{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T05:50:01Z","timestamp":1775541001436,"version":"3.50.1"},"reference-count":53,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T00:00:00Z","timestamp":1757289600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T00:00:00Z","timestamp":1757289600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"DOI":"10.13039\/501100012456","name":"National Social Science Fund of China","doi-asserted-by":"publisher","award":["22BGL318"],"award-info":[{"award-number":["22BGL318"]}],"id":[{"id":"10.13039\/501100012456","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Complex Intell. Syst."],"published-print":{"date-parts":[[2025,10]]},"DOI":"10.1007\/s40747-025-02085-3","type":"journal-article","created":{"date-parts":[[2025,9,9]],"date-time":"2025-09-09T09:31:31Z","timestamp":1757410291000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Privacy-enhanced personalized POI recommendation with federated learning framework"],"prefix":"10.1007","volume":"11","author":[{"given":"Chunhua","family":"Ju","sequence":"first","affiliation":[]},{"given":"Zhaohui","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Chonghuan","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Fuguang","family":"Bao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,8]]},"reference":[{"key":"2085_CR1","doi-asserted-by":"publisher","first-page":"101060","DOI":"10.1016\/j.elerap.2021.101060","volume":"48","author":"C Xu","year":"2021","unstructured":"Xu C, Ding AS, Zhao K (2021) A novel POI recommendation method based on trust relationship and spatial\u2013temporal factors. Electron Commer Res Appl 48:101060. https:\/\/doi.org\/10.1016\/j.elerap.2021.101060","journal-title":"Electron Commer Res Appl"},{"key":"2085_CR2","doi-asserted-by":"publisher","first-page":"111086","DOI":"10.1016\/j.asoc.2023.111086","volume":"150","author":"Y Yang","year":"2024","unstructured":"Yang Y, Zhou S, Weng H, Wang D, Zhang X, Yu D, Deng S (2024) Siamese learning based on graph differential equation for Next-POI recommendation. Appl Soft Comput 150:111086. https:\/\/doi.org\/10.1016\/j.asoc.2023.111086","journal-title":"Appl Soft Comput"},{"key":"2085_CR3","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/s12525-021-00492-1","volume":"32","author":"J Sun","year":"2022","unstructured":"Sun J, Song J, Jiang Y, Liu Y, Li J (2022) Prick the filter bubble: A novel cross domain recommendation model with adaptive diversity regularization. Electron Mark 32:101\u2013121. https:\/\/doi.org\/10.1007\/s12525-021-00492-1","journal-title":"Electron Mark"},{"key":"2085_CR4","doi-asserted-by":"publisher","first-page":"101243","DOI":"10.1016\/j.elerap.2023.101243","volume":"58","author":"J Chen","year":"2023","unstructured":"Chen J, Zhang W (2023) A temporal-aware personalized POI recommendation approach based on potential preferences and grey relational analysis. Electron Commer Res Appl 58:101243. https:\/\/doi.org\/10.1016\/j.elerap.2023.101243","journal-title":"Electron Commer Res Appl"},{"key":"2085_CR5","doi-asserted-by":"publisher","first-page":"110720","DOI":"10.1016\/j.asoc.2023.110720","volume":"147","author":"S Halder","year":"2023","unstructured":"Halder S, Lim KH, Chan J, Zhang X (2023) Capacity-aware fair POI recommendation combining transformer neural networks and resource allocation policy. Appl Soft Comput 147:110720. https:\/\/doi.org\/10.1016\/j.asoc.2023.110720","journal-title":"Appl Soft Comput"},{"key":"2085_CR6","doi-asserted-by":"publisher","first-page":"121004","DOI":"10.1016\/j.ins.2024.121004","volume":"678","author":"Z Wang","year":"2024","unstructured":"Wang Z, Zeng J, Zhong L, Liu L, Gao M, Wen J (2024) DSDRec: next POI recommendation using deep semantic extraction and diffusion model. Inf Sci 678:121004. https:\/\/doi.org\/10.1016\/j.ins.2024.121004","journal-title":"Inf