 3628\u20133636.","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"2378_CR3","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2019.2960824","author":"P Zhao","year":"2020","unstructured":"Zhao, P., Huang, H., Zhao, X., & Huang, D. (2020). P3: Privacy-preserving scheme against poisoning attacks in mobile-edge computing. IEEE Transactions on Computational Social Systems. https:\/\/doi.org\/10.1109\/TCSS.2019.2960824.","journal-title":"IEEE Transactions on Computational Social Systems"},{"key":"2378_CR4","first-page":"1173","volume":"07","author":"Z Lei","year":"2017","unstructured":"Lei, Z., et al. (2017). A real-time similar trajectories generation algorithm for trajectories differences identification resistance. Journal of Harbin Engineering University, 07, 1173\u20131178.","journal-title":"Journal of Harbin Engineering University"},{"key":"2378_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.comcom.2016.06.005","volume":"98","author":"AY Ye","year":"2017","unstructured":"Ye, A. Y., Li, Y., & Xu, L. (2017). A novel location privacy-preserving scheme based on l-queries for continuous LBS. Computer Communications, 98, 1\u201310.","journal-title":"Computer Communications"},{"issue":"6","key":"2378_CR6","doi-asserted-by":"publisher","first-page":"2391","DOI":"10.1109\/TNET.2019.2947452","volume":"27","author":"P Zhao","year":"2019","unstructured":"Zhao, P., et al. (2019). Synthesizing privacy preserving traces: Enhancing plausibility with social networks. Ieee-Acm Transactions on Networking, 27(6), 2391\u20132404.","journal-title":"Ieee-Acm Transactions on Networking"},{"issue":"3","key":"2378_CR7","doi-asserted-by":"publisher","first-page":"548","DOI":"10.1007\/s12083-017-0557-5","volume":"11","author":"S Wang","year":"2018","unstructured":"Wang, S., et al. (2018). A trigger-based pseudonym exchange scheme for location privacy preserving in VANETs. Peer-to-Peer Networking and Applications, 11(3), 548\u2013560.","journal-title":"Peer-to-Peer Networking and Applications"},{"issue":"11","key":"2378_CR8","doi-asserted-by":"publisher","first-page":"641","DOI":"10.1142\/S0218126618501797","volume":"27","author":"L Zhang","year":"2018","unstructured":"Zhang, L., et al. (2018). A particle swarm optimization clustering-based attribute generalization privacy protection scheme. Journal of Circuits, Systems and Computers, 27(11), 641\u2013654.","journal-title":"Journal of Circuits, Systems and Computers"},{"issue":"09","key":"2378_CR9","first-page":"76","volume":"38","author":"Z Lei","year":"2017","unstructured":"Lei, Z., et al. (2017). CP-ABE based users collaborative privacy protection scheme for continuous query. Journal on Communications, 38(09), 76\u201385.","journal-title":"Journal on Communications"},{"issue":"12","key":"2378_CR10","doi-asserted-by":"publisher","first-page":"2998","DOI":"10.1109\/TIFS.2017.2730479","volume":"12","author":"L Zhang","year":"2017","unstructured":"Zhang, L. (2017). OTIBAAGKA: A new security tool for cryptographic mix-zone establishment in vehicular ad hoc networks. Ieee Transactions on Information Forensics and Security, 12(12), 2998\u20133010.","journal-title":"Ieee Transactions on Information Forensics and Security"},{"issue":"07","key":"2378_CR11","first-page":"1750119:1","volume":"26","author":"M Chunguang","year":"2017","unstructured":"Chunguang, M., et al. (2017). Hiding yourself behind collaborative users when using continuous location-based services. Journal of Circuits, Systems and Computers, 26(07), 1750119:1\u20131750119:25.","journal-title":"Journal of Circuits, Systems and Computers"},{"key":"2378_CR12","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1016\/j.ins.2016.08.010","volume":"387","author":"T Peng","year":"2017","unstructured":"Peng, T., et al. (2017). Collaborative trajectory privacy preserving scheme in location-based services. Information Sciences, 387, 165\u2013179.","journal-title":"Information Sciences"},{"issue":"2","key":"2378_CR13","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1109\/TSUSC.2017.2733018","volume":"4","author":"F Fei","year":"2017","unstructured":"Fei, F., et al. (2017). A K-anonymity based schema for location privacy preservation. IEEE Transactions on Sustainable Computing, 4(2), 156\u2013167.","journal-title":"IEEE Transactions on Sustainable Computing"},{"issue":"10","key":"2378_CR14","doi-asserted-by":"publisher","first-page":"9458","DOI":"10.1109\/TVT.2017.2703631","volume":"66","author":"M