{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:49:21Z","timestamp":1767340161520,"version":"3.41.0"},"reference-count":67,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2018,4,4]],"date-time":"2018-04-04T00:00:00Z","timestamp":1522800000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61572336"],"award-info":[{"award-number":["61572336"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["World Wide Web"],"published-print":{"date-parts":[[2019,11]]},"DOI":"10.1007\/s11280-018-0544-7","type":"journal-article","created":{"date-parts":[[2018,4,4]],"date-time":"2018-04-04T03:51:59Z","timestamp":1522813919000},"page":"2697-2720","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":40,"title":["Differential private collaborative Web services QoS prediction"],"prefix":"10.1007","volume":"22","author":[{"given":"An","family":"Liu","sequence":"first","affiliation":[]},{"given":"Xindi","family":"Shen","sequence":"additional","affiliation":[]},{"given":"Zhixu","family":"Li","sequence":"additional","affiliation":[]},{"given":"Guanfeng","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Jiajie","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Lei","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Kai","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Shuo","family":"Shang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,4,4]]},"reference":[{"key":"544_CR1","doi-asserted-by":"crossref","unstructured":"Berlioz, A., Friedman, A., Kaafar, M.A., Boreli, R., Berkovsky, S.: Applying differential privacy to matrix factorization. In: Proceedings of the 9th ACM Conference on Recommender Systems, pp. 107\u2013114. ACM (2015)","DOI":"10.1145\/2792838.2800173"},{"key":"544_CR2","doi-asserted-by":"crossref","unstructured":"Canny, J.: Collaborative filtering with privacy. In: 2002. Proceedings 2002 IEEE Symposium on Security and Privacy, pp. 45\u201357. IEEE","DOI":"10.1145\/564376.564419"},{"issue":"1","key":"544_CR3","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1109\/TSC.2011.35","volume":"6","author":"X Chen","year":"2013","unstructured":"Chen, X., Zheng, Z., Liu, X., Huang, Z., Sun, H.: Personalized qos-aware Web service recommendation and visualization. IEEE Trans. Serv. Comput. 6(1), 35\u201347 (2013)","journal-title":"IEEE Trans. Serv. Comput."},{"issue":"4","key":"544_CR4","doi-asserted-by":"publisher","first-page":"1918","DOI":"10.1109\/TITS.2014.2383494","volume":"16","author":"Z Ding","year":"2015","unstructured":"Ding, Z., Yang, B., Gu\u0307ting, R.H., Li, Y.: Network-matched trajectory-based moving-object database: Models and applications. IEEE Trans. Intell. Transp. Syst. 16 (4), 1918\u20131928 (2015)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"issue":"5","key":"544_CR5","doi-asserted-by":"publisher","first-page":"1377","DOI":"10.1109\/TC.2015.2479596","volume":"65","author":"Z Ding","year":"2016","unstructured":"Ding, Z., Yang, B., Chi, Y., Guo, L.: Enabling smart transportation systems: A parallel spatio-temporal database approach. IEEE Trans. Comput. 65(5), 1377\u20131391 (2016)","journal-title":"IEEE Trans. Comput."},{"key":"544_CR6","doi-asserted-by":"crossref","unstructured":"Dwork, C.: Differential privacy: a survey of results. In: International Conference on Theory and Applications of Models of Computation, pp. 1\u201319. Springer (2008)","DOI":"10.1007\/978-3-540-79228-4_1"},{"key":"544_CR7","doi-asserted-by":"crossref","unstructured":"Dwork, C.: Differential privacy encyclopedia of cryptography and security (2011)","DOI":"10.1007\/978-1-4419-5906-5_752"},{"key":"544_CR8","doi-asserted-by":"crossref","unstructured":"Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. In Theory of Cryptography Conference, pp. 265\u2013284. Springer (2006)","DOI":"10.1007\/11681878_14"},{"issue":"3","key":"544_CR9","doi-asserted-by":"publisher","first-page":"1053","DOI":"10.1109\/TIFS.2012.2190726","volume":"7","author":"Z Erkin","year":"2012","unstructured":"Erkin, Z., Veugen, T., Toft, T., Lagendijk, R.L.: Generating private recommendations efficiently using homomorphic encryption and data packing. IEEE Trans. Inf. Forensics Secur. 