Sci"},{"key":"2085_CR7","doi-asserted-by":"publisher","first-page":"100007","DOI":"10.1016\/j.csa.2022.100007","volume":"1","author":"Y Zhou","year":"2023","unstructured":"Zhou Y, Li X, Wang M, Liu Y (2023) Privacy-preserving top-k query scheme for outsourced data of location-based services. Cyber Secur Appl 1:100007. https:\/\/doi.org\/10.1016\/j.csa.2022.100007","journal-title":"Cyber Secur Appl"},{"key":"2085_CR8","doi-asserted-by":"publisher","first-page":"103852","DOI":"10.1016\/j.ipm.2024.103852","volume":"61","author":"L Zhong","year":"2024","unstructured":"Zhong L, Zeng J, Wang Z, Zhou W, Wen J (2024) Spatio-temporal consistency federated learning for next POI recommendation. Inf Process Manag 61:103852. https:\/\/doi.org\/10.1016\/j.ipm.2024.103852","journal-title":"Inf Process Manag"},{"key":"2085_CR9","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1186\/s42400-021-00105-6","volume":"5","author":"P Liu","year":"2022","unstructured":"Liu P, Xu X, Wang W (2022) Threats, attacks and defenses to federated learning: issues, taxonomy and perspectives. Cybersecurity 5:4. https:\/\/doi.org\/10.1186\/s42400-021-00105-6","journal-title":"Cybersecurity"},{"key":"2085_CR10","doi-asserted-by":"publisher","first-page":"123776","DOI":"10.1016\/j.eswa.2024.123776","volume":"249","author":"H Nie","year":"2024","unstructured":"Nie H, Lu S (2024) FedCRMW: federated model ownership verification with compression-resistant model watermarking. Expert Syst Appl 249:123776. https:\/\/doi.org\/10.1016\/j.eswa.2024.123776","journal-title":"Expert Syst Appl"},{"key":"2085_CR11","doi-asserted-by":"publisher","first-page":"103827","DOI":"10.1016\/j.csi.2023.103827","volume":"89","author":"M Yang","year":"2024","unstructured":"Yang M, Guo T, Zhu T, Tjuawinata I, Zhao J, Lam K-Y (2024) Local differential privacy and its applications: A comprehensive survey. Comput Stand Interfaces 89:103827. https:\/\/doi.org\/10.1016\/j.csi.2023.103827","journal-title":"Comput Stand Interfaces"},{"key":"2085_CR12","doi-asserted-by":"publisher","unstructured":"Marcolla C, Sucasas V, Manzano M, Bassoli R, Fitzek F.H.P., Aaraj N (2022) Survey on fully homomorphic encryption, theory, and applications. Proc IEEE 110:1572\u20131609. https:\/\/doi.org\/10.1109\/JPROC.2022.3205665","DOI":"10.1109\/JPROC.2022.3205665"},{"key":"2085_CR13","doi-asserted-by":"publisher","first-page":"111675","DOI":"10.1016\/j.knosys.2024.111675","volume":"293","author":"H Nie","year":"2024","unstructured":"Nie H, Lu S (2024) PersistVerify: federated model ownership verification with Spatial attention and boundary sampling. Knowl -Based Syst 293:111675. https:\/\/doi.org\/10.1016\/j.knosys.2024.111675","journal-title":"Knowl -Based Syst"},{"key":"2085_CR14","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1007\/978-3-031-69766-1_23","volume-title":"Euro-Par 2024 parallel process","author":"H Nie","year":"2024","unstructured":"Nie H, Lu S, Wang M, Xiao J, Lu Z, Yi Z (2024) VeriChroma: ownership verification for federated models via RGB filters. In: Carretero J, Shende S, Garcia-Blas J, Brandic I, Olcoz K, Schreiber M (eds) Euro-Par 2024 parallel process. Springer Nature Switzerland, Cham, pp 332\u2013345. https:\/\/doi.org\/10.1007\/978-3-031-69766-1_23."},{"key":"2085_CR15","doi-asserted-by":"publisher","first-page":"1151","DOI":"10.1007\/s11280-018-0599-5","volume":"22","author":"Y-S Lu","year":"2018","unstructured":"Lu Y-S, Shih W-Y, Gau H-Y, Chung K-C, Huang J-L (2018) On successive point-of-interest recommendation. World Wide Web 22:1151\u20131173","journal-title":"World Wide Web"},{"key":"2085_CR16","doi-asserted-by":"publisher","first-page":"1135","DOI":"10.1007\/s11280-018-0579-9","volume":"22","author":"Z Zhang","year":"2019","unstructured":"Zhang Z, Liu Y, Zhang Z, Shen B (2019) Fused matrix factorization with multi-tag, social and geographical influences for