Ghaffari","year":"2017","unstructured":"Ghaffari, M., et al. (2017). P(4)QS: A peer-to-peer privacy preserving query service for location-based mobile applications. Ieee Transactions on Vehicular Technology, 66(10), 9458\u20139469.","journal-title":"Ieee Transactions on Vehicular Technology"},{"key":"2378_CR15","first-page":"1","volume":"2019","author":"Z Li","year":"2019","unstructured":"Li, Z., Wang, J., & Zhang, W. (2019). Revisiting post-quantum hash proof systems over lattices for Internet of Thing authentications. Journal of Ambient Intelligence and Humanized Computing, 2019, 1\u201311.","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"key":"2378_CR16","doi-asserted-by":"publisher","unstructured":"Li, Z., & Wang, D. (2019). Achieving one-round password-based authenticated key exchange over lattices. IEEE Transactions on Services Computing. https:\/\/doi.org\/10.1109\/TSC.2019.2939836.","DOI":"10.1109\/TSC.2019.2939836"},{"issue":"3","key":"2378_CR17","doi-asserted-by":"publisher","first-page":"495","DOI":"10.1109\/TMC.2014.2321747","volume":"14","author":"B Palanisamy","year":"2015","unstructured":"Palanisamy, B., & Liu, L. (2015). Attack-resilient mix-zones over road networks: Architecture and algorithms. IEEE Transactions on Mobile Computing, 14(3), 495\u2013508.","journal-title":"IEEE Transactions on Mobile Computing"},{"issue":"10","key":"2378_CR18","doi-asserted-by":"publisher","first-page":"2158","DOI":"10.1109\/TMC.2015.2388488","volume":"14","author":"R Schlegel","year":"2015","unstructured":"Schlegel, R., et al. (2015). User-defined privacy grid system for continuous location-based services. IEEE Transactions on Mobile Computing, 14(10), 2158\u20132172.","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"2378_CR19","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1016\/j.knosys.2016.03.016","volume":"103","author":"W Ni","year":"2016","unstructured":"Ni, W., Gu, M., & Chen, X. (2016). Location privacy-preserving k nearest neighbor query under user's preference. Knowledge-Based Systems, 103, 19\u201327.","journal-title":"Knowledge-Based Systems"},{"issue":"2","key":"2378_CR20","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1109\/TNSM.2016.2559448","volume":"13","author":"LC Zhang","year":"2016","unstructured":"Zhang, L. C., Cai, Z. P., & Wang, X. M. (2016). FakeMask: A novel privacy preserving approach for smartphones. Ieee Transactions on Network and Service Management, 13(2), 335\u2013348.","journal-title":"Ieee Transactions on Network and Service Management"},{"issue":"2","key":"2378_CR21","doi-asserted-by":"publisher","first-page":"374","DOI":"10.1109\/TPDS.2013.34","volume":"25","author":"R Dewri","year":"2014","unstructured":"Dewri, R., & Thurimella, R. (2014). Exploiting service similarity for privacy in location-based search queries. IEEE Transactions on Parallel and Distributed Systems, 25(2), 374\u2013383.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"2378_CR22","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1016\/j.future.2016.08.023","volume":"74","author":"G Sun","year":"2017","unstructured":"Sun, G., et al. (2017). L2P2: A location-label based approach for privacy preserving in LBS. Future Generation Computer Systems, 74, 375\u2013384.","journal-title":"Future Generation Computer Systems"},{"issue":"4","key":"2378_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3009908","volume":"19","author":"R Shokri","year":"2017","unstructured":"Shokri, R., Theodorakopoulos, G., & Troncoso, C. (2017). Privacy games along location traces: A game-theoretic framework for optimizing location privacy. ACM Transactions on Privacy and Security, 19(4), 1\u201331.","journal-title":"ACM Transactions on Privacy and Security"},{"key":"2378_CR24","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1016\/j.jnca.2017.01.018","volume":"82","author":"H Shen","year":"2017","unstructured":"Shen, H., et al. (2017). Protecting trajectory privacy: A user-centric analysis. Journal of Network and Computer Applications, 82, 128\u2013139.","journal-title":"Journal of Network and Computer Applications"},{"issue":"11","key":"2378_CR25","doi-asserted-by":"publisher","first-page":"2683","DOI":"10.1109\/TIFS.2017.2713341","volume":"12","author":"Z Montazeri","year":"2017","unstructured":"Montazeri, Z., Houmansadr, A., & Pishro-Nik, H. (2017). Achieving perfect location privacy in wireless devices using