7(3), 1053\u20131066 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"544_CR10","doi-asserted-by":"crossref","unstructured":"Fletcher, K.K., Liu, X.F.: A collaborative filtering method for personalized preference-based service recommendation. In: IEEE International Conference on Web Services (ICWS), pp. 400\u2013407. IEEE (2015)","DOI":"10.1109\/ICWS.2015.60"},{"key":"544_CR11","doi-asserted-by":"crossref","unstructured":"Gentry, C.: A fully homomorphic encryption scheme. PhD thesis Stanford University (2009)","DOI":"10.1145\/1536414.1536440"},{"issue":"8","key":"544_CR12","doi-asserted-by":"publisher","first-page":"862","DOI":"10.14778\/2757807.2757811","volume":"8","author":"R Guerraoui","year":"2015","unstructured":"Guerraoui, R., Kermarrec, A.-M., Patra, R., Taziki, M.: D 2 p: distance-based differential privacy in recommenders. Proc. VLDB Endowment 8(8), 862\u2013873 (2015)","journal-title":"Proc. VLDB Endowment"},{"issue":"3","key":"544_CR13","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/2694428.2694432","volume":"43","author":"C Guo","year":"2014","unstructured":"Guo, C., Jensen, C.S., Yang, B.: Towards total traffic awareness. SIGMOD Rec. 43(3), 18\u201323 (2014)","journal-title":"SIGMOD Rec."},{"key":"544_CR14","doi-asserted-by":"crossref","unstructured":"Guo, C., Yang, B., Andersen, O., Jensen, C.S., Ecosky, K.T.: Reducing vehicular environmental impact through eco-routing. In: ICDE, pp. 1412\u20131415 (2015)","DOI":"10.1109\/ICDE.2015.7113389"},{"key":"544_CR15","unstructured":"Jorgensen, Z., Yu, T.: A privacy-preserving framework for personalized, social recommendations. In: EDBT, pp. 571\u2013582 (2014)"},{"key":"544_CR16","doi-asserted-by":"crossref","unstructured":"Kifer, D., Machanavajjhala, A.: No free lunch in data privacy. Inproceedings of the ACM SIGMOD International Conference on Management of data, pp. 193\u2013204. ACM (2011)","DOI":"10.1145\/1989323.1989345"},{"key":"544_CR17","doi-asserted-by":"crossref","unstructured":"Li, N., Li, T., Venkatasubramanian, S.: t-closeness: Privacy beyond k-anonymity and l-diversity. In: 2007. ICDE 2007. IEEE 23rd International Conference on Data Engineering, pp. 106\u2013115. IEEE (2007)","DOI":"10.1109\/ICDE.2007.367856"},{"issue":"3-4","key":"544_CR18","first-page":"203","volume":"15","author":"L Li","year":"2016","unstructured":"Li, L., Liu, A., Li, Q., Liu, G., Li, Z.: Privacy-preserving collaborative Web services qos prediction via yao\u2019s garbled circuits and homomorphic encryption. J. Web Eng. 15(3-4), 203\u2013225 (2016)","journal-title":"J. Web Eng."},{"issue":"4","key":"544_CR19","doi-asserted-by":"publisher","first-page":"638","DOI":"10.1007\/s11390-009-9264-x","volume":"24","author":"A Liu","year":"2009","unstructured":"Liu, A., Liu, H., Li, Q., Huang, L.-S., Xiao, M.-J.: Constraints-aware scheduling for transactional services composition. J. Comput. Sci. Technol. 24(4), 638\u2013651 (2009)","journal-title":"J. Comput. Sci. Technol."},{"issue":"1","key":"544_CR20","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/TSC.2009.28","volume":"3","author":"A Liu","year":"2010","unstructured":"Liu, A., Li, Q., Huang, L., Xiao, M.: Facts: A framework for fault-tolerant composition of transactional Web services. IEEE Trans. Serv. Comput. 3(1), 46\u201359 (2010)","journal-title":"IEEE Trans. Serv. Comput."},{"key":"544_CR21","doi-asserted-by":"crossref","unstructured":"Liu, A., Li, Q., Huang, L., Wen, S.: Shapley value based impression propagation for reputation management in Web service composition. In: 2012 IEEE 19th International Conference on Web Services, pp. 58\u201365. Honolulu (2012)","DOI":"10.1109\/ICWS.2012.85"},{"issue":"3","key":"544_CR22","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1109\/TSC.2012.12","volume":"6","author":"A Liu","year":"2013","unstructured":"Liu, A., Li, Q., Huang, L., Ying, S., Xiao, M.: Coalitional game for community-based autonomous Web services cooperation. IEEE Trans. Serv. Comput. 