POI recommendation. World Wide Web 22:1135\u20131150. https:\/\/doi.org\/10.1007\/s11280-018-0579-9","journal-title":"World Wide Web"},{"key":"2085_CR17","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1007\/s12525-020-00416-5","volume":"31","author":"L Kang","year":"2021","unstructured":"Kang L, Liu S, Gong D, Tang M (2021) A personalized point-of-interest recommendation system for O2O commerce. Electron Mark 31:253\u2013267. https:\/\/doi.org\/10.1007\/s12525-020-00416-5","journal-title":"Electron Mark"},{"key":"2085_CR18","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1007\/s41019-017-0032-6","volume":"1","author":"K Wang","year":"2016","unstructured":"Wang K, Peng H, Jin Y, Sha C, Wang X (2016) Local weighted matrix factorization for Top-n recommendation with implicit feedback. Data Sci Eng 1:252\u2013264. https:\/\/doi.org\/10.1007\/s41019-017-0032-6","journal-title":"Data Sci Eng"},{"key":"2085_CR19","doi-asserted-by":"publisher","first-page":"102366","DOI":"10.1016\/j.is.2024.102366","volume":"122","author":"X Zhou","year":"2024","unstructured":"Zhou X, Wang Z, Liu X, Liu Y, Sun G (2024) An improved context-aware weighted matrix factorization algorithm for point of interest recommendation in LBSN. Inf Syst 122:102366. https:\/\/doi.org\/10.1016\/j.is.2024.102366","journal-title":"Inf Syst"},{"key":"2085_CR20","doi-asserted-by":"publisher","first-page":"103676","DOI":"10.1016\/j.ipm.2024.103676","volume":"61","author":"Z Liu","year":"2024","unstructured":"Liu Z, Meng L, Sheng QZ, Chu D, Yu J, Song X (2024) POI recommendation for random groups based on cooperative graph neural networks. Inf Process Manag 61:103676. https:\/\/doi.org\/10.1016\/j.ipm.2024.103676","journal-title":"Inf Process Manag"},{"key":"2085_CR21","doi-asserted-by":"publisher","first-page":"104864","DOI":"10.1016\/j.engappai.2022.104864","volume":"112","author":"J Zhang","year":"2022","unstructured":"Zhang J, Ma C, Zhong C, Zhao P, Mu X (2022) Combining feature importance and neighbor node interactions for cold start recommendation. Eng Appl Artif Intell 112:104864. https:\/\/doi.org\/10.1016\/j.engappai.2022.104864","journal-title":"Eng Appl Artif Intell"},{"key":"2085_CR22","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1609\/aaai.v34i01.5353","volume":"34","author":"K Sun","year":"2020","unstructured":"Sun K, Qian T, Chen T, Liang Y, Nguyen QVH, Yin H (2020) Where to go next: modeling Long- and Short-Term user preferences for Point-of-Interest recommendation. Proc AAAI Conf Artif Intell 34:214\u2013221. https:\/\/doi.org\/10.1609\/aaai.v34i01.5353","journal-title":"Proc AAAI Conf Artif Intell"},{"key":"2085_CR23","doi-asserted-by":"publisher","first-page":"121961","DOI":"10.1016\/j.eswa.2023.121961","volume":"238","author":"X Sun","year":"2024","unstructured":"Sun X, Huang B, Wang X, Yu D (2024) Supporting awareness of users\u2019 routines and preferences for next POI recommendation based on Spatial aggregation. Expert Syst Appl 238:121961. https:\/\/doi.org\/10.1016\/j.eswa.2023.121961","journal-title":"Expert Syst Appl"},{"key":"2085_CR24","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1186\/s13638-019-1606-y","volume":"2019","author":"C Yin","year":"2019","unstructured":"Yin C, Ju X, Yin Z, Wang J (2019) Location recommendation privacy protection method based on location sensitivity division. EURASIP J Wirel Commun Netw 2019:266. https:\/\/doi.org\/10.1186\/s13638-019-1606-y","journal-title":"EURASIP J Wirel Commun Netw"},{"key":"2085_CR25","doi-asserted-by":"publisher","first-page":"120253","DOI":"10.1016\/j.ins.2024.120253","volume":"662","author":"L Sun","year":"2024","unstructured":"Sun L, Zheng Y, Lu R, Zhu H, Zhang Y (2024) Towards privacy-preserving category-aware POI recommendation over encrypted LBSN data. Inf Sci 662:120253. https:\/\/doi.org\/10.1016\/j.ins.2024.120253","journal-title":"Inf