anonymization. Ieee Transactions on Information Forensics and Security, 12(11), 2683\u20132698.","journal-title":"Ieee Transactions on Information Forensics and Security"},{"issue":"8","key":"2378_CR26","first-page":"1723","volume":"11","author":"XF Wang","year":"2016","unstructured":"Wang, X. F., Mu, Y., & Chen, R. M. (2016). One-round privacy-preserving meeting location determination for smartphone applications. Ieee Transactions on Information Forensics and Security, 11(8), 1723\u20131732.","journal-title":"Ieee Transactions on Information Forensics and Security"},{"key":"2378_CR27","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1016\/j.trc.2016.09.017","volume":"72","author":"UM Aivodji","year":"2016","unstructured":"Aivodji, U. M., et al. (2016). Meeting points in ridesharing: A privacy-preserving approach. Transportation Research Part C-Emerging Technologies, 72, 239\u2013253.","journal-title":"Transportation Research Part C-Emerging Technologies"},{"issue":"3","key":"2378_CR28","doi-asserted-by":"publisher","first-page":"2703","DOI":"10.1109\/TVT.2016.2583466","volume":"66","author":"K Rabieh","year":"2017","unstructured":"Rabieh, K., Mahmoud, M., & Younis, M. (2017). Privacy-preserving route reporting schemes for traffic management systems. Ieee Transactions on Vehicular Technology, 66(3), 2703\u20132713.","journal-title":"Ieee Transactions on Vehicular Technology"},{"issue":"2","key":"2378_CR29","doi-asserted-by":"publisher","first-page":"2305","DOI":"10.1007\/s11277-017-4299-8","volume":"96","author":"L Zhang","year":"2017","unstructured":"Zhang, L., et al. (2017). Privacy preserving in cloud environment for obstructed shortest path query. Wireless Personal Communications, 96(2), 2305\u20132322.","journal-title":"Wireless Personal Communications"},{"issue":"2","key":"2378_CR30","doi-asserted-by":"publisher","first-page":"1033","DOI":"10.1109\/JIOT.2018.2799545","volume":"5","author":"P Zhao","year":"2018","unstructured":"Zhao, P., et al. (2018). ILLIA: Enabling k-anonymity-based privacy preserving against location injection attacks in continuous LBS queries. Ieee Internet of Things Journal, 5(2), 1033\u20131042.","journal-title":"Ieee Internet of Things Journal"},{"key":"2378_CR31","doi-asserted-by":"publisher","first-page":"54483","DOI":"10.1109\/ACCESS.2019.2912006","volume":"7","author":"Z Peng","year":"2019","unstructured":"Peng, Z., et al. (2019). Location correlated differential privacy protection based on mobile feature analysis. Ieee Access, 7, 54483\u201354496.","journal-title":"Ieee Access"},{"issue":"4","key":"2378_CR32","doi-asserted-by":"publisher","first-page":"6167","DOI":"10.1007\/s11277-017-4833-8","volume":"97","author":"L Zhang","year":"2017","unstructured":"Zhang, L., et al. (2017). Probability indistinguishable: A query and location correlation attack resistance scheme. Wireless Personal Communications, 97(4), 6167\u20136187.","journal-title":"Wireless Personal Communications"},{"key":"2378_CR33","doi-asserted-by":"publisher","unstructured":"Wei, J., Lin, Y., Yao, X., & Zhang, J. (2019). Differential privacy-based location protection in spatial crowdsourcing. IEEE Transactions on Services Computing. https:\/\/doi.org\/10.1109\/TSC.2019.2920643","DOI":"10.1109\/TSC.2019.2920643"},{"issue":"02","key":"2378_CR34","first-page":"309","volume":"41","author":"YC Wu","year":"2018","unstructured":"Wu, Y. C., et al. (2018). Differentially private trajectory protection based on spatial and temporal correlation. Chinese Journal of Computers, 41(02), 309\u2013322.","journal-title":"Chinese Journal of Computers"},{"issue":"5","key":"2378_CR35","doi-asserted-by":"crossref","first-page":"1155","DOI":"10.1109\/TIFS.2017.2779402","volume":"13","author":"J Hua","year":"2018","unstructured":"Hua, J., et al. (2018). A geo-indistinguishable location perturbation mechanism for location-based services supporting frequent queries. Ieee Transactions on Information Forensics and Security, 13(5), 1155\u20131168.","journal-title":"Ieee Transactions on Information Forensics and Security"},{"issue":"1","key":"2378_CR36","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10207-016-0355-8","volume":"17","author":"E Elsalamouny","year":"2018","unstructured":"Elsalamouny, E., & Gambs, S. (2018). Optimal noise functions for location privacy on continuous regions. International Journal of Information Security, 17(1), 1\u201318.","journal-title":"International Journal