6(3), 387\u2013399 (2013)","journal-title":"IEEE Trans. Serv. Comput."},{"key":"544_CR23","doi-asserted-by":"publisher","first-page":"466","DOI":"10.1007\/978-3-319-05810-8_31","volume-title":"Database Systems for Advanced Applications","author":"An Liu","year":"2014","unstructured":"Liu, A., Li, Q., Zhou, X., Li, L., Liu, G., Gao, Y.: Rating propagation in Web services reputation systems: A fast shapley value approach. In: Database Systems for Advanced Applications - 19th International Conference, DASFAA 2014, Bali, 2014. Proceedings, Part I, pp 466\u2013480 (2014)"},{"key":"544_CR24","doi-asserted-by":"crossref","unstructured":"Liu, A., Zheng, K., Li, L., Liu, G., Zhao, L., Zhou, X.: Efficient secure similarity computation on encrypted trajectory data. In: IEEE 31st International Conference on Data Engineering (ICDE), pp. 66\u201377. IEEE (2015)","DOI":"10.1109\/ICDE.2015.7113273"},{"key":"544_CR25","doi-asserted-by":"crossref","unstructured":"Liu, J., Zhao, K., Sommer, P., Shang, S., Kusy, B., system, R. Jurdak.: Bounded quadrant Error-bounded trajectory compression on the go. In: ICDE, pp. 987\u2013998 (2015)","DOI":"10.1109\/ICDE.2015.7113350"},{"issue":"11","key":"544_CR26","doi-asserted-by":"publisher","first-page":"2827","DOI":"10.1109\/TKDE.2016.2598171","volume":"28","author":"J Liu","year":"2016","unstructured":"Liu, J., Zhao, K., Sommer, P., Shang, S., Kusy, B., Lee, J., Jurdak, R.: A novel framework for online amnesic trajectory compression in resource-constrained environments. IEEE Trans. Knowl. Data Eng. 28(11), 2827\u20132841 (2016)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"544_CR27","doi-asserted-by":"crossref","unstructured":"Liu, X., Liu, A., Zhang, X., Li, Z., Liu, G., Zhao, L., Zhou, X.: When differential privacy meets randomized perturbation: A hybrid approach for privacy-preserving recommender system. In: International Conference on Database Systems for Advanced Applications, pp. 576\u2013591. Springer (2017)","DOI":"10.1007\/978-3-319-55753-3_36"},{"issue":"5","key":"544_CR28","doi-asserted-by":"publisher","first-page":"905","DOI":"10.1007\/s11390-017-1772-5","volume":"32","author":"A Liu","year":"2017","unstructured":"Liu, A., Li, Z., Liu, G., Zheng, K., Zhang, M., Li, Q., Zhang, X.: Privacy-preserving task assignment in spatial crowdsourcing. J. Comput. Sci. Technol. 32(5), 905\u2013918 (2017)","journal-title":"J. Comput. Sci. Technol."},{"key":"544_CR29","doi-asserted-by":"crossref","unstructured":"Liu, A., Wang, W., Shang, S., Li, Q., Zhang, X.: Efficient task assignment in spatial crowdsourcing with worker and task privacy protection. GeoInformatica (2017)","DOI":"10.1007\/s10707-017-0305-2"},{"issue":"7","key":"544_CR30","doi-asserted-by":"publisher","first-page":"440","DOI":"10.14778\/1988776.1988780","volume":"4","author":"A Machanavajjhala","year":"2011","unstructured":"Machanavajjhala, A., Korolova, A., Sarma, A.D.: Personalized social recommendations: accurate or private. Proc. VLDB Endowment 4(7), 440\u2013450 (2011)","journal-title":"Proc. VLDB Endowment"},{"key":"544_CR31","doi-asserted-by":"crossref","unstructured":"McSherry, F.D.: Privacy integrated queries: an extensible platform for privacy-preserving data analysis. In: Proceedings of the 2009 ACM SIGMOD International Conference on Management of data, pp. 19\u201330. ACM (2009)","DOI":"10.1145\/1559845.1559850"},{"key":"544_CR32","doi-asserted-by":"crossref","unstructured":"McSherry, F., Mironov, I.: Differentially private recommender systems: building privacy into the net. In: Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining, pp. 627\u2013636. ACM (2009)","DOI":"10.1145\/1557019.1557090"},{"key":"544_CR33","unstructured":"Mnih, A., Salakhutdinov, R.R.: