{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T07:35:50Z","timestamp":1776152150661,"version":"3.50.1"},"reference-count":30,"publisher":"Elsevier BV","issue":"2","license":[{"start":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T00:00:00Z","timestamp":1685577600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T00:00:00Z","timestamp":1685577600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2023,5,19]],"date-time":"2023-05-19T00:00:00Z","timestamp":1684454400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["High-Confidence Computing"],"published-print":{"date-parts":[[2023,6]]},"DOI":"10.1016\/j.hcc.2023.100134","type":"journal-article","created":{"date-parts":[[2023,5,23]],"date-time":"2023-05-23T18:07:36Z","timestamp":1684865256000},"page":"100134","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":7,"title":["DPTP-LICD: A differential privacy trajectory protection method based on latent interest community detection"],"prefix":"10.1016","volume":"3","author":[{"given":"Weiqi","family":"Zhang","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Guisheng","family":"Yin","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yuxin","family":"Dong","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Fukun","family":"Chen","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Qasim","family":"Zia","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"78","reference":[{"issue":"4","key":"10.1016\/j.hcc.2023.100134_b1","doi-asserted-by":"crossref","first-page":"898","DOI":"10.1109\/TKDE.2016.2637898","article-title":"Trajectory community discovery and recommendation by multi-source diffusion modeling","volume":"29","author":"Liu","year":"2017","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"10.1016\/j.hcc.2023.100134_b2","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1016\/j.jnca.2016.12.033","article-title":"SEM-PPA: A semantical pattern and preference-aware service mining method for personalized point of interest recommendation","volume":"82","author":"Zhu","year":"2017","journal-title":"J. Netw. Comput. Appl."},{"key":"10.1016\/j.hcc.2023.100134_b3","doi-asserted-by":"crossref","unstructured":"L. Zhu, C. Xu, J. Guan, S. Yang, Finding top-k similar users based on Trajectory-Pattern model for personalized service recommendation, in: 2016 IEEE International Conference on Communications Workshops, ICC, 2016, pp. 553\u2013558.","DOI":"10.1109\/ICCW.2016.7503845"},{"issue":"10","key":"10.1016\/j.hcc.2023.100134_b4","doi-asserted-by":"crossref","first-page":"150","DOI":"10.1109\/MCOM.2015.7295477","article-title":"Socially aware mobile peer-to-peer communications for community multimedia streaming services","volume":"53","author":"Xu","year":"2015","journal-title":"IEEE Commun. Mag."},{"issue":"4","key":"10.1016\/j.hcc.2023.100134_b5","doi-asserted-by":"crossref","first-page":"1017","DOI":"10.1109\/TITS.2016.2596321","article-title":"Detecting communities on topic of transportation with sparse crowd annotations","volume":"18","author":"Cao","year":"2017","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"issue":"5","key":"10.1016\/j.hcc.2023.100134_b6","doi-asserted-by":"crossref","first-page":"811","DOI":"10.1109\/TSC.2016.2514338","article-title":"Privacy-preserving location sharing services for social networks","volume":"10","author":"Schlegel","year":"2017","journal-title":"IEEE Trans. Serv. Comput."},{"issue":"4","key":"10.1016\/j.hcc.2023.100134_b7","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1109\/MNET.2010.5510913","article-title":"Privacy and security for online social networks: challenges and opportunities","volume":"24","author":"Zhang","year":"2010","journal-title":"IEEE Netw."},{"key":"10.1016\/j.hcc.2023.100134_b8","doi-asserted-by":"crossref","unstructured":"B. Niu, Q. Li, X. Zhu, G. Cao, H. Li, Achieving k-anonymity in privacy-aware location-based services, in: IEEE INFOCOM 2014 - IEEE Conference on Computer Communications, 2014, pp. 754\u2013762.","DOI":"10.1109\/INFOCOM.2014.6848002"},{"key":"10.1016\/j.hcc.2023.100134_b9","doi-asserted-by":"crossref","unstructured":"N. Li, T. Li, S. Venkatasubramanian, t-Closeness: Privacy Beyond k-Anonymity and l-Diversity, in: 2007 IEEE 23rd International Conference on Data Engineering, 2007, pp. 106\u2013115.","DOI":"10.1109\/ICDE.2007.367856"},{"key":"10.1016\/j.hcc.2023.100134_b10","doi-asserted-by":"crossref","unstructured":"B. Niu, Q. Li, X. Zhu, G. Cao, H. Li, Enhancing privacy through caching in location-based services, in: 2015 IEEE Conference on Computer Communications, INFOCOM, 2015, pp. 1017\u20131025.","DOI":"10.1109\/INFOCOM.2015.7218474"},{"issue":"5","key":"10.1016\/j.hcc.2023.100134_b11","doi-asserted-by":"crossref","first-page":"1735","DOI":"10.1007\/s00500-015-1703-8","article-title":"Long-term location privacy protection for location-based services in mobile cloud computing","volume":"20","author":"Tang","year":"2016","journal-title":"Soft Comput."},{"key":"10.1016\/j.hcc.2023.100134_b12","series-title":"Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security","first-page":"251","article-title":"Optimal geo-indistinguishable mechanisms for location privacy","author":"Bordenabe","year":"2014"},{"key":"10.1016\/j.hcc.2023.100134_b13","series-title":"2013 Proceedings IEEE INFOCOM","first-page":"2985","article-title":"A game-theoretic approach for achieving k-anonymity in location based services","author":"Liu","year":"2013"},{"issue":"3","key":"10.1016\/j.hcc.2023.100134_b14","doi-asserted-by":"crossref","first-page":"1351","DOI":"10.1007\/s12652-019-01227-z","article-title":"A location privacy protection scheme based on random encryption period for VSNs","volume":"11","author":"Deng","year":"2020","journal-title":"J. Ambient Intell. Humaniz. Comput."