Sci"},{"key":"2085_CR26","doi-asserted-by":"publisher","first-page":"767","DOI":"10.1016\/j.ins.2022.12.024","volume":"623","author":"V Perifanis","year":"2023","unstructured":"Perifanis V, Drosatos G, Stamatelatos G, Efraimidis PS, FedPOIRec (2023) Privacy-preserving federated poi recommendation with social influence. Inf Sci 623:767\u2013790. https:\/\/doi.org\/10.1016\/j.ins.2022.12.024","journal-title":"Inf Sci"},{"key":"2085_CR27","doi-asserted-by":"publisher","first-page":"107213","DOI":"10.1016\/j.compeleceng.2021.107213","volume":"93","author":"TB Ogunseyi","year":"2021","unstructured":"Ogunseyi TB, Bo T, Yang C (2021) A privacy-preserving framework for cross-domain recommender systems. Comput Electr Eng 93:107213. https:\/\/doi.org\/10.1016\/j.compeleceng.2021.107213","journal-title":"Comput Electr Eng"},{"key":"2085_CR28","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1016\/j.jiixd.2024.01.001","volume":"2","author":"Q Xu","year":"2024","unstructured":"Xu Q, Zhu H, Zheng Y, Wang F, Gao L (2024) Practical and privacy-preserving geo-social-based POI recommendation. J Inf Intell 2:148\u2013166. https:\/\/doi.org\/10.1016\/j.jiixd.2024.01.001","journal-title":"J Inf Intell"},{"key":"2085_CR29","unstructured":"Privacy preserving social network data publication | IEEE journals (2025) & magazine | IEEE xplore, (n.d.). https:\/\/ieeexplore.ieee.org\/document\/7428813"},{"key":"2085_CR30","doi-asserted-by":"publisher","first-page":"110641","DOI":"10.1016\/j.asoc.2023.110641","volume":"146","author":"H Jiang","year":"2023","unstructured":"Jiang H, Liao Y, Zhao D, Li Y, Mu K, Yu Q (2023) A negative survey based privacy preservation method for topology of social networks. Appl Soft Comput 146:110641. https:\/\/doi.org\/10.1016\/j.asoc.2023.110641","journal-title":"Appl Soft Comput"},{"key":"2085_CR31","doi-asserted-by":"publisher","first-page":"931","DOI":"10.1109\/TNSM.2020.2982555","volume":"17","author":"H Huang","year":"2020","unstructured":"Huang H, Zhang D, Xiao F, Wang K, Gu J, Wang R (2020) Privacy-preserving approach PBCN in social network with differential privacy. IEEE Trans Netw Serv Manag 17:931\u2013945. https:\/\/doi.org\/10.1109\/TNSM.2020.2982555","journal-title":"IEEE Trans Netw Serv Manag"},{"key":"2085_CR32","doi-asserted-by":"publisher","first-page":"101923","DOI":"10.1016\/j.jksuci.2024.101923","volume":"36","author":"S Yu","year":"2024","unstructured":"Yu S, Wang H, Su Y, Niu Z, Li Z, Liu J, Wang J (2024) Privacy-preserving recommendation system based on social relationships. J King Saud Univ Comput Inf Sci 36:101923. https:\/\/doi.org\/10.1016\/j.jksuci.2024.101923","journal-title":"J King Saud Univ Comput Inf Sci"},{"key":"2085_CR33","doi-asserted-by":"publisher","first-page":"4329","DOI":"10.1109\/TIFS.2023.3295949","volume":"18","author":"J Le","year":"2023","unstructured":"Le J, Zhang D, Lei X, Jiao L, Zeng K, Liao X (2023) Privacy-preserving federated learning with malicious clients and honest-but-curious servers. IEEE Trans Inf Forensics Secur 18:4329\u20134344. https:\/\/doi.org\/10.1109\/TIFS.2023.3295949","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"2085_CR34","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1007\/978-3-031-33377-4_32","volume-title":"Adv. Knowl. Discov. Data min","author":"X Tang","year":"2023","unstructured":"Tang X, Gu H, Fan L, Yang Q (2023) Achieving provable Byzantine fault-tolerance in a semi-honest federated learning setting. In: Kashima H, Ide T, Peng W-C (eds) Adv. Knowl. Discov. Data min. Springer Nature Switzerland, Cham, pp 415\u2013427. https:\/\/doi.org\/10.1007\/978-3-031-33377-4_32."