{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T13:35:25Z","timestamp":1775914525331,"version":"3.50.1"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2019,7,3]],"date-time":"2019-07-03T00:00:00Z","timestamp":1562112000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,7,3]],"date-time":"2019-07-03T00:00:00Z","timestamp":1562112000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61403109"],"award-info":[{"award-number":["61403109"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61202458"],"award-info":[{"award-number":["61202458"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100013286","name":"Specialized Research Fund for the Doctoral Program of Higher Education of China","doi-asserted-by":"crossref","award":["20112303120007"],"award-info":[{"award-number":["20112303120007"]}],"id":[{"id":"10.13039\/501100013286","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100005046","name":"Heilongjiang Natural Science Foundation","doi-asserted-by":"crossref","award":["F2017021"],"award-info":[{"award-number":["F2017021"]}],"id":[{"id":"10.13039\/501100005046","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Scientific Research Fund of Heilongjiang Provincial Education Department","award":["12541169"],"award-info":[{"award-number":["12541169"]}]},{"name":"Specialized Research Fund for Scientific and Technological Innovation Talents of Harbin","award":["2016RAQXJ036"],"award-info":[{"award-number":["2016RAQXJ036"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2019,9]]},"DOI":"10.1007\/s12083-019-00774-8","type":"journal-article","created":{"date-parts":[[2019,7,3]],"date-time":"2019-07-03T01:03:36Z","timestamp":1562115816000},"page":"1097-1109","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":29,"title":["Location protection method for mobile crowd sensing based on local differential privacy preference"],"prefix":"10.1007","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2909-5456","authenticated-orcid":false,"given":"Jian","family":"Wang","sequence":"first","affiliation":[]},{"given":"Yanli","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Guosheng","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Zhongnan","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,3]]},"reference":[{"issue":"1","key":"774_CR1","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/COMST.2015.2415528","volume":"18","author":"X Zhang","year":"2017","unstructured":"Zhang X, Yang Z, Sun W et al (2017) Incentives for Mobile Crowd Sensing: A Survey[J]. IEEE Commun Surv Tutorials 18(1):54\u201367","journal-title":"IEEE Commun Surv Tutorials"},{"issue":"1","key":"774_CR2","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1145\/2794400","volume":"48","author":"B Guo","year":"2015","unstructured":"Guo B, Wang Z, Yu Z et al (2015) Mobile crowd sensing and computing: The review of an emerging human-powered sensing paradigm[J]. ACM Comput Surv 48(1):7","journal-title":"ACM Comput Surv"},{"key":"774_CR3","doi-asserted-by":"crossref","unstructured":"Guo B, Yu Z, Zhou X, et al. (2014) From participatory sensing to Mobile Crowd Sensing[C]. Proceedings of the 2014 IEEE International Conference on Pervasive Computing and Communications Workshops, 593-598","DOI":"10.1109\/PerComW.2014.6815273"},{"key":"774_CR4","doi-asserted-by":"crossref","unstructured":"Gruteser M, Grunwald D (2003) Anonymous usage of location-based services through spatial and temporal cloaking[C]. Proceedings of the 1st ACM International Conference on Mobile Systems, Applications and Services, 31-42","DOI":"10.1145\/1066116.1189037"},{"issue":"4","key":"774_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1620585.1620591","volume":"34","author":"CY Chow","year":"2009","unstructured":"Chow CY, Mokbel MF, Aref WG (2009) Casper: query processing for location services without compromising privacy[J]. ACM Trans Database Syst 34(4):1\u201348","journal-title":"ACM Trans Database Syst"},{"issue":"1","key":"774_CR6","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/MPRV.2003.1186725","volume":"2","author":"A BERESFORD","year":"2003","unstructured":"BERESFORD A, STAJANO F (2003) Location privacy in pervasive computing[J]. IEEE Pervasive Comput 2(1):46\u201355","journal-title":"IEEE Pervasive Comput"},{"issue":"3","key":"774_CR7","doi-asserted-by":"publisher","first-page":"495","DOI":"10.1109\/TMC.2014.2321747","volume":"14","author":"B Palanisamy","year":"2015","unstructured":"Palanisamy B, Liu L (2015) Attack-resilient mix-zones over road networks: architecture and algorithms[J]. IEEE Trans Mob Comput 14(3):495\u2013508","journal-title":"IEEE Trans Mob Comput"},{"key":"774_CR8","doi-asserted-by":"crossref","unstructured":"Dwork C, Kenthapadi K, McSherry F et al. (2006) Our data, ourselves: privacy via distributed noise generation[C]. Proceedings of the 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, 486-503","DOI":"10.1007\/11761679_29"},{"key":"774_CR9","doi-asserted-by":"crossref","unstructured":"Dwork C, McSherry F, Nissim K, et al. (2006) Calibrating noise to sensitivity in private data analysis[C]. Proceedings of the 3rd Theory of Cryptography Conference, 265-284","DOI":"10.1007\/11681878_14"},{"key":"774_CR10","unstructured":"Anders M (2013) Differential privacy for