{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,7]],"date-time":"2025-12-07T21:12:37Z","timestamp":1765141957454,"version":"3.37.3"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2020,2,8]],"date-time":"2020-02-08T00:00:00Z","timestamp":1581120000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,2,8]],"date-time":"2020-02-08T00:00:00Z","timestamp":1581120000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61672179","61370083","61402126"],"award-info":[{"award-number":["61672179","61370083","61402126"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100005046","name":"Natural Science Foundation of Heilongjiang Province","doi-asserted-by":"crossref","award":["F2015030"],"award-info":[{"award-number":["F2015030"]}],"id":[{"id":"10.13039\/501100005046","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Science Foundation for Youths of Heilongjiang","award":["QC2016083"],"award-info":[{"award-number":["QC2016083"]}]},{"DOI":"10.13039\/501100004027","name":"Postdoctoral Foundation of Hei Long Jiang Province","doi-asserted-by":"publisher","award":["LBH-Z14071"],"award-info":[{"award-number":["LBH-Z14071"]}],"id":[{"id":"10.13039\/501100004027","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Ambient Intell Human Comput"],"published-print":{"date-parts":[[2021,1]]},"DOI":"10.1007\/s12652-020-01746-0","type":"journal-article","created":{"date-parts":[[2020,2,8]],"date-time":"2020-02-08T12:02:35Z","timestamp":1581163355000},"page":"201-212","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["A differential privacy based probabilistic mechanism for mobility datasets releasing"],"prefix":"10.1007","volume":"12","author":[{"given":"Jianpei","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Qing","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Yiran","family":"Shen","sequence":"additional","affiliation":[]},{"given":"Yong","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Xu","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Bo","family":"Wei","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,2,8]]},"reference":[{"key":"1746_CR1","doi-asserted-by":"crossref","unstructured":"Acs G, Castelluccia C (2014) A case study: Privacy preserving release of spatio-temporal density in paris. In: Proceedings of the 20th ACM international conference on Knowledge discovery and data mining (SIGKDD), New York, pp 1679\u20131688","DOI":"10.1145\/2623330.2623361"},{"key":"1746_CR2","unstructured":"Andr\u00e9s ME, Bordenabe NE, Chatzikokolakis K, Palamidessi C (2012) Geo-indistinguishability: differential privacy for location-based systems. arXiv preprint arXiv:12121984"},{"key":"1746_CR3","first-page":"251","volume-title":"Proceedings of the 2014 ACM conference on computer and communications security","author":"NE Bordenabe","year":"2014","unstructured":"Bordenabe NE, Chatzikokolakis K, Palamidessi C (2014) Optimal geo-indistinguishable mechanisms for location privacy. In: Proceedings of the 2014 ACM conference on computer and communications security (SIGSAC), Scottsdale, Arizona, USA, pp 251\u2013262"},{"key":"1746_CR8","first-page":"61","volume-title":"Proceedings of the International AAAI Conference on Weblogs and Social Media (ICWSM 2013)","author":"T Chen","year":"2013","unstructured":"Chen T, Kaafar MA, Boreli R (2013) The where and when of finding new friends: analysis of a location-based social discovery network. In: Proceedings of the international AAAI conference on weblogs and social media (ICWSM 2013), Boston, pp 61\u201367"},{"issue":"6","key":"1746_CR4","first-page":"1478","volume":"18","author":"C Chen","year":"2016","unstructured":"Chen C, Zhang D, Ma X, Guo B, Wang L, Wang Y, Sha E (2016) Crowddeliver: planning city-wide package delivery paths leveraging the crowd of taxis. IEEE Trans Intell Transp Syst 18(6):1478\u20131496","journal-title":"IEEE Trans Intell Transp Syst"},{"issue":"10","key":"1746_CR5","doi-asserted-by":"publisher","first-page":"3292","DOI":"10.1109\/TITS.2017.2771231","volume":"19","author":"C Chen","year":"2018","unstructured":"Chen C, Jiao S, Zhang S, Liu W, Feng L, Wang Y (2018) Tripimputor: real-time imputing taxi trip purpose leveraging multi-sourced urban data. IEEE Trans Intell Transp Syst 19(10):3292\u20133304","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"1746_CR6","doi-asserted-by":"publisher","unstructured":"Chen C, Ding Y, Xie X, Zhang S, Wang Z, Feng L (2019) Trajcompressor: an online map-matching-based trajectory compression framework leveraging vehicle heading direction and change. IEEE Trans Intell Transp Syst. https:\/\/doi.org\/10.1109\/TITS.2019.2910591","DOI":"10.1109\/TITS.2019.2910591"},{"key":"1746_CR7","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1007\/11957454_23","volume-title":"Proceedings of Privacy Enhancing Technologies (PET)","author":"R Cheng","year":"2006","unstructured":"Cheng R, Zhang Y, Bertino E, Prabhakar S (2006) Preserving user location privacy in mobile data management infrastructures. In: Proceedings of privacy enhancing technologies (PET), 6th international workshop, Cambridge, pp 393\u2013412"},{"issue":"1","key":"1746_CR9","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1016\/j.jalgor.2003.12.001","volume":"55","author":"G Cormode","year":"2004","unstructured":"Cormode G, Muthukrishnan S (2004) An improved data stream summary: the count-min sketch and its applications. J Algorithms 55(1):58\u201375","journal-title":"J Algorithms"},{"key":"1746_CR10","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-019-01227-z","author":"X Deng","year":"2019","unstructured":"Deng X, Xin X, Gao T (2019) A location privacy protection scheme based on random encryption period for VSNS. J Ambient Intell Human Comput. https:\/\/doi.org\/10.1007\/s12652-019-01227-z","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"1746_CR11","first-page":"152","volume-title":"International conference on pervasive computing (Pervasive 2005)","author":"M Duckham","year":"2005","unstructured":"Duckham M, Kulik L (2005) A formal model of obfuscation and negotiation for location privacy. In: International conference on pervasive computing (Pervasive 2005). Springer, Munich, Germany, pp 152\u2013170"},{"key":"1746_CR12","first-page":"189","volume-title":"IEEE international conference on pervasive computing and communications (PerCom)","author":"F D\u00fcrr","year":"2011","unstructured":"D\u00fcrr F, Skvortsov P, Rothermel K (2011) Position sharing for location privacy in non-trusted systems. In: 2011 IEEE international conference on pervasive computing and communications (PerCom), Seattle, USA, pp 189\u2013196"},{"key":"1746_CR13","first-page":"2631","volume":"15","author":"L Gong","year":"2018","unstructured":"Gong L, Zhao Y, Chaocan X, Li Z, Qian C, Yang P (2018) Robust light-weight magnetic-based door event detection with smartphones. IEEE Trans Mob Comput 18(11):2631\u20132646","journal-title":"IEEE Trans Mob Comput"},{"key":"1746_CR14","first-page":"250","volume-title":"Proceedings of the conference on empirical methods in natural language processing","author":"F Goyal","year":"2011","unstructured":"Goyal A, Daum\u00e9\u00a0III H (2011) Approximate scalable bounded space sketch for large data NLP. In: Proceedings of the conference on empirical methods in natural language processing. Association for Computational Linguistics, Scotland, UK, pp 250\u2013261"},{"key":"1746_CR15","unstructured":"Grace F (2003) Stalker victims should check for gps. CBS Broadcast Center. http:\/\/www.cbsnews.com"},{"key":"1746_CR16","doi-asserted-by":"publisher","first-page":"705","DOI":"10.1145\/1806689.1806786","volume-title":"Proceedings of the forty-second ACM symposium on theory of computing","author":"M Hardt","year":"2010","unstructured":"Hardt M, Talwar K (2010) On the geometry of differential privacy. In: Proceedings of the forty-second ACM symposium on theory of computing, Cambridge, MA, USA, pp 705\u2013714"},{"key":"1746_CR17","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1145\/1247660.1247689","volume-title":"Proceedings of the 5th international conference on Mobile systems, applications and services","author":"T Jiang","year":"2007","unstructured":"Jiang T, Wang HJ, Hu YC (2007) Preserving location privacy in wireless lans. In: Proceedings of the 5th international conference on Mobile systems, applications and services, New York, US, pp 246\u2013257"},{"key":"1746_CR18","doi-asserted-by":"publisher","unstructured":"Kalaiarasy C, Sreenath N, Amuthan A (2019) An effective variant ring signature-based pseudonym changing mechanism for privacy preservation in mixed zones of vehicular networks. J Ambient Intell Human Comput. https:\/\/doi.org\/10.1007\/s12652-019-01304-3","DOI":"10.1007\/s12652-019-01304-3"},{"key":"1746_CR19","first-page":"88","volume-title":"Proceedings of international conference on pervasive services","author":"H Kido","year":"2005","unstructured":"Kido H, Yanagisawa Y, Satoh T (2005) An anonymous communication technique using dummies for location-based services. In: Proceedings of international conference on pervasive services (ICPS\u201905), Santorini, Greece, pp 88\u201397"},{"key":"1746_CR20","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/11853565_15","volume-title":"UbiComp 2006: Ubiquitous Computing","author":"J Krumm","year":"2006","unstructured":"Krumm J, Horvitz E (2006) Predestination: Inferring destinations from partial trajectories. In: UbiComp 2006: Ubiquitous computing, 8th international conference, Orange County, CA, USA, 17\u201321 September 2006, pp 243-260"},{"issue":"1\u20132","key":"1746_CR21","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1002\/nav.3800020109","volume":"2","author":"HW Kuhn","year":"1955","unstructured":"Kuhn HW (1955) The hungarian method for the assignment problem. Nav Res Log Q 2(1\u20132):83\u201397","journal-title":"Nav Res Log Q"},{"key":"1746_CR22","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/11853565_15","volume-title":"UbiComp 2006: Ubiquitous Computing","author":"J Krumm","year":"2006","unstructured":"Lu H, Jensen CS, Yiu ML (2008) Pad: privacy-area aware, dummy-based location privacy in mobile services. In: Proceedings of the seventh ACM international workshop on data engineering for wireless and mobile access, Vancouver, Canada, pp 16\u201323"},{"issue":"1","key":"1746_CR23","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1109\/TNET.2019.2890860","volume":"27","author":"C Luo","year":"2019","unstructured":"Luo C, Liu X, Xue W, Shen Y, Li J, Hu W, Liu AX (2019) Predictable privacy-preserving mobile crowd sensing: a tale of two roles. IEEE\/ACM Trans Netw (TON) 27(1):361\u2013374","journal-title":"IEEE\/ACM Trans Netw (TON)"},{"key":"1746_CR24","doi-asserted-by":"crossref","unstructured":"Niu B, Li Q, Zhu X, Cao G, Li H (2015) Enhancing privacy through caching in location-based services. In: 2015 IEEE conference on computer communications (INFOCOM). IEEE, pp 1017\u20131025","DOI":"10.1109\/INFOCOM.2015.7218474"},{"key":"1746_CR25","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-019-01371-6","author":"M Nunez-del Prado","year":"2019","unstructured":"Nunez-del Prado M, Nin J (2019) Revisiting online anonymization algorithms to ensure location privacy. J Ambient Intell Human Comput. https:\/\/doi.org\/10.1007\/s12652-019-01371-6","journal-title":"J Ambient Intell Human Comput"},{"key":"1746_CR26","first-page":"433","volume-title":"International conference on ubiquitous computing","author":"DJ Patterson","year":"2004","unstructured":"Patterson DJ, Liao L, Gajos K, Collier M, Livic N, Olson K, Wang S, Fox D, Kautz H (2004) Opportunity knocks: a system to provide cognitive assistance with transportation services. In: International conference on ubiquitous computing, Nottingham, England, pp 433\u2013450"},{"key":"1746_CR27","first-page":"1","volume-title":"Proceedings of designing privacy enhancing technologies, international workshop on design issues in anonymity and unobservability","author":"J Pfitzmann","year":"2000","unstructured":"Pfitzmann A, K\u00f6hntopp M (2000) Anonymity, unobservability, and pseudonymity\u2014a proposal for terminology. In: Proceedings of designing privacy enhancing technologies, international workshop on design issues in anonymity and unobservability, Berkeley, CA, USA, 25\u201326 