{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T17:01:45Z","timestamp":1769187705231,"version":"3.49.0"},"reference-count":31,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,10]]},"DOI":"10.1109\/bigdata.2013.6691626","type":"proceedings-article","created":{"date-parts":[[2014,1,3]],"date-time":"2014-01-03T19:11:49Z","timestamp":1388776309000},"page":"580-588","source":"Crossref","is-referenced-by-count":78,"title":["DP-WHERE: Differentially private modeling of human mobility"],"prefix":"10.1109","author":[{"given":"Darakhshan J.","family":"Mir","sequence":"first","affiliation":[]},{"given":"Sibren","family":"Isaacman","sequence":"additional","affiliation":[]},{"given":"Ramon","family":"Caceres","sequence":"additional","affiliation":[]},{"given":"Margaret","family":"Martonosi","sequence":"additional","affiliation":[]},{"given":"Rebecca N.","family":"Wright","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307659"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2011.5766977"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/1734583.1734589"},{"key":"15","article-title":"Modeling timevariant user mobility in wireless mobile networks","author":"hsu","year":"0","journal-title":"INFOCOM '07"},{"key":"16","article-title":"Identifying important places in people's lives from cellular network data","author":"isaacman","year":"0","journal-title":"Pervasive '11"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.14778\/1920841.1920970"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/2071880.2071884"},{"key":"11","article-title":"On the anonymity of home\/work location pairs","author":"golle","year":"0","journal-title":"Pervasive '09"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1038\/nature06958"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.173"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.14778\/2535573.2488337"},{"key":"22","author":"korolova","year":"2011","journal-title":"Protecting Privacy while Mining and Sharing User Data"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72037-9_8"},{"key":"24","article-title":"A practical application of differential privacy to personalized online advertising","author":"lindell","year":"2011","journal-title":"IACR Cryptology ePrint Archive"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1145\/1810891.1810916"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2007.66"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2013.6544872"},{"key":"28","article-title":"On the levywalk nature of human mobility: Do humans walk like monkeys","author":"rhee","year":"0","journal-title":"INFOCOM '08"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1023\/A:1026543900054"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/2339530.2339564"},{"key":"2","article-title":"Geo-indistinguishability: Differential privacy for location-based systems","author":"andres","year":"1984","journal-title":"CoRR'10"},{"key":"10","article-title":"Towards estimating the presence of visitors from the aggregate mobile phone network activity they generate","author":"girardin","year":"0","journal-title":"CUPUM '09"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1016\/j.enpol.2010.08.020"},{"key":"30","doi-asserted-by":"crossref","DOI":"10.1126\/science.1177170","article-title":"Limits of predictability in human mobility","volume":"327","author":"song","year":"2010","journal-title":"Science"},{"key":"7","article-title":"Calibrating noise to sensitivity in private data analysis","author":"dwork","year":"0","journal-title":"TCC'06"},{"key":"6","author":"de montjoye","year":"2013","journal-title":"Unique in the Crowd The Privacy Bounds of Human Mobility"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/2274576.2274608"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1145\/2030613.2030630"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2012.16"},{"key":"9","article-title":"Uncovering the presence and movements of tourists from usergenerated content","author":"girardin","year":"2008","journal-title":"Intn'l Forum on Tourism Statistics"},{"key":"8","article-title":"Differential privacy-A primer for the perplexed","author":"dwork","year":"0","journal-title":"Joint UNECE\/ Eurostat Work Session on Statistical Data Confidentiality '11"}],"event":{"name":"2013 IEEE International Conference on Big Data","location":"Silicon Valley, CA, USA","start":{"date-parts":[[2013,10,6]]},"end":{"date-parts":[[2013,10,9]]}},"container-title":["2013 IEEE International Conference on Big Data"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6679357\/6690588\/06691626.pdf?arnumber=6691626","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T05:15:12Z","timestamp":1498108512000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6691626\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,10]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/bigdata.2013.6691626","relation":{},"subject":[],"published":{"date-parts":[[2013,10]]}}}