of Information Security"},{"key":"2378_CR37","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10776-016-0324-1","volume":"24","author":"R Al-Dhubhani","year":"2017","unstructured":"Al-Dhubhani, R., & Cazalas, J. M. (2017). An adaptive geo-indistinguishability mechanism for continuous LBS queries. Wireless Networks, 24, 1\u201319.","journal-title":"Wireless Networks"},{"key":"2378_CR38","doi-asserted-by":"crossref","unstructured":"Gruteser, M., & Grunwald, D. (2003). Anonymous usage of location-based services through spatial and temporal cloaking. In Proceedings of the 1st international conference on Mobile systems, applications and services (pp. 31\u201342).","DOI":"10.1145\/1066116.1189037"},{"key":"2378_CR39","unstructured":"Fuyu, L., Hua, K.A., & Ying, C. (2009). Query l-diversity in location-based services. In Proceedings of mobile data management: systems, services and middleware (pp. 436\u2013442)."},{"issue":"6","key":"2378_CR40","doi-asserted-by":"publisher","first-page":"762","DOI":"10.1016\/j.comcom.2009.11.024","volume":"33","author":"D Rebollo-Monedero","year":"2010","unstructured":"Rebollo-Monedero, D., et al. (2010). Private location-based information retrieval through user collaboration. Computer Communications, 33(6), 762\u2013774.","journal-title":"Computer Communications"},{"issue":"3","key":"2378_CR41","doi-asserted-by":"publisher","first-page":"435","DOI":"10.1007\/s10115-010-0286-z","volume":"26","author":"A Khoshgozaran","year":"2011","unstructured":"Khoshgozaran, A., Shahabi, C., & Shirani-Mehr, H. (2011). Location privacy: Going beyond K-anonymity, cloaking and anonymizers. Knowledge and Information Systems, 26(3), 435\u2013465.","journal-title":"Knowledge and Information Systems"},{"issue":"2","key":"2378_CR42","doi-asserted-by":"publisher","first-page":"418","DOI":"10.1109\/TIFS.2016.2622000","volume":"12","author":"M Grissa","year":"2017","unstructured":"Grissa, M., Yavuz, A. A., & Hamdaoui, B. (2017). Preserving the location privacy of secondary users in cooperative spectrum sensing. Ieee Transactions on Information Forensics and Security, 12(2), 418\u2013431.","journal-title":"Ieee Transactions on Information Forensics and Security"},{"issue":"3","key":"2378_CR43","doi-asserted-by":"publisher","first-page":"430","DOI":"10.1016\/j.is.2012.07.001","volume":"38","author":"T Hashem","year":"2013","unstructured":"Hashem, T., Kulik, L., & Zhang, R. (2013). Countering overlapping rectangle privacy attack for moving kNN queries. Information Systems, 38(3), 430\u2013453.","journal-title":"Information Systems"},{"issue":"2","key":"2378_CR44","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1109\/TSC.2013.55","volume":"7","author":"R-H Hwang","year":"2014","unstructured":"Hwang, R.-H., Hsueh, Y.-L., & Chung, H.-W. (2014). A novel time-obfuscated algorithm for trajectory privacy protection. IEEE Transactions on Services Computing, 7(2), 126\u2013139.","journal-title":"IEEE Transactions on Services Computing"},{"issue":"08","key":"2378_CR45","first-page":"37","volume":"38","author":"Z Lei","year":"2017","unstructured":"Lei, Z., et al. (2017). Correlation probability indistinguishable location privacy protection algorithm. Journal on Communications, 38(08), 37\u201349.","journal-title":"Journal on Communications"},{"key":"2378_CR46","doi-asserted-by":"crossref","unstructured":"Niu, B., et al. (2014). Achieving k-anonymity in privacy-aware location-based services. In International conference on computer\u00a0communications (pp. 754\u2013762).","DOI":"10.1109\/INFOCOM.2014.6848002"}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-020-02378-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11276-020-02378-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-020-02378-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,25]],"date-time":"2022-10-25T05:40:55Z","timestamp":1666676455000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11276-020-02378-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,5,27]]},"references-count":46,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2020,10]]}},"alternative-id":["2378"],"URL":"https:\/\/doi.org\/10.1007\/s11276-020-02378-0","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"value":"1022-0038","type":"print"},{"value":"1572-8196","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,5,27]]},"assertion":[{"value":"27 May 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}