{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T20:47:21Z","timestamp":1757623641756,"version":"3.44.0"},"reference-count":43,"publisher":"Elsevier BV","issue":"3","license":[{"start":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T00:00:00Z","timestamp":1693526400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T00:00:00Z","timestamp":1693526400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2023,6,27]],"date-time":"2023-06-27T00:00:00Z","timestamp":1687824000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["High-Confidence Computing"],"published-print":{"date-parts":[[2023,9]]},"DOI":"10.1016\/j.hcc.2023.100146","type":"journal-article","created":{"date-parts":[[2023,6,30]],"date-time":"2023-06-30T12:12:16Z","timestamp":1688127136000},"page":"100146","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":2,"title":["SUDM-SP: A method for discovering trajectory similar users based on semantic privacy"],"prefix":"10.1016","volume":"3","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4441-5286","authenticated-orcid":false,"given":"Weiqi","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Guisheng","family":"Yin","sequence":"additional","affiliation":[]},{"given":"Bingyi","family":"Xie","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"1","key":"10.1016\/j.hcc.2023.100146_b1","doi-asserted-by":"crossref","first-page":"280","DOI":"10.1109\/TETC.2020.3014722","article-title":"IoTRec: The IoT recommender for smart parking system","volume":"10","author":"Saleem","year":"2022","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"issue":"5","key":"10.1016\/j.hcc.2023.100146_b2","doi-asserted-by":"crossref","first-page":"968","DOI":"10.1109\/JSAC.2020.2980802","article-title":"Privacy-preserved data sharing towards multiple parties in industrial IoTs","volume":"38","author":"Zheng","year":"2020","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"10.1016\/j.hcc.2023.100146_b3","series-title":"Proceedings of the 2017 IEEE Trustcom\/BigDataSE\/ICESS","first-page":"4191","article-title":"A dual privacy preserving scheme in continuous location-based services","volume":"Vol. 5","author":"Zhang","year":"2017"},{"key":"10.1016\/j.hcc.2023.100146_b4","doi-asserted-by":"crossref","first-page":"312","DOI":"10.1016\/j.future.2018.10.025","article-title":"Multidimensional privacy preservation in location-based services","volume":"93","author":"Peng","year":"2019","journal-title":"Future Gener. Comput. Syst."},{"issue":"2","key":"10.1016\/j.hcc.2023.100146_b5","doi-asserted-by":"crossref","first-page":"234","DOI":"10.26599\/BDMA.2022.9020047","article-title":"Security and privacy in metaverse: A comprehensive survey","volume":"6","author":"Huang","year":"2023","journal-title":"Big Data Min. Anal."},{"key":"10.1016\/j.hcc.2023.100146_b6","series-title":"Proceedings of the MobiSys 2016 PhD Forum","first-page":"179","article-title":"Defending against sybil devices in crowdsourced mapping services","author":"Wang","year":"2016"},{"key":"10.1016\/j.hcc.2023.100146_b7","doi-asserted-by":"crossref","first-page":"221330","DOI":"10.1109\/ACCESS.2020.3043621","article-title":"A privacy-preserving efficient location-sharing scheme for mobile online social network applications","volume":"8","author":"Bhattacharya","year":"2020","journal-title":"IEEE Access"},{"issue":"2","key":"10.1016\/j.hcc.2023.100146_b8","doi-asserted-by":"crossref","first-page":"244","DOI":"10.26599\/TST.2021.9010015","article-title":"Link-privacy preserving graph embedding data publication with adversarial learning","volume":"27","author":"Zhang","year":"2022","journal-title":"Tsinghua Sci. Technol."},{"issue":"06","key":"10.1016\/j.hcc.2023.100146_b9","doi-asserted-by":"crossref","first-page":"1397","DOI":"10.1109\/TMC.2017.2768360","article-title":"QLDS: A novel design scheme for trajectory privacy protection with utility guarantee in participatory sensing","volume":"17","author":"Xiao","year":"2018","journal-title":"IEEE Trans. Mob. Comput."},{"issue":"02","key":"10.1016\/j.hcc.2023.100146_b10","doi-asserted-by":"crossref","first-page":"1619","DOI":"10.1109\/TVT.2016.2554608","article-title":"Privacy-preserving social tie discovery based on cloaked human trajectories","volume":"66","author":"Tian","year":"2017","journal-title":"IEEE Trans. Veh. Technol."},{"key":"10.1016\/j.hcc.2023.100146_b11","series-title":"Proceedings of the 2015 IEEE Conference on Computer Communications","first-page":"549","article-title":"Differentially private publication of general time-serial trajectory data","author":"Hua","year":"2015"},{"issue":"02","key":"10.1016\/j.hcc.2023.100146_b12","doi-asserted-by":"crossref","first-page":"16165","DOI":"10.3390\/ijgi10020078","article-title":"Privacy-preserving trajectory data publishing by dynamic anonymization with bounded distortion","volume":"10","author":"Li","year":"2021","journal-title":"ISPRS Int. J. Geo-Inf."