},{"key":"2085_CR35","doi-asserted-by":"publisher","first-page":"103028","DOI":"10.1016\/j.jretconser.2022.103028","volume":"67","author":"L-Y Wang","year":"2022","unstructured":"Wang L-Y, Hu H-H, Wang L, Qin J-Q (2022) Privacy assurances and social sharing in social commerce: the mediating role of threat-coping appraisals. J Retail Consum Serv 67:103028. https:\/\/doi.org\/10.1016\/j.jretconser.2022.103028","journal-title":"J Retail Consum Serv"},{"key":"2085_CR36","doi-asserted-by":"crossref","unstructured":"Selvakumar AAL, Ganadhas CS (2009) The evaluation report of SHA-256 crypt analysis hash function, 2009 int. Conf Commun Softw Netw 588\u2013592","DOI":"10.1109\/ICCSN.2009.50"},{"key":"2085_CR37","doi-asserted-by":"publisher","unstructured":"Dwork C, Rothblum GN, Vadhan S (2010) Boosting and differential privacy, in: 2010 IEEE 51st Annu. Symp. Found. Comput. Sci., pp. 51\u201360. https:\/\/doi.org\/10.1109\/FOCS.2010.12","DOI":"10.1109\/FOCS.2010.12"},{"key":"2085_CR38","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1016\/j.neucom.2022.02.070","volume":"488","author":"Z Cai","year":"2022","unstructured":"Cai Z, Yuan G, Qiao S, Qu S, Zhang Y, Bing R (2022) Friends-aware graph collaborative filtering for POI recommendation. Neurocomputing 488:107\u2013119. https:\/\/doi.org\/10.1016\/j.neucom.2022.02.070","journal-title":"Neurocomputing"},{"key":"2085_CR39","doi-asserted-by":"publisher","unstructured":"Liu X, Liu Y, Aberer K, Miao C (2013) Personalized point-of-interest recommendation by mining users\u2019 preference transition, in: Proc. 22nd ACM Int. Conf. Inf. Knowl. Manag., Association for Computing Machinery, New York, NY, USA, pp. 733\u2013738. https:\/\/doi.org\/10.1145\/2505515.2505639","DOI":"10.1145\/2505515.2505639"},{"key":"2085_CR40","doi-asserted-by":"publisher","first-page":"110884","DOI":"10.1016\/j.knosys.2023.110884","volume":"278","author":"Z Liu","year":"2023","unstructured":"Liu Z, Zhang D, Zhang C, Bian J, Deng J, Shen G, Kong X (2023) KDRank: Knowledge-driven user-aware POI recommendation. Knowl -Based Syst 278:110884. https:\/\/doi.org\/10.1016\/j.knosys.2023.110884","journal-title":"Knowl -Based Syst"},{"key":"2085_CR41","doi-asserted-by":"publisher","first-page":"012104","DOI":"10.1088\/1742-6596\/1500\/1\/012104","volume":"1500","author":"R Azdy","year":"2020","unstructured":"Azdy R, Darnis F (2020) Use of Haversine formula in finding distance between temporary shelter and waste end processing sites. J Phys Conf Ser 1500:012104. https:\/\/doi.org\/10.1088\/1742-6596\/1500\/1\/012104","journal-title":"J Phys Conf Ser"},{"key":"2085_CR42","doi-asserted-by":"publisher","first-page":"103030","DOI":"10.1016\/j.ipm.2022.103030","volume":"59","author":"J Wu","year":"2022","unstructured":"Wu J, Hu R, Li D, Ren L, Hu W, Xiao Y (2022) Where have you been: dual spatiotemporal-aware user mobility modeling for missing check-in POI identification. Inf Process Manag 59:103030. https:\/\/doi.org\/10.1016\/j.ipm.2022.103030","journal-title":"Inf Process Manag"},{"key":"2085_CR43","doi-asserted-by":"publisher","unstructured":"Hayashi K (2022) Rethinking Correlation-based Item-Item Similarities for Recommender Systems, in: Proc. 45th Int. ACM SIGIR Conf. Res. Dev. Inf. Retr., Association for Computing Machinery, New York, NY, USA, pp. 2287\u20132291. https:\/\/doi.org\/10.1145\/3477495.3532055","DOI":"10.1145\/3477495.3532055"},{"key":"2085_CR44","doi-asserted-by":"publisher","DOI":"10.1145\/3678182","author":"M Arbaoui","year":"2024","unstructured":"Arbaoui M, Brahmia M-A, Rahmoun A, Zghal M (2024) Federated learning survey: A Multi-Level taxonomy of aggregation techniques, experimental insights, and future frontiers. ACM Trans Intell Syst Technol. https:\/\/doi.org\/10.1145\/3678182","journal-title":"ACM Trans Intell Syst Technol"},{"key":"2085_CR45","unstructured":"Feng S, Li X, Zeng Y, Cong G, Chee YM, Yuan Q (2015) Personalized ranking metric embedding for next new POI recommendation. in: Int Jt Conf Artif Intell, https:\/\/api.semanticscholar.org\/CorpusID:14873341"},{"key":"2085_CR46","unstructured":"Rahmani