location- based systems[C]. Proceedings of the 2013 ACM SIGSAC conference on Computer & Communications security, 901-914"},{"issue":"12","key":"774_CR11","doi-asserted-by":"publisher","first-page":"2360","DOI":"10.1109\/TMC.2012.208","volume":"12","author":"R Dewri","year":"2013","unstructured":"Dewri R (2013) Local differential perturbations: location privacy under approximate knowledge attackers[J]. IEEE Trans Mob Comput 12(12):2360\u20132372","journal-title":"IEEE Trans Mob Comput"},{"key":"774_CR12","unstructured":"Jin X, Zhang R, Chen Y et al. (2016) DP Sense: Differentially private crowdsourced spectrum sensing[C]. Proceedings of the ACM Conference on Comput.Commun.Secur, 296-307"},{"issue":"10","key":"774_CR13","doi-asserted-by":"publisher","first-page":"2444","DOI":"10.1109\/TIFS.2017.2707334","volume":"12","author":"W Tong","year":"2017","unstructured":"Tong W, Hua J, Zhong S (2017) A jointly differentially private scheduling protocol for ridesharing services [J]. IEEE Trans Inf Forensics Secur 12(10):2444\u20132456","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"774_CR14","doi-asserted-by":"crossref","unstructured":"Kearns M, Pai M.M, Roth A et al. (2014) Mechanism design in large games: Incentives and privacy[C]. Proceedings of the ACM ITCS, 403-410","DOI":"10.1145\/2554797.2554834"},{"key":"774_CR15","doi-asserted-by":"crossref","unstructured":"Jin X, Zhang Y (2016) Privacy-preserving crowdsourced spectrum sensing[C]. Proceedings of the IEEE INFOCOM, 1-9","DOI":"10.1109\/INFOCOM.2016.7524588"},{"key":"774_CR16","doi-asserted-by":"crossref","unstructured":"Kasiviswanathan S P, Lee H K, Nissim K et al. (2008) What can we learn privately[C]. Proceedings of the 49th Annual IEEE Symp.on Foundations of Computer Science, 531-540","DOI":"10.1109\/FOCS.2008.27"},{"key":"774_CR17","unstructured":"Duchi J C, Jordan M I, Wainwright M J (2013) Local privacy and statistical minimax rates[C]. Proceedings of the 54th Annual IEEE Symp.on Foundations of Computer Science, 429-438"},{"key":"774_CR18","unstructured":"Kairouz P, Oh S, Viswanath P (2014) Extremal mechanisms for local differential privacy[J]. Advances in Neural Information Processing Systems, 2879-2887"},{"key":"774_CR19","doi-asserted-by":"crossref","unstructured":"Erlingsson \u00da, Pihur V, Rappor KA (2014) Randomized aggregatable privacy-preserving ordinal response[C]. Proceedings of the 2014 ACM SIGSAC Conf.on Computer and Communications Security, 1054-1067","DOI":"10.1145\/2660267.2660348"},{"key":"774_CR20","doi-asserted-by":"crossref","unstructured":"Dwork C, Lei J (2009) Differential privacy and robust statistics[C]. Proceedings of the 41st Annual ACM Symp.on Theory of Conputing, 371-380","DOI":"10.1145\/1536414.1536466"},{"issue":"1","key":"774_CR21","first-page":"492","volume":"17","author":"P Kairouz","year":"2016","unstructured":"Kairouz P, Oh S, Viswanath P (2016) Extremal mechanisms for local differential privacy[J]. J Mach Learning Res 17(1):492\u2013542","journal-title":"J Mach Learning Res"},{"issue":"12","key":"774_CR22","first-page":"79","volume":"50","author":"XJ Zhang","year":"2016","unstructured":"Zhang XJ, Gui XL (2016) Jiang J H. A user-centric location privacy-preserving method with differential perturbation for location-based services[J]. J Xi'an Jiaotong Univ 50(12):79\u201386","journal-title":"J Xi'an Jiaotong Univ"},{"issue":"Z1","key":"774_CR23","first-page":"110","volume":"36","author":"YZ Hu","year":"2015","unstructured":"Hu YZ, Zhang FB (2015) GanZ C, et al. QoS modeling and evaluation of mobile application service based on scene[J]. J Commun 36(Z1):110\u2013117","journal-title":"J Commun"},{"key":"774_CR24","unstructured":"Kairouz P, Bonawitz K, Ramage D (2016) Discrete distribution estimation under local privacy[C]. Proceedings of the 33rd Int\u2019l Conf.on Machine Learning, 2436-2444"},{"issue":"52","key":"774_CR25","first-page":"75","volume":"5","author":"XD Bi","year":"2017","unstructured":"Bi XD, Liang Y, Shi HZ et al (2017) A parameterized location privacy protection method based on two-level anonymity[J]. J Shandong Univ 5(52):75\u201384","journal-title":"J Shandong Univ"},{"issue":"2","key":"774_CR26","first-page":"400","volume":"41","author":"Z Huo","year":"2018","unstructured":"Huo Z (2018) Meng X F. A trajectory data publication method under differential privacy[J]. Chin J comput 41(2):400\u2013412","journal-title":"Chin J comput"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-019-00774-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12083-019-00774-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-019-00774-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T23:54:56Z","timestamp":1593647696000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12083-019-00774-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7,3]]},"references-count":26,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2019,9]]}},"alternative-id":["774"],"URL":"https:\/\/doi.org\/10.1007\/s12083-019-00774-8","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,7,3]]},"assertion":[{"value":"29 November 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 June 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 July 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}