July, pp 1\u20139"},{"issue":"1","key":"1746_CR28","first-page":"1","volume":"4","author":"R Sarathy","year":"2011","unstructured":"Sarathy R, Muralidhar K (2011) Evaluating laplace noise addition to satisfy differential privacy for numeric data. Trans Data Priv 4(1):1\u201317","journal-title":"Trans Data Priv"},{"issue":"3","key":"1746_CR29","doi-asserted-by":"publisher","first-page":"484","DOI":"10.1109\/TDSC.2018.2800048","volume":"16","author":"Y Shen","year":"2018","unstructured":"Shen Y, Wen H, Luo C, Xu W, Zhang T, Hu W, Rus D (2018) Gaitlock: protect virtual and augmented reality headsets using gait. IEEE Trans Dependable Secur Comput 16(3):484\u2013497","journal-title":"IEEE Trans Dependable Secur Comput"},{"issue":"Nov","key":"1746_CR30","first-page":"2615","volume":"10","author":"Q Shi","year":"2009","unstructured":"Shi Q, Petterson J, Dror G, Langford J, Smola A, Vishwanathan S (2009) Hash kernels for structured data. J Mach Learn Res 10(Nov):2615\u20132637","journal-title":"J Mach Learn Res"},{"issue":"5","key":"1746_CR31","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1007\/s00500-015-1703-8","volume":"20","author":"F Tang","year":"2016","unstructured":"Tang F, Li J, You I, Guo M (2016) Long-term location privacy protection for location-based services in mobile cloud computing. Soft Comput 20(5):1735\u20131747","journal-title":"Soft Comput"},{"issue":"1","key":"1746_CR32","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1109\/TMC.2017.2702634","volume":"17","author":"W Xu","year":"2017","unstructured":"Xu W, Shen Y, Bergmann N, Hu W (2017b) Sensor-assisted multi-view face recognition system on smart glass. IEEE Trans Mob Comput 17(1):197\u2013210","journal-title":"IEEE Trans Mob Comput"},{"key":"1746_CR33","doi-asserted-by":"publisher","first-page":"1241","DOI":"10.1145\/3038912.3052620","volume-title":"Proceedings of the 26th international conference on world wide web","author":"F Xu","year":"2017","unstructured":"Xu F, Tu Z, Li Y, Zhang P, Fu X, Jin D (2017a) Trajectory recovery from ash: user privacy is not preserved in aggregated mobility data. In: Proceedings of the 26th international conference on world wide web. International World Wide Web Conferences Steering Committee, Perth, Australia, pp 1241\u20131250"},{"issue":"2","key":"1746_CR34","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1145\/1966385.1966388","volume":"36","author":"ML Yiu","year":"2011","unstructured":"Yiu ML, Jensen CS, M\u00f8ller J, Lu H (2011) Design and analysis of a ranking approach to private location-based services. ACM Trans Database Syst (TODS) 36(2):10","journal-title":"ACM Trans Database Syst (TODS)"},{"key":"1746_CR35","doi-asserted-by":"publisher","first-page":"77975","DOI":"10.1109\/ACCESS.2018.2884516","volume":"6","author":"X Zhang","year":"2018","unstructured":"Zhang X, Wang J, Shu M, Wang Y, Pan M, Han Z (2018) Tpp: trajectory privacy preservation against tensor voting based inference attacks. IEEE Access 6:77975\u201377985","journal-title":"IEEE Access"}],"container-title":["Journal of Ambient Intelligence and Humanized Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-020-01746-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12652-020-01746-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-020-01746-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,2,19]],"date-time":"2021-02-19T22:39:27Z","timestamp":1613774367000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12652-020-01746-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,2,8]]},"references-count":35,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,1]]}},"alternative-id":["1746"],"URL":"https:\/\/doi.org\/10.1007\/s12652-020-01746-0","relation":{},"ISSN":["1868-5137","1868-5145"],"issn-type":[{"type":"print","value":"1868-5137"},{"type":"electronic","value":"1868-5145"}],"subject":[],"published":{"date-parts":[[2020,2,8]]},"assertion":[{"value":"15 April 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 January 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 February 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}