Probabilistic matrix factorization. In: Advances in neural information processing systems, pp. 1257\u20131264 (2008)"},{"key":"544_CR34","doi-asserted-by":"crossref","unstructured":"Nikolaenko, V., Ioannidis, S., Weinsberg, U., Joye, M., Taft, N., Boneh, D.: Privacy-preserving matrix factorization. In: Proceedings of the ACM SIGSAC conference on Computer & communications security, pp. 801\u2013812. ACM (2013)","DOI":"10.1145\/2508859.2516751"},{"key":"544_CR35","doi-asserted-by":"crossref","unstructured":"Nikolaenko, V., Weinsberg, U., Ioannidis, S., Joye, M., Boneh, D., Taft, N.: Privacy-preserving ridge regression on hundreds of millions of records. In: IEEE Symposium on Security and Privacy (SP), pp. 334\u2013348. IEEE (2013)","DOI":"10.1109\/SP.2013.30"},{"key":"544_CR36","unstructured":"Polat, H., Du, W.: Privacy-preserving collaborative filtering using randomized perturbation techniques. In: 2003. ICDM 2003. Third IEEE International Conference on Data Mining, pp. 625\u2013628. IEEE (2003)"},{"key":"544_CR37","doi-asserted-by":"crossref","unstructured":"Shang, S., Ding, R., Yuan, B., Xie, K., Zheng, K., Kalnis, P.: User oriented trajectory search for trip recommendation. In: Proceedings of the 15th International Conference on Extending Database Technology, pp. 156\u2013167. ACM (2012)","DOI":"10.1145\/2247596.2247616"},{"key":"544_CR38","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1007\/978-3-642-40235-7_8","volume-title":"Advances in Spatial and Temporal Databases","author":"Shuo Shang","year":"2013","unstructured":"Shang, S., Lu, H., Pedersen, T.B., Xie, X.: Finding traffic-aware fastest paths in spatial networks. In: SSTD, pp. 128\u2013145 (2013)"},{"key":"544_CR39","doi-asserted-by":"crossref","unstructured":"Shang, S., Lu, H., Pedersen, T.B., Xie, X.: Modeling of traffic-aware travel time in spatial networks. In: MDM, pp. 247\u2013250 (2013)","DOI":"10.1109\/MDM.2013.34"},{"issue":"3","key":"544_CR40","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1007\/s00778-013-0331-0","volume":"23","author":"S Shang","year":"2014","unstructured":"Shang, S., Ding, R., Zheng, K., Jensen, C. S., Kalnis, P., Zhou, X.: Personalized trajectory matching in spatial networks. VLDB J. 23(3), 449\u2013468 (2014)","journal-title":"VLDB J."},{"issue":"4","key":"544_CR41","doi-asserted-by":"publisher","first-page":"723","DOI":"10.1007\/s10707-015-0227-9","volume":"19","author":"S Shang","year":"2015","unstructured":"Shang, S., Liu, J., Zheng, K., Lu, H., Pedersen, T.B., Wen, J.: Planning unobstructed paths in traffic-aware spatial networks. GeoInformatica 19(4), 723\u2013746 (2015)","journal-title":"GeoInformatica"},{"issue":"6","key":"544_CR42","doi-asserted-by":"publisher","first-page":"1505","DOI":"10.1109\/TKDE.2014.2382583","volume":"27","author":"S Shang","year":"2015","unstructured":"Shang, S., Zheng, K., Jensen, C.S., Yang, B., Kalnis, P., Li, G., Wen, J.: Discovery of path nearby clusters in spatial networks. IEEE Trans. Knowl. Data Eng. 27(6), 1505\u20131518 (2015)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"5","key":"544_CR43","doi-asserted-by":"publisher","first-page":"1132","DOI":"10.1109\/TKDE.2015.2509998","volume":"28","author":"S Shang","year":"2016","unstructured":"Shang, S., Chen, L., Wei, Z., Jensen, C.S., Wen, J.