{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:22:56Z","timestamp":1740122576856,"version":"3.37.3"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2018,4,12]],"date-time":"2018-04-12T00:00:00Z","timestamp":1523491200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"University Nursing Program for Young Scholars with Creative Talents in Heilongjiang Province","award":["UNPYSCT-2017149","UNPYSCT-2017175"],"award-info":[{"award-number":["UNPYSCT-2017149","UNPYSCT-2017175"]}]},{"DOI":"10.13039\/501100005046","name":"Natural Science Foundation of Heilongjiang Province of China","doi-asserted-by":"crossref","award":["F2015022"],"award-info":[{"award-number":["F2015022"]}],"id":[{"id":"10.13039\/501100005046","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2018,7]]},"DOI":"10.1007\/s11277-018-5735-0","type":"journal-article","created":{"date-parts":[[2018,4,12]],"date-time":"2018-04-12T16:13:48Z","timestamp":1523549628000},"page":"943-961","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A novel attributes anonymity scheme in continuous query"],"prefix":"10.1007","volume":"101","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5532-8423","authenticated-orcid":false,"given":"Lei","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Jing","family":"Li","sequence":"additional","affiliation":[]},{"given":"Songtao","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Bin","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Xingchao","family":"Bian","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,4,12]]},"reference":[{"issue":"1","key":"5735_CR1","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1109\/JSYST.2014.2354235","volume":"11","author":"T Peng","year":"2017","unstructured":"Peng, T., Liu, Q., & Wang, G. J. (2017). Enhanced location privacy preserving scheme in location-based services. IEEE Systems Journal, 11(1), 219\u2013230.","journal-title":"IEEE Systems Journal"},{"issue":"70","key":"5735_CR2","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1016\/j.future.2016.06.017","volume":"2017","author":"YM Sun","year":"2017","unstructured":"Sun, Y. M., Chen, M., Hu, L., Qian, Y. F., & Hassan, M. M. (2017). ASA: Against statistical attacks for privacy-aware users in location based service. Future Generation Computer Systems-the International Journal of Escience, 2017(70), 48\u201358.","journal-title":"Future Generation Computer Systems-the International Journal of Escience"},{"issue":"3","key":"5735_CR3","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1007\/s12599-016-0430-8","volume":"58","author":"S Ryschka","year":"2016","unstructured":"Ryschka, S., Murawski, M., & Bick, M. (2016). Location-based services. Business & Information Systems Engineering, 58(3), 233\u2013237.","journal-title":"Business & Information Systems Engineering"},{"issue":"53","key":"5735_CR4","first-page":"57","volume":"2015","author":"Y Wang","year":"2015","unstructured":"Wang, Y., Xia, Y., Hou, J., Gao, S. M., Nie, X., & Wang, Q. (2015). A fast privacy-preserving framework for continuous location-based queries in road networks. Journal of Network and Computer Applications, 2015(53), 57\u201373.","journal-title":"Journal of Network and Computer Applications"},{"issue":"12","key":"5735_CR5","doi-asserted-by":"publisher","first-page":"3021","DOI":"10.1002\/cpe.3244","volume":"27","author":"C Lin","year":"2015","unstructured":"Lin, C., Wu, G. W., & Yu, C. W. (2015). Protecting location privacy and query privacy: A combined clustering approach. Concurrency and Computation-Practice & Experience, 27(12), 3021\u20133043.","journal-title":"Concurrency and Computation-Practice & Experience"},{"key":"5735_CR6","first-page":"129","volume":"36","author":"CL Zhou","year":"2015","unstructured":"Zhou, C. L., Mai, C. G., & Yang, S. T. (2015). Research of LBS privacy preserving based on sensitive location diversity. Journal on Communications, 36, 129\u2013140.","journal-title":"Journal on Communications"},{"key":"5735_CR7","doi-asserted-by":"crossref","unstructured":"Niu, B., Gao, S., Li, F. H., Li, H., & Lu, Z. Q. (2016) Protection