},{"key":"10.1016\/j.hcc.2023.100134_b15","doi-asserted-by":"crossref","unstructured":"T. Xu, Y. Cai, Exploring Historical Location Data for Anonymity Preservation in Location-Based Services, in: IEEE INFOCOM 2008 - the 27th Conference on Computer Communications, 2008, pp. 547\u2013555.","DOI":"10.1109\/INFOCOM.2008.103"},{"issue":"6","key":"10.1016\/j.hcc.2023.100134_b16","doi-asserted-by":"crossref","first-page":"874","DOI":"10.1109\/TIFS.2013.2252618","article-title":"TrPF: A trajectory privacy-preserving framework for participatory sensing","volume":"8","author":"Gao","year":"2013","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.hcc.2023.100134_b17","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1016\/j.ins.2011.07.035","article-title":"Privacy-preserving trajectory data publishing by local suppression","volume":"231","author":"Chen","year":"2013","journal-title":"Inform. Sci."},{"key":"10.1016\/j.hcc.2023.100134_b18","series-title":"Proceedings of the 2012 ACM Conference on Computer and Communications Security","first-page":"638","article-title":"Differentially private sequential data publication via variable-length n-grams","author":"Chen","year":"2012"},{"issue":"C","key":"10.1016\/j.hcc.2023.100134_b19","doi-asserted-by":"crossref","first-page":"142","DOI":"10.1016\/j.cose.2017.02.002","article-title":"Protecting personal trajectories of social media users through differential privacy","volume":"67","author":"Wang","year":"2017","journal-title":"Comput. Secur."},{"issue":"2","key":"10.1016\/j.hcc.2023.100134_b20","doi-asserted-by":"crossref","first-page":"426","DOI":"10.1109\/TSC.2018.2810890","article-title":"Enabling probabilistic differential privacy protection for location recommendations","volume":"14","author":"Zhang","year":"2021","journal-title":"IEEE Trans. Serv. Comput."},{"key":"10.1016\/j.hcc.2023.100134_b21","series-title":"Proceedings of the 4th International Conference on Foundations of Data Organization and Algorithms","first-page":"69","article-title":"Efficient similarity search in sequence databases","author":"Agrawal","year":"1993"},{"key":"10.1016\/j.hcc.2023.100134_b22","unstructured":"B.-K. Yi, H. Jagadish, C. Faloutsos, Efficient retrieval of similar time sequences under time warping, in: Proceedings 14th International Conference on Data Engineering, 1998, pp. 201\u2013208."},{"key":"10.1016\/j.hcc.2023.100134_b23","series-title":"Proceedings of the 2005 ACM SIGMOD International Conference on Management of Data","first-page":"491","article-title":"Robust and fast similarity search for moving object trajectories","author":"Chen","year":"2005"},{"key":"10.1016\/j.hcc.2023.100134_b24","unstructured":"M. Vlachos, G. Kollios, D. Gunopulos, Discovering similar multidimensional trajectories, in: Proceedings 18th International Conference on Data Engineering, 2002, pp. 673\u2013684."},{"key":"10.1016\/j.hcc.2023.100134_b25","series-title":"Proceedings of the 2007 ACM SIGMOD International Conference on Management of Data","first-page":"593","article-title":"Trajectory clustering: A partition-and-group framework","author":"Lee","year":"2007"},{"issue":"1","key":"10.1016\/j.hcc.2023.100134_b26","doi-asserted-by":"crossref","DOI":"10.1145\/1921591.1921596","article-title":"Recommending friends and locations based on individual location history","volume":"5","author":"Zheng","year":"2011","journal-title":"ACM Trans. Web"},{"issue":"1","key":"10.1016\/j.hcc.2023.100134_b27","doi-asserted-by":"crossref","DOI":"10.1145\/2948064","article-title":"A probabilistic lifestyle-based trajectory model for social strength inference from human trajectory data","volume":"35","author":"Zhao","year":"2016","journal-title":"ACM Trans. Inf. Syst."},{"key":"10.1016\/j.hcc.2023.100134_b28","series-title":"Proceedings of the 18th International Conference on World Wide Web","first-page":"791","article-title":"Mining interesting locations and travel sequences from gps trajectories","author":"Zheng","year":"2009"},{"key":"10.1016\/j.hcc.2023.100134_b29","series-title":"Proceedings of the 10th International Conference on Ubiquitous Computing","first-page":"312","article-title":"Understanding mobility based on GPS data","author":"Zheng","year":"2008"},{"key":"10.1016\/j.hcc.2023.100134_b30","first-page":"32","article-title":"GeoLife: A collaborative social networking service among user, location and trajectory","author":"Zheng","year":"2010","journal-title":"Data Eng."}],"container-title":["High-Confidence Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2667295223000326?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2667295223000326?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,9,9]],"date-time":"2025-09-09T08:40:52Z","timestamp":1757407252000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S2667295223000326"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6]]},"references-count":30,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2023,6]]}},"alternative-id":["S2667295223000326"],"URL":"https:\/\/doi.org\/10.1016\/j.hcc.2023.100134","relation":{},"ISSN":["2667-2952"],"issn-type":[{"value":"2667-2952","type":"print"}],"subject":[],"published":{"date-parts":[[2023,6]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"DPTP-LICD: A differential privacy trajectory protection method based on latent interest community detection","name":"articletitle","label":"Article Title"},{"value":"High-Confidence Computing","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.hcc.2023.100134","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2023 The Author(s). Published by Elsevier B.V. on behalf of Shandong University.","name":"copyright","label":"Copyright"}],"article-number":"100134"}}