-R., Kalnis, P.: Collective travel planning in spatial networks. IEEE Trans. Knowl. Data Eng. 28(5), 1132\u20131146 (2016)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"544_CR44","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1016\/j.neucom.2015.06.086","volume":"173","author":"S Shang","year":"2016","unstructured":"Shang, S., Guo, D., Liu, J., Zheng, K., Wen, J.: Finding regions of interest using location based social media. Neurocomputing 173, 118\u2013123 (2016)","journal-title":"Neurocomputing"},{"issue":"7","key":"544_CR45","doi-asserted-by":"publisher","first-page":"1549","DOI":"10.1109\/TKDE.2017.2685504","volume":"29","author":"S Shang","year":"2017","unstructured":"Shang, S., Chen, L., Jensen, C.S., Wen, J., Kalnis, P.: Searching trajectories by regions of interest. IEEE Trans. Knowl. Data Eng. 29(7), 1549\u20131562 (2017)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"11","key":"544_CR46","first-page":"1178","volume":"10","author":"S Shang","year":"2017","unstructured":"Shang, S., Chen, L., Wei, Z., Jensen, C.S., Zheng, K., Kalnis, P.: Trajectory similarity join in spatial networks. PVLDB 10(11), 1178\u20131189 (2017)","journal-title":"PVLDB"},{"key":"544_CR47","doi-asserted-by":"crossref","unstructured":"Shen, Y., Jin, H.: Epicrec: Towards practical differentially private framework for personalized recommendation. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 180\u2013191. ACM (2016)","DOI":"10.1145\/2976749.2978316"},{"issue":"05","key":"544_CR48","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L.: k-anonymity: A model for protecting privacy. International Journal of Uncertainty. Fuzziness Knowl.-Based Syst. 10(05), 557\u2013570 (2002)","journal-title":"Fuzziness Knowl.-Based Syst."},{"key":"544_CR49","doi-asserted-by":"crossref","unstructured":"Tang, M., Jiang, Y., Liu, J., Liu, X.: Location-aware collaborative filtering for qos-based service recommendation. In: IEEE 19th International Conference on Web Services (ICWS), pp. 202\u2013209. IEEE (2012)","DOI":"10.1109\/ICWS.2012.61"},{"issue":"4","key":"544_CR50","doi-asserted-by":"publisher","first-page":"29:1","DOI":"10.1145\/2389241.2389248","volume":"37","author":"K Xie","year":"2012","unstructured":"Xie, K., Deng, K., Shang, S., Zhou, X., Zheng, K.: Finding alternative shortest paths in spatial networks. ACM Trans. Database Syst. 37(4), 29:1\u201329:31 (2012)","journal-title":"ACM Trans. Database Syst."},{"key":"544_CR51","doi-asserted-by":"crossref","unstructured":"Xie, Q., Shang, S., Yuan, B., Pang, C., Zhang, X.: Local correlation detection with linearity enhancement in streaming data. In: CIKM, pp. 309\u2013318 (2013)","DOI":"10.1145\/2505515.2505746"},{"key":"544_CR52","doi-asserted-by":"crossref","unstructured":"Yang, B., Guo, C., Jensen, C.S., Kaul, M., Shang, S.: Stochastic skyline route planning under time-varying uncertainty. In: ICDE, pp. 136\u2013147 (2014)","DOI":"10.1109\/ICDE.2014.6816646"},{"key":"544_CR53","doi-asserted-by":"crossref","unstructured":"Yang, B., Dai, J., Guo, C., Jensen, C.S.: Pace: A PAth-CEntric paradigm for stochastic path finding. VLDB Journal online first (2017)","DOI":"10.1007\/s00778-017-0491-4"},{"key":"544_CR54","doi-asserted-by":"crossref","unstructured":"Yao, L., Sheng, Q.Z., Segev, A., Yu, J.: Recommending Web services via combining collaborative filtering with content-based features. In: 2013 IEEE 20th International Conference on Web Services (ICWS), pp. 42\u201349. IEEE (2013)","DOI":"10.1109\/ICWS.2013.16"},{"key":"544_CR55","doi-asserted-by":"crossref","unstructured":"Yu, Q., Zheng, Z., Wang, H.: Trace norm regularized matrix factorization for service recommendation. In: IEEE 20th International Conference on Web Services (ICWS), pp. 34\u201341. IEEE (2013)","DOI":"10.1109\/ICWS.2013.15"},{"key":"544_CR56","doi-asserted-by":"crossref","unstructured":"Yu, D., Liu, Y., Xu, Y., Yin, Y.: Personalized qos prediction for Web services using latent factor models. In: IEEE International Conference on Services Computing (SCC), pp. 107\u2013114. IEEE (2014)","DOI":"10.1109\/SCC.2014.23"},{"key":"544_CR57","doi-asserted-by":"crossref","unstructured":"Zhang, S., Ford, J., Makedon, F.: Deriving private information from randomly perturbed ratings. In: Proceedings of the SIAM International Conference on Data Mining, pp. 59\u201369. SIAM (2006)","DOI":"10.1137\/1.9781611972764.6"},{"key":"544_CR58","doi-asserted-by":"crossref","unstructured":"Zhang, Q., Ding, C.: Collaborative filtering based service ranking