{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T05:36:53Z","timestamp":1771911413693,"version":"3.50.1"},"reference-count":43,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100019062","name":"Tianjin Research Innovation Project for Postgraduate Students","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100019062","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Future Generation Computer Systems"],"published-print":{"date-parts":[[2026,6]]},"DOI":"10.1016\/j.future.2025.108359","type":"journal-article","created":{"date-parts":[[2026,1,5]],"date-time":"2026-01-05T07:32:41Z","timestamp":1767598361000},"page":"108359","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":1,"special_numbering":"C","title":["SP-IFDA-Traj: Optimizing differentially private trajectory publishing for enhanced utility"],"prefix":"10.1016","volume":"179","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4252-1114","authenticated-orcid":false,"given":"Yongxin","family":"Zhao","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9304-0279","authenticated-orcid":false,"given":"Hao","family":"Lin","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0004-2021-1400","authenticated-orcid":false,"given":"Xiangtian","family":"Zheng","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0002-0709-6829","authenticated-orcid":false,"given":"Yixuan","family":"Song","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0006-0459-8216","authenticated-orcid":false,"given":"Jinze","family":"Du","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"6","key":"10.1016\/j.future.2025.108359_bib0001","first-page":"5577","article-title":"A survey and experimental study on privacy-preserving trajectory data publishing","volume":"35","author":"Jin","year":"2022","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"1","key":"10.1016\/j.future.2025.108359_bib0002","first-page":"1","article-title":"Location privacy-preserving mechanisms in location-based services: a comprehensive survey","volume":"54","author":"Jiang","year":"2021","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"10.1016\/j.future.2025.108359_bib0003","series-title":"International Colloquium on Automata, Languages, and Programming","first-page":"1","article-title":"Differential privacy","author":"Dwork","year":"2006"},{"key":"10.1016\/j.future.2025.108359_bib0004","doi-asserted-by":"crossref","DOI":"10.1016\/j.knosys.2020.105940","article-title":"Novel trajectory privacy-preserving method based on prefix tree using differential privacy","volume":"198","author":"Zhao","year":"2020","journal-title":"Knowl. Based Syst."},{"key":"10.1016\/j.future.2025.108359_bib0005","doi-asserted-by":"crossref","first-page":"126","DOI":"10.1016\/j.comnet.2018.07.007","article-title":"SafePath: differentially-private publishing of passenger trajectories in transportation systems","volume":"143","author":"Al-Hussaeni","year":"2018","journal-title":"Comput. Netw."},{"key":"10.1016\/j.future.2025.108359_bib0006","series-title":"Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","first-page":"213","article-title":"Differentially private transit data publication: a case study on the montreal transportation system","author":"Chen","year":"2012"},{"key":"10.1016\/j.future.2025.108359_bib0007","series-title":"IOP Conference Series: Earth and Environmental Science","first-page":"012005","article-title":"A spatiotemporal trajectory data index based on the Hilbert curve code","volume":"502","author":"Wu","year":"2020"},{"key":"10.1016\/j.future.2025.108359_bib0008","series-title":"2017 25th International Conference on Geoinformatics","first-page":"1","article-title":"ST-hash: an efficient spatiotemporal index for massive trajectory data in a NoSQL database","author":"Guan","year":"2017"},{"issue":"18","key":"10.1016\/j.future.2025.108359_bib0009","doi-asserted-by":"crossref","first-page":"15990","DOI":"10.1109\/JIOT.2023.3267082","article-title":"Automatic tuning of privacy budgets in input-discriminative local differential privacy","volume":"10","author":"Murakami","year":"2023","journal-title":"IEEE Internet Things J."},{"issue":"12","key":"10.1016\/j.future.2025.108359_bib0010","doi-asserted-by":"crossref","first-page":"15158","DOI":"10.1109\/TITS.2023.3309783","article-title":"Optimization of privacy budget allocation in differential privacy-based public transit trajectory data publishing for smart mobility applications","volume":"24","author":"Chen","year":"2023","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"10.1016\/j.future.2025.108359_bib0011","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2024.103922","article-title":"Protecting privacy and enhancing utility: a novel approach for personalized trajectory data publishing using noisy prefix tree","volume":"144","author":"Zhao","year":"2024","journal-title":"Comput. Secur."},{"key":"10.1016\/j.future.2025.108359_bib0012","doi-asserted-by":"crossref","first-page":"402","DOI":"10.1016\/j.ins.2022.12.037","article-title":"Multidimensional grid-based clustering with local differential privacy","volume":"623","author":"Fu","year":"2023","journal-title":"Inf. Sci."