{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,17]],"date-time":"2026-05-17T00:10:39Z","timestamp":1778976639050,"version":"3.51.4"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1109\/bigdata.2018.8622350","type":"proceedings-article","created":{"date-parts":[[2019,1,25]],"date-time":"2019-01-25T03:07:18Z","timestamp":1548385638000},"page":"1238-1247","source":"Crossref","is-referenced-by-count":5,"title":["PrivacyZone: A Novel Approach to Protecting Location Privacy of Mobile Users"],"prefix":"10.1109","author":[{"given":"Emre","family":"Yigitoglu","sequence":"first","affiliation":[]},{"given":"Mehmet Emre","family":"Gursoy","sequence":"additional","affiliation":[]},{"given":"Ling","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Margaret","family":"Loper","sequence":"additional","affiliation":[]},{"given":"Bhuvan","family":"Bamba","sequence":"additional","affiliation":[]},{"given":"Kisung","family":"Lee","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Privacy-aware big data systems and services in the internet of things era","author":"yigitoglu","year":"2018","journal-title":"Ph D Dissertation"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.14778\/1920841.1921024"},{"key":"ref12","first-page":"499","article-title":"Android permissions remystified: A field study on contextual integrity","author":"wijesekera","year":"2015","journal-title":"USENIX Security Symposium"},{"key":"ref13","article-title":"Follow my recommendations: A personalized privacy assistant for mobile app permissions","author":"liu","year":"2016","journal-title":"Symposium On Usable Privacy and Security"},{"key":"ref14","article-title":"ipshield: A framework for enforcing context-aware privacy","author":"chakraborty","year":"2014","journal-title":"NSDI"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2590296.2590337"},{"key":"ref16","first-page":"763","article-title":"The new casper: query processing for location services without compromising privacy","author":"mokbel","year":"2006","journal-title":"VLDB"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2007.1062"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516735"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660345"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.25"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2566486.2568035"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/BF01386390"},{"key":"ref5","article-title":"Modeling users mobile app privacy preferences: Restoring usability in a sea of permission settings","author":"lin","year":"2014"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2820783.2820808"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2015.2405543"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2466466"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335360"},{"key":"ref9","article-title":"GTMobiSIM","author":"pesti","year":"2009"},{"key":"ref20","doi-asserted-by":"crossref","DOI":"10.14722\/ndss.2017.23241","article-title":"Dynamic differential location privacy with personalized error bounds","author":"yu","year":"2017","journal-title":"Network and Distributed System Security Symposium (NDSS)"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2011.5767898"},{"key":"ref21","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-03168-7_13","article-title":"On the optimal placement of mix zones","author":"freudiger","year":"2009","journal-title":"Privacy Enchancing Technologies Symposium (PETS)"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2013.6544929"}],"event":{"name":"2018 IEEE International Conference on Big Data (Big Data)","location":"Seattle, WA, USA","start":{"date-parts":[[2018,12,10]]},"end":{"date-parts":[[2018,12,13]]}},"container-title":["2018 IEEE International Conference on Big Data (Big Data)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8610059\/8621858\/08622350.pdf?arnumber=8622350","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T22:04:59Z","timestamp":1643234699000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8622350\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/bigdata.2018.8622350","relation":{},"subject":[],"published":{"date-parts":[[2018,12]]}}}