using invocation histories. In: 2011 IEEE International Conference on Web Services (ICWS). IEEE, pp 195\u2013202 (2011)","DOI":"10.1109\/ICWS.2011.61"},{"key":"544_CR59","doi-asserted-by":"crossref","unstructured":"Zheng, Z., Ma, H., Lyu, M.R., King, I.: Wsrec: a collaborative filtering based Web service recommender system. In: 2009. ICWS 2009. IEEE International Conference on Web Services, pp. 437\u2013444. IEEE (2009)","DOI":"10.1109\/ICWS.2009.30"},{"key":"544_CR60","doi-asserted-by":"crossref","unstructured":"Zheng, Z., Zhang, Y., Lyu, M.R.: Distributed qos evaluation for real-world Web services. In: 2010 IEEE International Conference on Web Services (ICWS), pp. 83\u201390. IEEE (2010)","DOI":"10.1109\/ICWS.2010.10"},{"issue":"2","key":"544_CR61","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1109\/TSC.2010.52","volume":"4","author":"Z Zheng","year":"2011","unstructured":"Zheng, Z., Ma, H., Lyu, M.R., King, I.: Qos-aware Web service recommendation by collaborative filtering. IEEE Trans. Serv. Comput. 4(2), 140\u2013152 (2011)","journal-title":"IEEE Trans. Serv. Comput."},{"key":"544_CR62","doi-asserted-by":"crossref","unstructured":"Zheng, K., Shang, S., Yuan, N.J., Yang, Y.: Towards efficient search for activity trajectories. In: ICDE, pp. 230\u2013241 (2013)","DOI":"10.1109\/ICDE.2013.6544828"},{"key":"544_CR63","doi-asserted-by":"crossref","unstructured":"Zheng, K., Zheng, Y., Yuan, N.J., Shang, S.: On discovery of gathering patterns from trajectories. In: ICDE, pp. 242\u2013253 (2013)","DOI":"10.1109\/ICDE.2013.6544829"},{"issue":"3","key":"544_CR64","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1109\/TSC.2011.59","volume":"6","author":"Z Zheng","year":"2013","unstructured":"Zheng, Z., Ma, H., Lyu, M.R., King, I.: Collaborative Web service qos prediction via neighborhood integrated matrix factorization. IEEE Trans. Serv. Comput. 6(3), 289\u2013299 (2013)","journal-title":"IEEE Trans. Serv. Comput."},{"issue":"8","key":"544_CR65","doi-asserted-by":"publisher","first-page":"1974","DOI":"10.1109\/TKDE.2013.160","volume":"26","author":"Kai Zheng","year":"2014","unstructured":"Zheng, K., Zheng, Y., Yuan, N.J., Shang, S., Zhou, X.: Online discovery of gathering patterns over trajectories, vol. 26 (2014)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"544_CR66","doi-asserted-by":"crossref","unstructured":"Zheng, K., Su, H., Zheng, B., Shang, S., Xu, J., Liu, J., Zhou, X.: Interactive top-k spatial keyword queries. In: ICDE, pp. 423\u2013434 (2015)","DOI":"10.1109\/ICDE.2015.7113303"},{"key":"544_CR67","doi-asserted-by":"crossref","unstructured":"Zhu, J., He, P., Zheng, Z., Lyu, M.R.: A privacy-preserving qos prediction framework for Web service recommendation. In: IEEE International Conference on Web Services (ICWS), pp. 241\u2013248. IEEE (2015)","DOI":"10.1109\/ICWS.2015.41"}],"container-title":["World Wide Web"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11280-018-0544-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11280-018-0544-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11280-018-0544-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T11:53:28Z","timestamp":1751543608000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11280-018-0544-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4,4]]},"references-count":67,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2019,11]]}},"alternative-id":["544"],"URL":"https:\/\/doi.org\/10.1007\/s11280-018-0544-7","relation":{},"ISSN":["1386-145X","1573-1413"],"issn-type":[{"type":"print","value":"1386-145X"},{"type":"electronic","value":"1573-1413"}],"subject":[],"published":{"date-parts":[[2018,4,4]]},"assertion":[{"value":"15 December 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 January 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 March 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 April 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}