{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,21]],"date-time":"2025-04-21T22:08:00Z","timestamp":1745273280624},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J. Comput. Sci. Technol."],"published-print":{"date-parts":[[2020,5]]},"DOI":"10.1007\/s11390-020-0256-1","type":"journal-article","created":{"date-parts":[[2020,6,8]],"date-time":"2020-06-08T21:02:32Z","timestamp":1591650152000},"page":"629-646","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Cloaking Region Based Passenger Privacy Protection in Ride-Hailing Systems"],"prefix":"10.1007","volume":"35","author":[{"given":"Yubin","family":"Duan","sequence":"first","affiliation":[]},{"given":"Guo-Ju","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Ming-Jun","family":"Xiao","sequence":"additional","affiliation":[]},{"given":"Jie","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,5,29]]},"reference":[{"key":"256_CR1","doi-asserted-by":"crossref","unstructured":"Duan Y, Mosharraf T, Wu J, Zheng H. Optimizing carpool scheduling algorithm through partition merging. In Proc. the IEEE Int. Conf. Communication, May 2018.","DOI":"10.1109\/ICC.2018.8422976"},{"key":"256_CR2","doi-asserted-by":"crossref","unstructured":"Gao G, Xiao M, Zhao Z. Optimal multi-taxi dispatch for mobile taxi-hailing systems. In Proc. the 45th IEEE Int. Conf. Parallel Processing, August 2016, pp.294-303.","DOI":"10.1109\/ICPP.2016.41"},{"key":"256_CR3","doi-asserted-by":"crossref","unstructured":"Shokri R, Theodorakopoulos G, le Boudec J Y, Hubaux J P. Quantifying location privacy. In Proc. the 32nd IEEE Symp. Security and Privacy, May 2011, pp.247-262.","DOI":"10.1109\/SP.2011.18"},{"key":"256_CR4","doi-asserted-by":"crossref","unstructured":"Meyer-Lee G, Shang J, Wu J. Location-leaking through network traffic in mobile augmented reality applications. In Proc. the 37th IEEE Int. Performance Computing and Communications Conf., November 2018.","DOI":"10.1109\/PCCC.2018.8711065"},{"issue":"2","key":"256_CR5","first-page":"123","volume":"3","author":"ML Damiani","year":"2010","unstructured":"Damiani M L, Bertino E, Silvestri C. The PROBE framework for the personalized cloaking of private locations. Trans. Data Privacy, 2010, 3(2): 123-148.","journal-title":"Trans. Data Privacy"},{"key":"256_CR6","doi-asserted-by":"crossref","unstructured":"Xue M, Kalnis P, Pung H K. Location diversity: Enhanced privacy protection in location based services. In Proc. the 4th Int. Symp. Location and Context Awareness, May 2009, pp.70-87.","DOI":"10.1007\/978-3-642-01721-6_5"},{"key":"256_CR7","doi-asserted-by":"crossref","unstructured":"Pham A, Dacosta I, Endignoux G, Troncoso-Pastoriza J R, Huguenin K, Hubaux J P. ORide: A privacy-preserving yet accountable ride-hailing service. In Proc. the 26th USENIX Security Symp., August 2017, pp.1235-1252.","DOI":"10.1515\/popets-2017-0015"},{"key":"256_CR8","doi-asserted-by":"crossref","unstructured":"A\u00efvodji U M, Huguenin K, Huguet M J, Killijian M O. SRide: A privacy-preserving ridesharing system. In Proc. the 11th ACM Conf. Security & Privacy in Wireless and Mobile Networks, June 2018, pp.40-50.","DOI":"10.1145\/3212480.3212483"},{"issue":"7","key":"256_CR9","first-page":"5994","volume":"67","author":"Y He","year":"2018","unstructured":"He Y, Ni J, Wang X, Niu B, Li F, Shen X. Privacypreserving partner selection for ride-sharing services. IEEE Trans. Vehicular Technology, 2018, 67(7): 5994-6005.","journal-title":"IEEE Trans. Vehicular Technology"},{"key":"256_CR10","doi-asserted-by":"crossref","unstructured":"Khazbak Y, Fan J, Zhu S, Cao G. Preserving location privacy in ride-hailing service. In Proc. the 2008 IEEE Conf. Communications and Network Security, May 2018.","DOI":"10.1109\/CNS.2018.8433221"},{"issue":"3","key":"256_CR11","doi-asserted-by":"crossref","first-page":"345","DOI":"10.1145\/116873.116880","volume":"23","author":"F Aurenhammer","year":"1991","unstructured":"Aurenhammer