{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T08:25:44Z","timestamp":1729671944220,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,11]]},"DOI":"10.1109\/atnac.2017.8215390","type":"proceedings-article","created":{"date-parts":[[2017,12,18]],"date-time":"2017-12-18T23:16:59Z","timestamp":1513639019000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["Distance-based location privacy protection in social networks"],"prefix":"10.1109","author":[{"given":"Mohammad Reza","family":"Nosouhi","sequence":"first","affiliation":[]},{"given":"Youyang","family":"Qu","sequence":"additional","affiliation":[]},{"given":"Shui","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Yong","family":"Xiang","sequence":"additional","affiliation":[]},{"given":"Damien","family":"Manuel","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"1","article-title":"Diffusing Private Data over Networks","author":"koufogiannis","year":"2017","journal-title":"IEEE Transactions on Control of Network Systems"},{"key":"ref11","doi-asserted-by":"crossref","DOI":"10.1007\/11787006_1","article-title":"Differential privacy","author":"dwork","year":"2006","journal-title":"Intl Conference on Automata Languages and Programming"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1561\/0400000042","article-title":"The algorithmic foundations of differential privacy","volume":"9","author":"dwork","year":"2014","journal-title":"Foundations and Trends in Theoretical Computer Science"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516735"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2011.29"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIC.2016.7919699"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1002\/asi.20591"},{"key":"ref17","doi-asserted-by":"crossref","DOI":"10.1109\/CDC.2014.7039713","article-title":"Entropyminimizing mechanism for differential privacy of discrete-time linear feedback systems","author":"wang","year":"2014","journal-title":"IEEE Conference on Decision and Control"},{"journal-title":"Gradual release of sensitive data under differential privacy","year":"2015","author":"koufogiannis","key":"ref18"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2533668"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SocialCom.2010.30"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/NGMAST.2016.26"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2321628"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8056976"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MDM.2014.13"},{"year":"0","key":"ref2"},{"year":"0","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2016.7840718"}],"event":{"name":"2017 27th International Telecommunication Networks and Applications Conference (ITNAC)","start":{"date-parts":[[2017,11,22]]},"location":"Melbourne, VIC","end":{"date-parts":[[2017,11,24]]}},"container-title":["2017 27th International Telecommunication Networks and Applications Conference (ITNAC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8169969\/8215343\/08215390.pdf?arnumber=8215390","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,25]],"date-time":"2022-01-25T21:19:49Z","timestamp":1643145589000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8215390\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/atnac.2017.8215390","relation":{},"subject":[],"published":{"date-parts":[[2017,11]]}}}