},{"issue":"07","key":"10.1016\/j.hcc.2023.100146_b13","doi-asserted-by":"crossref","first-page":"1466","DOI":"10.1109\/TKDE.2017.2675420","article-title":"Local suppression and splitting techniques for privacy preserving publication of trajectories","volume":"29","author":"Terrovitis","year":"2017","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"10.1016\/j.hcc.2023.100146_b14","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3459992","article-title":"Generative adversarial networks: A survey towards private and secure applications","volume":"54","author":"Cai","year":"2021","journal-title":"ACM Comput. Surv."},{"issue":"4","key":"10.1016\/j.hcc.2023.100146_b15","first-page":"577","article-title":"Collective data-sanitization for preventing sensitive information inference attacks in social networks","volume":"15","author":"Cai","year":"2018","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"2","key":"10.1016\/j.hcc.2023.100146_b16","doi-asserted-by":"crossref","first-page":"766","DOI":"10.1109\/TNSE.2018.2830307","article-title":"A private and efficient mechanism for data uploading in smart cyber-physical systems","volume":"7","author":"Cai","year":"2020","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"issue":"02","key":"10.1016\/j.hcc.2023.100146_b17","first-page":"32","article-title":"GeoLife: A collaborative social networking service among user, location and trajectory","volume":"33","author":"Zheng","year":"2010","journal-title":"IEEE Data Eng."},{"key":"10.1016\/j.hcc.2023.100146_b18","series-title":"Proceedings of the 2012 ACM Conference on Computer and Communications Security","first-page":"638","article-title":"Differentially private sequential data publication via variable-length n-grams","author":"Chen","year":"2012"},{"issue":"11","key":"10.1016\/j.hcc.2023.100146_b19","doi-asserted-by":"crossref","first-page":"1154","DOI":"10.14778\/2809974.2809978","article-title":"DPT: Differentially private trajectory synthesis using hierarchical reference systems","volume":"8","author":"He","year":"2015","journal-title":"Proc. VLDB Endow."},{"key":"10.1016\/j.hcc.2023.100146_b20","series-title":"Proceedings of the Seventh ACM International Workshop on Data Engineering for Wireless and Mobile Access","first-page":"16","article-title":"PAD: Privacy-area aware, dummy-based location privacy in mobile services","author":"Lu","year":"2008"},{"key":"10.1016\/j.hcc.2023.100146_b21","series-title":"Proceedings of the 20th International Conference on Advances in Geographic Information Systems","first-page":"249","article-title":"A dummy-based anonymization method based on user trajectory with pauses","author":"Kato","year":"2012"},{"key":"10.1016\/j.hcc.2023.100146_b22","series-title":"Proceedings of the 8th ACM Workshop on Privacy in the Electronic Society","first-page":"105","article-title":"Faking contextual data for fun, profit, and privacy","author":"Chow","year":"2009"},{"key":"10.1016\/j.hcc.2023.100146_b23","series-title":"Proceedings of the 18th SIGSPATIAL International Conference on Advances in Geographic Information Systems","first-page":"398","article-title":"A user location anonymization method for location based services in a real environment","author":"Suzuki","year":"2010"},{"key":"10.1016\/j.hcc.2023.100146_b24","series-title":"Proceedings of the 11th ACM Conference on Emerging Networking Experiments and Technologies","first-page":"1","article-title":"Hiding mobile traffic fingerprints with GLOVE","volume":"Vol. 26","author":"Gramaglia","year":"2015"},{"key":"10.1016\/j.hcc.2023.100146_b25","series-title":"IEEE INFOCOM 2017 - IEEE Conference on Computer Communications","first-page":"1","article-title":"Spatiotemporal correlation-aware dummy-based privacy protection scheme for location-based services","author":"Liu","year":"2017"},{"key":"10.1016\/j.hcc.2023.100146_b26","series-title":"2018 14th International Conference on Computational Intelligence and Security","first-page":"291","article-title":"A real-time location privacy protection method based on space transformation","author":"Li","year":"2018"},{"key":"10.1016\/j.hcc.2023.100146_b27","doi-asserted-by":"crossref","unstructured":"A. Rakesh, F. Christos, N. Arun, Efficient Similarity Search In Sequence Databases, in: Proceedings of the 4th International Conference on Foundations of Data Organization and Algorithms, 1993, pp. 69\u201384.","DOI":"10.1007\/3-540-57301-1_5"},{"key":"10.1016\/j.hcc.2023.100146_b28","series-title":"Proceedings of the 14th International Conference on Data Engineering","first-page":"201","article-title":"Efficient retrieval of similar time sequences under time warping","author":"Byoung-Kee","year":"1998"},{"key":"10.1016\/j.hcc.2023.100146_b29","series-title":"Proceedings of the 2005 ACM SIGMOD International Conference on Management of Data","first-page":"491","article-title":"Robust and fast similarity search for moving object trajectories","author":"Li","year":"2005"},{"key":"10.1016\/j.hcc.2023.100146_b30","series-title":"Proceedings 18th International Conference on Data