of location privacy in continuous LBSs against adversaries with background information. In: 2016 International conference on computing, networking and communications (ICNC), 2016","DOI":"10.1109\/ICCNC.2016.7440649"},{"issue":"1","key":"5735_CR8","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1002\/wcm.2324","volume":"15","author":"S Gao","year":"2015","unstructured":"Gao, S., Ma, J. F., Shi, W. S., & Zhan, G. X. (2015). LTPPM: A location and trajectory privacy protection mechanism in participatory sensing. Wireless Communications & Mobile Computing, 15(1), 155\u2013169.","journal-title":"Wireless Communications & Mobile Computing"},{"key":"5735_CR9","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1016\/j.ins.2016.08.010","volume":"387","author":"T Peng","year":"2017","unstructured":"Peng, T., Liu, Q., Meng, D. C., & Wang, G. J. (2017). Collaborative trajectory privacy preserving scheme in location-based services. Information Sciences, 387, 165\u2013179.","journal-title":"Information Sciences"},{"key":"5735_CR10","doi-asserted-by":"crossref","unstructured":"Gruteser, M., & Grunwald, D. (2003) Anonymous usage of location-based services through spatial and temporal cloaking. In Book anonymous usage of location-based services through spatial and temporal cloaking. ACM, pp. 31\u201342","DOI":"10.1145\/1066116.1189037"},{"issue":"11","key":"5735_CR11","doi-asserted-by":"publisher","first-page":"2683","DOI":"10.1109\/TIFS.2017.2713341","volume":"12","author":"Z Montazeri","year":"2017","unstructured":"Montazeri, Z., Houmansadr, A., & Pishro-Nik, H. (2017). Achieving perfect location privacy in wireless devices using anonymization. IEEE Transactions on Information Forensics and Security, 12(11), 2683\u20132698.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"5735_CR12","unstructured":"Fuyu, L., Hua, K. A., & Ying, C. (2009) Query l-diversity in location-based services. In Book query l-diversity in location-based services, pp. 436\u2013442"},{"issue":"98","key":"5735_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.comcom.2016.06.005","volume":"2017","author":"AY Ye","year":"2017","unstructured":"Ye, A. Y., Li, Y., & Xu, L. (2017). A novel location privacy-preserving scheme based on l-queries for continuous LBS. Computer Communications, 2017(98), 1\u201310.","journal-title":"Computer Communications"},{"key":"5735_CR14","doi-asserted-by":"crossref","unstructured":"Chow, C.-Y., Mokbel, M. F., & Liu, X. (2006). A peer-to-peer spatial cloaking algorithm for anonymous location-based service. In Proceedings of 14th annual ACM international symposium on advances in geographic information systems, Arlington, Virginia","DOI":"10.1145\/1183471.1183500"},{"issue":"11","key":"5735_CR15","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1109\/CC.2016.7781722","volume":"13","author":"C Ma","year":"2016","unstructured":"Ma, C., Zhang, L., Yang, S., Zheng, X., & Ke, P. (2016). Achieve personalized anonymity through query blocks exchanging. China Communications, 13(11), 106\u2013118.","journal-title":"China Communications"},{"issue":"2","key":"5735_CR16","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1109\/TSC.2013.55","volume":"7","author":"R-H Hwang","year":"2014","unstructured":"Hwang, R.-H., Hsueh, Y.-L., & Chung, H.-W. (2014). A novel time-obfuscated algorithm for trajectory privacy protection. IEEE Transactions on Services Computing, 7(2), 126\u2013139.","journal-title":"IEEE Transactions on Services Computing"},{"issue":"1","key":"5735_CR17","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/s10619-013-7128-4","volume":"32","author":"B Palanisamy","year":"2014","unstructured":"Palanisamy, B., Liu, L., Lee, K., Meng, S., Tang, Y., & Zhou, Y. (2014). Anonymizing continuous queries with delay-tolerant mix-zones over road networks. Distributed and Parallel Databases, 32(1), 91\u2013118.","journal-title":"Distributed and Parallel Databases"},{"issue":"103","key":"5735_CR18","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1016\/j.knosys.2016.03.016","volume":"2016","author":"W