HA, Aliannejadi M, Ahmadian S, Baratchi M, Afsharchi M, Crestani F (2019) LGLMF: Local Geographical based Logistic Matrix Factorization Model for POI Recommendation. http:\/\/arxiv.org\/abs\/1909.06667 (accessed November 14, 2024)"},{"key":"2085_CR47","doi-asserted-by":"publisher","first-page":"122421","DOI":"10.1016\/j.eswa.2023.122421","volume":"239","author":"J An","year":"2024","unstructured":"An J, Li G, Jiang W (2024) Decentralized user preference learning for privacy-preserving next POI recommendation. Expert Syst Appl 239:122421. https:\/\/doi.org\/10.1016\/j.eswa.2023.122421","journal-title":"Expert Syst Appl"},{"key":"2085_CR48","doi-asserted-by":"publisher","unstructured":"AbdElkader AG, ZainEldin H, Saafan MM (2024) Optimizing wind power forecasting with RNN-LSTM models through grid search cross-validation. Sustain Comput Inf Syst 101054. https:\/\/doi.org\/10.1016\/j.suscom.2024.101054","DOI":"10.1016\/j.suscom.2024.101054"},{"key":"2085_CR49","doi-asserted-by":"publisher","unstructured":"Refaeilzadeh P, Tang L, Liu H, Cross-Validation (2009) In: LIU L, \u00d6ZSU MT (eds) Encycl. Database syst. Springer US, Boston, MA, pp 532\u2013538. https:\/\/doi.org\/10.1007\/978-0-387-39940-9_565.","DOI":"10.1007\/978-0-387-39940-9_565"},{"key":"2085_CR50","doi-asserted-by":"publisher","first-page":"3277","DOI":"10.1007\/s40747-022-00917-0","volume":"9","author":"C Xu","year":"2023","unstructured":"Xu C, Mei X, Liu D, Zhao K, Ding AS (2023) An efficient privacy-preserving point-of-interest recommendation model based on local differential privacy. Complex Intell Syst 9:3277\u20133300. https:\/\/doi.org\/10.1007\/s40747-022-00917-0","journal-title":"Complex Intell Syst"},{"key":"2085_CR51","doi-asserted-by":"publisher","unstructured":"Real-time aggregate monitoring with differential privacy | proceedings of the 21st ACM international conference on information and knowledge management, ACM Conf. (n.d.). https:\/\/doi.org\/10.1145\/2396761.2398595","DOI":"10.1145\/2396761.2398595"},{"key":"2085_CR52","doi-asserted-by":"publisher","first-page":"1249997","DOI":"10.3389\/fdata.2023.1249997","volume":"6","author":"P M\u00fcllner","year":"2023","unstructured":"M\u00fcllner P, Lex E, Schedl M, Kowald D (2023) Differential privacy in collaborative filtering recommender systems: a review, front. Big Data 6:1249997. https:\/\/doi.org\/10.3389\/fdata.2023.1249997","journal-title":"Big Data"},{"key":"2085_CR53","doi-asserted-by":"publisher","unstructured":"Hong Y, Li J, Lin Y, Hu Q, Li X (2024) Trajectory-aware privacy-preserving method with local differential privacy in crowdsourcing. EURASIP J Inf Secur 2024(28). https:\/\/doi.org\/10.1186\/s13635-024-00177-0","DOI":"10.1186\/s13635-024-00177-0"}],"container-title":["Complex &amp; Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-025-02085-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40747-025-02085-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-025-02085-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,25]],"date-time":"2025-09-25T13:33:52Z","timestamp":1758807232000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40747-025-02085-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,8]]},"references-count":53,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2025,10]]}},"alternative-id":["2085"],"URL":"https:\/\/doi.org\/10.1007\/s40747-025-02085-3","relation":{},"ISSN":["2199-4536","2198-6053"],"issn-type":[{"value":"2199-4536","type":"print"},{"value":"2198-6053","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9,8]]},"assertion":[{"value":"4 June 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 August 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 September 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflicts of interest to report regarding the present study.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"442"}}