},{"issue":"12","key":"10.1016\/j.future.2025.108359_bib0013","doi-asserted-by":"crossref","first-page":"9249","DOI":"10.1109\/TKDE.2024.3449433","article-title":"Sequential trajectory data publishing with adaptive grid-based weighted differential privacy","volume":"36","author":"Xie","year":"2024","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"1","key":"10.1016\/j.future.2025.108359_bib0014","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1145\/1217299.1217302","article-title":"l-diversity: privacy beyond k-anonymity","volume":"1","author":"Machanavajjhala","year":"2007","journal-title":"ACM Trans. Knowl. Discov. Data (TKDD)"},{"key":"10.1016\/j.future.2025.108359_bib0015","doi-asserted-by":"crossref","first-page":"226","DOI":"10.1016\/j.future.2024.07.011","article-title":"ST-TrajGAN: a synthetic trajectory generation algorithm for privacy preservation","volume":"161","author":"Ma","year":"2024","journal-title":"Future Gener. Comput. Syst."},{"issue":"7\u20139","key":"10.1016\/j.future.2025.108359_bib0016","doi-asserted-by":"crossref","first-page":"739","DOI":"10.1016\/0895-7177(03)90058-6","article-title":"Trie: an alternative data structure for data mining algorithms","volume":"38","author":"Bodon","year":"2003","journal-title":"Math. Comput. Model."},{"issue":"4","key":"10.1016\/j.future.2025.108359_bib0017","doi-asserted-by":"crossref","first-page":"2868","DOI":"10.1109\/TII.2021.3116529","article-title":"Local trajectory privacy protection in 5G enabled industrial intelligent logistics","volume":"18","author":"Yang","year":"2021","journal-title":"IEEE Trans. Ind. Inf."},{"issue":"9","key":"10.1016\/j.future.2025.108359_bib0018","doi-asserted-by":"crossref","first-page":"16534","DOI":"10.1109\/TITS.2021.3130978","article-title":"A trajectory released scheme for the internet of vehicles based on differential privacy","volume":"23","author":"Cai","year":"2021","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"10.1016\/j.future.2025.108359_bib0019","doi-asserted-by":"crossref","first-page":"4006","DOI":"10.1109\/TIFS.2023.3290486","article-title":"TCPP: achieving privacy-preserving trajectory correlation with differential privacy","volume":"18","author":"Wu","year":"2023","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.future.2025.108359_bib0020","series-title":"32nd USENIX Security Symposium (USENIX Security 23)","first-page":"1649","article-title":"{PrivTrace}: differentially private trajectory synthesis by adaptive markov models","author":"Wang","year":"2023"},{"key":"10.1016\/j.future.2025.108359_bib0021","doi-asserted-by":"crossref","first-page":"4422","DOI":"10.1109\/TIFS.2023.3293961","article-title":"Differentially private deep learning with dynamic privacy budget allocation and adaptive optimization","volume":"18","author":"Chen","year":"2023","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.future.2025.108359_bib0022","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2023.103697","article-title":"GAPBAS: genetic algorithm-based privacy budget allocation strategy in differential privacy K-means clustering algorithm","volume":"139","author":"Li","year":"2024","journal-title":"Comput. Secur."},{"issue":"7","key":"10.1016\/j.future.2025.108359_bib0023","doi-asserted-by":"crossref","first-page":"5469","DOI":"10.1007\/s10462-021-10026-y","article-title":"A comprehensive survey of sine cosine algorithm: variants and applications","volume":"54","author":"Gabis","year":"2021","journal-title":"Artif. Intell. Rev."},{"key":"10.1016\/j.future.2025.108359_bib0024","doi-asserted-by":"crossref","DOI":"10.1016\/j.cie.2021.107224","article-title":"Flow direction algorithm (FDA): a novel optimization approach for solving optimization problems","volume":"156","author":"Karami","year":"2021","journal-title":"Comput. Ind. Eng."},{"key":"10.1016\/j.future.2025.108359_bib0025","doi-asserted-by":"crossref","first-page":"3063","DOI":"10.1007\/s11831-025-10234-7","article-title":"Flow direction algorithm: a comprehensive review","volume":"32","author":"Lin","year":"2025","journal-title":"Arch. Comput. Methods Eng."},{"issue":"5","key":"10.1016\/j.future.2025.108359_bib0026","doi-asserted-by":"crossref","first-page":"877","DOI":"10.1587\/transinf.2022DAP0011","article-title":"Geo-graph-indistinguishability: location privacy on road networks with differential privacy","volume":"106","author":"Takagi","year":"2023","journal-title":"IEICE Trans. Inf. Syst."},{"key":"10.1016\/j.future.2025.108359_bib0027","series-title":"201 IEEE 21st International Conference on High Performance Computing and Communications; IEEE 17th International Conference on Smart City; IEEE 5tth International Conference on Data Science and Systems (HPCC\/SmartCity\/DSS)","first-page":"1737","article-title":"Apdpk-means: a new differential privacy clustering algorithm based on arithmetic progression privacy budget allocation","author":"Fan","year":"2019"},{"issue":"12","key":"10.1016\/j.future.2025.108359_bib0028","doi-asserted-by":"crossref","first-page":"1841","DOI":"10.3390\/jmse10121841","article-title":"Underwater image classification algorithm based on convolutional neural network and optimized extreme learning machine","volume":"10","author":"Yang","year":"2022","journal-title":"J. Mar. Sci. Eng."