Ni","year":"2016","unstructured":"Ni, W., Gu, M., & Chen, X. (2016). Location privacy-preserving k nearest neighbor query under user\u2019s preference. Knowledge-Based Systems, 2016(103), 19\u201327.","journal-title":"Knowledge-Based Systems"},{"issue":"5","key":"5735_CR19","doi-asserted-by":"publisher","first-page":"1750071","DOI":"10.1142\/S0218126617500712","volume":"26","author":"K Zeberga","year":"2017","unstructured":"Zeberga, K., Jin, R., Cho, H. J., & Chung, T. S. (2017). A safe-region approach to a moving k-RNN Queries in a directed road network. Journal of Circuits Systems and Computers, 26(5), 1750071.","journal-title":"Journal of Circuits Systems and Computers"},{"issue":"12","key":"5735_CR20","first-page":"2894","volume":"38","author":"Z Lei","year":"2016","unstructured":"Lei, Z., Chunguang, M., Songtao, Y., & Xiaodong, Z. (2016). Location privacy protection model and algorithm based on profiles generalization. Systems engineering and electronics, 38(12), 2894\u20132900.","journal-title":"Systems engineering and electronics"},{"issue":"4","key":"5735_CR21","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1145\/3009908","volume":"19","author":"R Shokri","year":"2017","unstructured":"Shokri, R., Theodorakopoulos, G., & Troncoso, C. (2017). Privacy games along location traces: a game-theoretic framework for optimizing location privacy. ACM Transactions on Privacy and Security, 19(4), 11.","journal-title":"ACM Transactions on Privacy and Security"},{"key":"5735_CR22","doi-asserted-by":"crossref","unstructured":"Bethencourt, J., Sahai, A., & Waters, B. (2007). Ciphertext-policy attribute-based encryption. In Policy attribute-based encryption, pp. 321\u2013334","DOI":"10.1109\/SP.2007.11"},{"key":"5735_CR23","doi-asserted-by":"crossref","unstructured":"Xiao, Z., Xu, J., & Meng, X. (2008) p-Sensitivity: A semantic privacy-protection model for location-based services. In p-Sensitivity: A semantic privacy-protection model for location-based services, pp. 47\u201354","DOI":"10.1109\/MDMW.2008.20"},{"issue":"2","key":"5735_CR24","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1007\/s10707-009-0099-y","volume":"15","author":"CY Chow","year":"2011","unstructured":"Chow, C. Y., Mokbel, M. F., & Liu, X. A. (2011). Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments. Geoinformatica, 15(2), 351\u2013380.","journal-title":"Geoinformatica"},{"key":"5735_CR25","doi-asserted-by":"crossref","unstructured":"Ghinita, G., Kalnis, P., Khoshgozaran, A., Shahabi, C., & Tan, K.-L. (2008). Private queries in location based services: Anonymizers are not necessary. In Proceedings of the 2008 ACM SIGMOD international conference on Management of data, Vancouver, Canada","DOI":"10.1145\/1376616.1376631"},{"key":"5735_CR26","doi-asserted-by":"crossref","unstructured":"Kato, R., Iwata, M., Hara, T., Suzuki, A., Xie, X., Arase, Y., & Nishio, S. (2012). A dummy-based anonymization method based on user trajectory with pauses. In A dummy-based anonymization method based on user trajectory with pauses. ACM, pp. 249\u2013258","DOI":"10.1145\/2424321.2424354"},{"issue":"39","key":"5735_CR27","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1016\/j.trc.2013.12.003","volume":"2014","author":"M Ghasemzadeh","year":"2014","unstructured":"Ghasemzadeh, M., Fung, B. C. M., Chen, R., & Awasthi, A. (2014). Anonymizing trajectory data for passenger flow analysis. Transportation Research Part C-Emerging Technologies, 2014(39), 63\u201379.","journal-title":"Transportation Research Part C-Emerging Technologies"},{"issue":"07","key":"5735_CR28","first-page":"1750119:1750111","volume":"26","author":"M Chunguang","year":"2017","unstructured":"Chunguang, M., Lei, Z., Songtao, Y., & Xiaodong, Z. (2017). Hiding yourself behind collaborative users when using continuous location-based services. Journal of Circuits, Systems and Computers, 26(07), 1750119:1750111\u20131750119:1750125.","journal-title":"Journal of Circuits, Systems and