F. Voronoi diagrams \u2014 A survey of a fundamental geometric data structure. ACM Computing Surveys, 1991, 23(3): 345-405.","journal-title":"ACM Computing Surveys"},{"key":"256_CR12","doi-asserted-by":"crossref","unstructured":"Duan Y, Gao G, Xiao M, Wu J. A privacy-preserving order dispatch scheme for ride-hailing services. In Proc. the 16th Int. Conf. Mobile Ad-hoc and Smart Systems, November 2019.","DOI":"10.1109\/MASS.2019.00023"},{"issue":"2","key":"256_CR13","doi-asserted-by":"crossref","first-page":"249","DOI":"10.1007\/s11390-018-1817-4","volume":"33","author":"SA Hadiwardoyo","year":"2018","unstructured":"Hadiwardoyo S A, Patra S, Calafate C T, Cano J C, Manzoni P. An intelligent transportation system application for smartphones based on vehicle position advertising and route sharing in vehicular ad-hoc networks. Journal of Computer Sci. and Tech., 2018, 33(2): 249-262.","journal-title":"Journal of Computer Sci. and Tech."},{"issue":"1","key":"256_CR14","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1109\/MPRV.2003.1186725","volume":"2","author":"AR Beresford","year":"2003","unstructured":"Beresford A R, Stajano F. Location privacy in pervasive computing. IEEE Pervasive Computing, 2003, 2(1): 46-55.","journal-title":"IEEE Pervasive Computing"},{"issue":"5","key":"256_CR15","doi-asserted-by":"crossref","first-page":"905","DOI":"10.1007\/s11390-017-1772-5","volume":"32","author":"A Liu","year":"2017","unstructured":"Liu A, Li Z X, Liu G F, Zheng K, Zhang M, Li Q, Zhang X. Privacy-preserving task assignment in spatial crowdsourcing. Journal of Computer Sci. and Tech., 2017, 32(5): 905-918.","journal-title":"Journal of Computer Sci. and Tech."},{"key":"256_CR16","unstructured":"Hoh B, Gruteser M. Protecting location privacy through path confusion. In Proc. the 1st IEEE Int. Conf. Security and Privacy for Emerging Areas in Communications Networks, September 2005, pp.194-205."},{"key":"256_CR17","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1016\/j.trc.2016.10.017","volume":"73","author":"D S\u00e1nchez","year":"2016","unstructured":"S\u00e1nchez D, Mart\u00ednez S, Domingo-Ferrer J. Co-utile P2P ridesharing via decentralization and reputation management. Transportation Research Part C: Emerging Technologies, 2016, 73: 147-166.","journal-title":"Transportation Research Part C: Emerging Technologies"},{"issue":"2","key":"256_CR18","doi-asserted-by":"crossref","first-page":"154","DOI":"10.1109\/TBDATA.2016.2599936","volume":"3","author":"P Goel","year":"2017","unstructured":"Goel P, Kulik L, Ramamohanarao K. Optimal pick up point selection for effective ride sharing. IEEE Trans. Big Data, 2017, 3(2): 154-168.","journal-title":"IEEE Trans. Big Data"},{"key":"256_CR19","doi-asserted-by":"crossref","unstructured":"Dai C, Yuan X, Wang C. Privacy-preserving ridesharing recommendation in geosocial networks. In Proc. the 5th Int. Conf. Computational Social Networks, August 2016, pp.193-205.","DOI":"10.1007\/978-3-319-42345-6_17"},{"key":"256_CR20","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1016\/j.trc.2016.09.017","volume":"72","author":"UM A\u00efvodji","year":"2016","unstructured":"A\u00efvodji U M, Gambs S, Huguet M J, Killijian M O. Meeting points in ridesharing: A privacy-preserving approach. Transportation Research Part C: Emerging Technologies, 2016, 72: 239-253.","journal-title":"Transportation Research Part C: Emerging Technologies"},{"issue":"4","key":"256_CR21","doi-asserted-by":"crossref","first-page":"646","DOI":"10.1109\/TDSC.2016.2604383","volume":"15","author":"H Li","year":"2018","unstructured":"Li H, Zhu H, Du S, Liang X, Shen X S. Privacy leakage of location sharing in mobile social networks: Attacks and defense. IEEE Trans. Dependable and Secure Computing, 2018, 15(4): 646-660.","journal-title":"IEEE Trans. Dependable and Secure Computing"},{"issue":"6","key":"256_CR22","doi-asserted-by":"crossref","first-page":"886","DOI":"10.15837\/ijccc.2017.6.2886","volume":"12","author":"N