},{"issue":"10","key":"10.1016\/j.future.2025.108359_bib0029","doi-asserted-by":"crossref","first-page":"10281","DOI":"10.1109\/TCSVT.2024.3405558","article-title":"Novel robust video watermarking scheme based on concentric ring subband and visual cryptography with piecewise linear chaotic mapping","volume":"34","author":"Wu","year":"2024","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"issue":"4","key":"10.1016\/j.future.2025.108359_bib0030","doi-asserted-by":"crossref","DOI":"10.1002\/cpe.6607","article-title":"Spark-based parallel processing whale optimization algorithm","volume":"34","author":"Alshayeji","year":"2022","journal-title":"Concurrency Comput. Pract. Exper."},{"issue":"8","key":"10.1016\/j.future.2025.108359_bib0031","doi-asserted-by":"crossref","first-page":"2297","DOI":"10.1007\/s13042-022-01524-8","article-title":"Water atom search algorithm-based deep recurrent neural network for the big data classification based on spark architecture","volume":"13","author":"Dabbu","year":"2022","journal-title":"Int. J. Mach. Learn. Cybern."},{"issue":"20","key":"10.1016\/j.future.2025.108359_bib0032","doi-asserted-by":"crossref","first-page":"14791","DOI":"10.1007\/s00500-023-08551-9","article-title":"Convergence analysis of flow direction algorithm and its improvement","volume":"27","author":"Ye","year":"2023","journal-title":"Soft Comput."},{"issue":"1","key":"10.1016\/j.future.2025.108359_bib0033","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1109\/4235.585893","article-title":"No free lunch theorems for optimization","volume":"1","author":"Wolpert","year":"1997","journal-title":"IEEE Trans. Evol. Comput."},{"issue":"1","key":"10.1016\/j.future.2025.108359_bib0034","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1109\/TEVC.2010.2059031","article-title":"Differential evolution: a survey of the state-of-the-art","volume":"15","author":"Das","year":"2010","journal-title":"IEEE Trans. Evol. Comput."},{"key":"10.1016\/j.future.2025.108359_bib0035","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1016\/j.advengsoft.2013.12.007","article-title":"Grey wolf optimizer","volume":"69","author":"Mirjalili","year":"2014","journal-title":"Adv. Eng. Software"},{"key":"10.1016\/j.future.2025.108359_bib0036","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1016\/j.advengsoft.2016.01.008","article-title":"The whale optimization algorithm","volume":"95","author":"Mirjalili","year":"2016","journal-title":"Adv. Eng. Software"},{"key":"10.1016\/j.future.2025.108359_bib0037","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1016\/j.knosys.2015.12.022","article-title":"SCA: a sine cosine algorithm for solving optimization problems","volume":"96","author":"Mirjalili","year":"2016","journal-title":"Knowl. Based Syst."},{"key":"10.1016\/j.future.2025.108359_bib0038","series-title":"Advances in Swarm Intelligence: 5th International Conference, ICSI 2014, Hefei, China, October 17\u201320, 2014, Proceedings, Part I 5","first-page":"86","article-title":"A new bio-inspired algorithm: chicken swarm optimization","author":"Meng","year":"2014"},{"issue":"6","key":"10.1016\/j.future.2025.108359_bib0039","doi-asserted-by":"crossref","first-page":"702","DOI":"10.1109\/TEVC.2008.919004","article-title":"Biogeography-based optimization","volume":"12","author":"Simon","year":"2008","journal-title":"IEEE Trans. Evol. Comput."},{"key":"10.1016\/j.future.2025.108359_bib0040","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1016\/j.future.2022.12.027","article-title":"DP-TrajGAN: a privacy-aware trajectory generation model with differential privacy","volume":"142","author":"Zhang","year":"2023","journal-title":"Future Gener. Comput. Syst."},{"issue":"1","key":"10.1016\/j.future.2025.108359_bib0041","article-title":"Grid adaptive bucketing algorithm based on differential privacy","volume":"2022","author":"Li","year":"2022","journal-title":"Mobile Inform. Syst."},{"issue":"7","key":"10.1016\/j.future.2025.108359_bib0042","doi-asserted-by":"crossref","first-page":"404","DOI":"10.3390\/ijgi11070404","article-title":"Achieving differential privacy publishing of location-based statistical data using grid clustering","volume":"11","author":"Yan","year":"2022","journal-title":"ISPRS Int. J. Geoinf."},{"key":"10.1016\/j.future.2025.108359_bib0043","series-title":"European Symposium on Research in Computer Security","first-page":"112","article-title":"Grid-based decompositions for spatial data under local differential privacy","author":"Balioglu","year":"2024"}],"container-title":["Future Generation Computer Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167739X25006533?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167739X25006533?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T21:16:41Z","timestamp":1769548601000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167739X25006533"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,6]]},"references-count":43,"alternative-id":["S0167739X25006533"],"URL":"https:\/\/doi.org\/10.1016\/j.future.2025.108359","relation":{},"ISSN":["0167-739X"],"issn-type":[{"value":"0167-739X","type":"print"}],"subject":[],"published":{"date-parts":[[2026,6]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"SP-IFDA-Traj: Optimizing differentially private trajectory publishing for enhanced utility","name":"articletitle","label":"Article Title"},{"value":"Future Generation Computer Systems","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.future.2025.108359","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier B.V. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"108359"}}