Computers"},{"issue":"11","key":"5735_CR29","doi-asserted-by":"publisher","first-page":"1850179-1850171","DOI":"10.1142\/S0218126618501797","volume":"27","author":"L Zhang","year":"2018","unstructured":"Zhang, L., Yang, S., Li, J., & Yu, L. (2018). A particle swarm optimization clustering-based attribute generalization privacy protection scheme. Journal of Circuits, Systems and Computers, 27(11), 1850179-1850171\u20131850179-1850121.","journal-title":"Journal of Circuits, Systems and Computers"},{"issue":"2","key":"5735_CR30","first-page":"197","volume":"11","author":"Z Lei","year":"2016","unstructured":"Lei, Z., Chunguang, M., & Songtao, Y. (2016). Location association similar based anonymus algorithm. China Sciencepaper, 11(2), 197\u2013201.","journal-title":"China Sciencepaper"},{"key":"5735_CR31","first-page":"5","volume":"36","author":"CG Ma","year":"2015","unstructured":"Ma, C. G., Zhou, C. L., Yang, S. T., & Zhao, Y. L. (2015). Location privacy-preserving method in LBS based on Voronoi division. Journal on Communications, 36, 5\u201316.","journal-title":"Journal on Communications"},{"issue":"6","key":"5735_CR32","doi-asserted-by":"publisher","first-page":"3913","DOI":"10.3390\/e17063913","volume":"17","author":"A Rodriguez-Carrion","year":"2015","unstructured":"Rodriguez-Carrion, A., Rebollo-Monedero, D., Forne, J., Campo, C., Garcia-Rubio, C., Parra-Arnau, J., et al. (2015). Entropy-based privacy against profiling of user mobility. Entropy, 17(6), 3913\u20133946.","journal-title":"Entropy"},{"issue":"10","key":"5735_CR33","doi-asserted-by":"publisher","first-page":"9458","DOI":"10.1109\/TVT.2017.2703631","volume":"66","author":"M Ghaffari","year":"2017","unstructured":"Ghaffari, M., Ghadiri, N., Manshaei, M. H., & Lahijani, M. S. (2017). P(4)QS: A peer-to-peer privacy preserving query service for location-based mobile applications. IEEE Transactions on Vehicular Technology, 66(10), 9458\u20139469.","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"5735_CR34","doi-asserted-by":"publisher","first-page":"834","DOI":"10.1109\/TPDS.2014.2311811","volume":"26","author":"Z Deng","year":"2015","unstructured":"Deng, Z., Wu, X., Wang, L., Chen, X., Ranjan, R., Zomaya, A., et al. (2015). Parallel processing of dynamic continuous queries over streaming data flows. IEEE Transactions on Parallel and Distributed Systems, 26, 834\u2013846.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"5735_CR35","doi-asserted-by":"publisher","first-page":"775","DOI":"10.1007\/s12145-015-0206-6","volume":"8","author":"WH Lin","year":"2015","unstructured":"Lin, W. H., Tan, X. J., Liu, F. J., Yu, Y., & Wang, W. M. (2015). A new directional query method for polygon dataset in spatial database. Earth Science Informatics, 8, 775\u2013786.","journal-title":"Earth Science Informatics"},{"issue":"2","key":"5735_CR36","doi-asserted-by":"publisher","first-page":"2305","DOI":"10.1007\/s11277-017-4299-8","volume":"96","author":"L Zhang","year":"2017","unstructured":"Zhang, L., Li, J., Yang, S., et al. (2017). Privacy preserving in cloud environment for obstructed shortest path query. Wireless Personal Communications, 96(2), 2305\u20132322.","journal-title":"Wireless Personal Communications"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-018-5735-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-018-5735-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-018-5735-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,31]],"date-time":"2020-10-31T16:55:29Z","timestamp":1604163329000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-018-5735-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4,12]]},"references-count":36,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2018,7]]}},"alternative-id":["5735"],"URL":"https:\/\/doi.org\/10.1007\/s11277-018-5735-0","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"type":"print","value":"0929-6212"},{"type":"electronic","value":"1572-834X"}],"subject":[],"published":{"date-parts":[[2018,4,12]]},"assertion":[{"value":"12 April 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}