Engineering","first-page":"673","article-title":"Discovering similar multidimensional trajectories","author":"Vlachos","year":"2002"},{"key":"10.1016\/j.hcc.2023.100146_b31","series-title":"Proceedings of the 2007 ACM SIGMOD International Conference on Management of Data","first-page":"593","article-title":"Trajectory clustering: A partition-and-group framework","author":"Lee","year":"2007"},{"issue":"01","key":"10.1016\/j.hcc.2023.100146_b32","doi-asserted-by":"crossref","DOI":"10.1145\/1921591.1921596","article-title":"Recommending friends and locations based on individual location history","volume":"5","author":"Zheng","year":"2011","journal-title":"ACM Trans. Web"},{"issue":"01","key":"10.1016\/j.hcc.2023.100146_b33","doi-asserted-by":"crossref","DOI":"10.1145\/2948064","article-title":"A probabilistic lifestyle-based trajectory model for social strength inference from human trajectory data","volume":"35","author":"Zhao","year":"2016","journal-title":"ACM Trans. Inf. Syst."},{"issue":"6","key":"10.1016\/j.hcc.2023.100146_b34","doi-asserted-by":"crossref","first-page":"5399","DOI":"10.1109\/TVT.2018.2805700","article-title":"SecureGuard: A certificate validation system in public key infrastructure","volume":"67","author":"Alrawais","year":"2018","journal-title":"IEEE Trans. Veh. Technol."},{"key":"10.1016\/j.hcc.2023.100146_b35","first-page":"1","article-title":"Private data trading towards range counting queries in internet of things","author":"Cai","year":"2022","journal-title":"IEEE Trans. Mob. Comput."},{"issue":"1","key":"10.1016\/j.hcc.2023.100146_b36","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1109\/TCE.2018.2811260","article-title":"PSAP: Pseudonym-Based Secure Authentication Protocol for NFC Applications","volume":"64","author":"Xu","year":"2018","journal-title":"IEEE Trans. Consum. Electron."},{"key":"10.1016\/j.hcc.2023.100146_b37","series-title":"2019 IEEE 39th International Conference on Distributed Computing Systems","first-page":"144","article-title":"Trading private range counting over big IoT data","author":"Cai","year":"2019"},{"key":"10.1016\/j.hcc.2023.100146_b38","doi-asserted-by":"crossref","unstructured":"Y. Zheng, X. Xie, W. Ma, Mining interesting locations and travel sequences from gps trajectories, in: Proceedings of International Conference on World Wild Web, 2009.","DOI":"10.1145\/1526709.1526816"},{"key":"10.1016\/j.hcc.2023.100146_b39","series-title":"Proceedings of the 10th International Conference on Ubiquitous Computing","first-page":"312","article-title":"Understanding mobility based on GPS data","author":"Zheng","year":"2008"},{"key":"10.1016\/j.hcc.2023.100146_b40","doi-asserted-by":"crossref","unstructured":"N.J. Yuan, Y. Zheng, X. Xie, Discovering regions of different functions in a city using human mobility and pois, in: Proceedings of the 18th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2012, pp. 186\u2013194.","DOI":"10.1145\/2339530.2339561"},{"key":"10.1016\/j.hcc.2023.100146_b41","series-title":"Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","first-page":"213","article-title":"Differentially private transit data publication: A case study on the montreal transportation system","author":"Chen","year":"2012"},{"key":"10.1016\/j.hcc.2023.100146_b42","series-title":"Proceedings of the 2012 IEEE 28th International Conference on Data Engineering","first-page":"186","article-title":"On discovery of traveling companions from streaming trajectories","author":"Tang","year":"2012"},{"key":"10.1016\/j.hcc.2023.100146_b43","series-title":"Proceedings of the 19th International Conference on World Wide Web","first-page":"631","article-title":"Empirical comparison of algorithms for network community detection","author":"Leskovec","year":"2010"}],"container-title":["High-Confidence Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2667295223000442?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2667295223000442?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,9,9]],"date-time":"2025-09-09T08:39:49Z","timestamp":1757407189000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S2667295223000442"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9]]},"references-count":43,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2023,9]]}},"alternative-id":["S2667295223000442"],"URL":"https:\/\/doi.org\/10.1016\/j.hcc.2023.100146","relation":{},"ISSN":["2667-2952"],"issn-type":[{"type":"print","value":"2667-2952"}],"subject":[],"published":{"date-parts":[[2023,9]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"SUDM-SP: A method for discovering trajectory similar users based on semantic privacy","name":"articletitle","label":"Article Title"},{"value":"High-Confidence Computing","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.hcc.2023.100146","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2023 The Author(s). Published by Elsevier B.V. on behalf of Shandong University.","name":"copyright","label":"Copyright"}],"article-number":"100146"}}