{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,23]],"date-time":"2025-07-23T12:37:26Z","timestamp":1753274246312},"reference-count":9,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2018,10,18]],"date-time":"2018-10-18T00:00:00Z","timestamp":1539820800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2018,10,18]],"date-time":"2018-10-18T00:00:00Z","timestamp":1539820800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2019,3]]},"DOI":"10.1007\/s11432-018-9483-x","type":"journal-article","created":{"date-parts":[[2018,10,19]],"date-time":"2018-10-19T13:09:36Z","timestamp":1539954576000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["UMBRELLA: user demand privacy preserving framework based on association rules and differential privacy in social networks"],"prefix":"10.1007","volume":"62","author":[{"given":"Chunliu","family":"Yan","sequence":"first","affiliation":[]},{"given":"Ziyi","family":"Ni","sequence":"additional","affiliation":[]},{"given":"Bin","family":"Cao","sequence":"additional","affiliation":[]},{"given":"Rongxing","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Shaohua","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Qinyu","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,10,18]]},"reference":[{"key":"9483_CR1","doi-asserted-by":"publisher","first-page":"1033","DOI":"10.1109\/TMC.2017.2753244","volume":"17","author":"H X Li","year":"2018","unstructured":"Li H X, Zhu H J, Ma D. Demographic information inference through meta-data analysis of wi-fi traffic. IEEE Trans Mobile Comput, 2018, 17: 1033\u20131047","journal-title":"IEEE Trans Mobile Comput"},{"key":"9483_CR2","volume-title":"IEEE Trans Depen Secur Comput","author":"H X Li","year":"2017","unstructured":"Li H X, Chen Q R, Zhu H J, et al. Privacy leakage via de-anonymization and aggregation in heterogeneous social networks. IEEE Trans Depen Secur Comput, 2017. doi: 10.1109\/TDSC.2017.2754249"},{"key":"9483_CR3","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1109\/JSYST.2014.2354235","volume":"11","author":"T Peng","year":"2017","unstructured":"Peng T, Liu Q, Wang G J. Enhanced location privacy preserving scheme in location-based services. IEEE Syst J, 2017, 11: 219\u2013230","journal-title":"IEEE Syst J"},{"key":"9483_CR4","first-page":"351","volume-title":"Proceedings of International Conference on Computing, Networking and Communications","author":"A R Shahid","year":"2017","unstructured":"Shahid A R, Jeukeng L, Zeng W, et al. PPVC: privacy preserving voronoi cell for location-based services. In: Proceedings of International Conference on Computing, Networking and Communications, Santa Clara, 2017. 351\u2013355"},{"key":"9483_CR5","doi-asserted-by":"publisher","first-page":"092101","DOI":"10.1007\/s11432-015-0981-4","volume":"60","author":"X D Ma","year":"2017","unstructured":"Ma X D, Li H, Ma J F, et al. APPLET: a privacypreserving framework for location-aware recommender system. Sci China Inf Sci, 2017, 60: 092101","journal-title":"Sci China Inf Sci"},{"key":"9483_CR6","doi-asserted-by":"publisher","first-page":"7729","DOI":"10.1109\/TVT.2015.2499791","volume":"65","author":"H Zhu","year":"2016","unstructured":"Zhu H, Lu R X, Huang C, et al. An efficient privacypreserving location-based services query scheme in outsourced cloud. IEEE Trans Veh Technol, 2016, 65: 7729\u20137739","journal-title":"IEEE Trans Veh Technol"},{"key":"9483_CR7","doi-asserted-by":"publisher","first-page":"901","DOI":"10.1145\/2508859.2516735","volume-title":"Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security","author":"M E Andr\u00e9s","year":"2013","unstructured":"Andr\u00e9s M E, Bordenabe N E, Chatzikokolakis K, et al. Geo-indistinguishability: differential privacy for location-based systems. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, Berlin, 2013. 901\u2013914"},{"key":"9483_CR8","first-page":"299","volume-title":"Proceedings of the 15th Privacy Enhancing Technologies","author":"R Shokri","year":"2015","unstructured":"Shokri R. Privacy games: optimal user-centric data obfuscation. In: Proceedings of the 15th Privacy Enhancing Technologies, Philadelphia, 2015. 299\u2013315"},{"key":"9483_CR9","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1016\/S0169-023X(01)00003-9","volume":"37","author":"L Feng","year":"2001","unstructured":"Feng L, Dillon T, Liu J. Inter-transactional association rules for multi-dimensional contexts for prediction and their application to studying meteorological data. Data Knowl Eng, 2001, 37: 85\u2013115","journal-title":"Data Knowl Eng"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-018-9483-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11432-018-9483-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-018-9483-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,16]],"date-time":"2024-07-16T23:02:10Z","timestamp":1721170930000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11432-018-9483-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,18]]},"references-count":9,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2019,3]]}},"alternative-id":["9483"],"URL":"https:\/\/doi.org\/10.1007\/s11432-018-9483-x","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"value":"1674-733X","type":"print"},{"value":"1869-1919","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,10,18]]},"assertion":[{"value":"10 April 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 June 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 October 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"39106"}}