Zhang","year":"2017","unstructured":"Zhang N, Zhong S, Tian L. Using blockchain to protect personal privacy in the scenario of online taxi-hailing. Int. Journal of Computers Communications Control, 2017, 12(6): 886-902.","journal-title":"Int. Journal of Computers Communications Control"},{"issue":"2","key":"256_CR23","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1515\/popets-2017-0015","volume":"2017","author":"A Pham","year":"2017","unstructured":"Pham A, Dacosta I, Jacot-Guillarmod B, Huguenin K, Hajar T, Tram\u00e8r F, Gligor V, Hubaux J, P. PrivateRide: A privacy-enhanced ride-hailing service. Proceedings on Privacy Enhancing Technologies, 2017, 2017(2): 38-56.","journal-title":"Proceedings on Privacy Enhancing Technologies"},{"issue":"1","key":"256_CR24","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1109\/TSG.2012.2228240","volume":"4","author":"X Liang","year":"2013","unstructured":"Liang X, Li X, Lu R, Lin X, Shen X. UDP: Usage-based dynamic pricing with privacy preservation for smart grid. IEEE Trans. Smart Grid, 2013, 4(1): 141-150.","journal-title":"IEEE Trans. Smart Grid"},{"key":"256_CR25","doi-asserted-by":"crossref","unstructured":"Zhuo X, Gao W, Cao G, Dai Y. Win-coupon: An incentive framework for 3G traffic offloading. In Proc. the 19th Annual IEEE Int. Conf. Network Protocols, October 2011, pp.206-215.","DOI":"10.1109\/ICNP.2011.6089054"},{"issue":"12","key":"256_CR26","doi-asserted-by":"crossref","first-page":"2982","DOI":"10.1109\/TMC.2018.2829506","volume":"17","author":"G Gao","year":"2018","unstructured":"Gao G, Xiao M, Wu J, Huang L, Hu C. Truthful incentive mechanism for nondeterministic crowdsensing with vehicles. IEEE Trans. Mobile Computing, 2018, 17(12): 2982-2997.","journal-title":"IEEE Trans. Mobile Computing"},{"issue":"1","key":"256_CR27","doi-asserted-by":"crossref","first-page":"242","DOI":"10.1257\/aer.97.1.242","volume":"97","author":"B Edelman","year":"2007","unstructured":"Edelman B, Ostrovsky M, Schwarz M. Internet advertising and the generalized second-price auction: Selling billions of dollars worth of keywords. The American Economic Review, 2007, 97(1): 242-259.","journal-title":"The American Economic Review"},{"issue":"1","key":"256_CR28","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1111\/j.1540-6261.1961.tb02789.x","volume":"16","author":"W Vickrey","year":"1961","unstructured":"Vickrey W. Counterspeculation, auctions, and competitive sealed tenders. The Journal of Finance, 1961, 16(1): 8-37.","journal-title":"The Journal of Finance"},{"key":"256_CR29","doi-asserted-by":"crossref","unstructured":"Cheng R, Zhang Y, Bertino E, Prabhakar S. Preserving user location privacy in mobile data management infrastructures. In Proc. the 6th Int. Workshop on Privacy Enhancing Technologies, June 2006, pp.393-412.","DOI":"10.1007\/11957454_23"}],"container-title":["Journal of Computer Science and Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11390-020-0256-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11390-020-0256-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11390-020-0256-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,8]],"date-time":"2020-06-08T21:08:55Z","timestamp":1591650535000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11390-020-0256-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,5]]},"references-count":29,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2020,5]]}},"alternative-id":["256"],"URL":"https:\/\/doi.org\/10.1007\/s11390-020-0256-1","relation":{},"ISSN":["1000-9000","1860-4749"],"issn-type":[{"value":"1000-9000","type":"print"},{"value":"1860-4749","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,5]]},"assertion":[{"value":"30 December 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 March 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 May 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}