{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,18]],"date-time":"2025-01-18T05:08:39Z","timestamp":1737176919998,"version":"3.33.0"},"reference-count":10,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,12,15]],"date-time":"2024-12-15T00:00:00Z","timestamp":1734220800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,12,15]],"date-time":"2024-12-15T00:00:00Z","timestamp":1734220800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,12,15]]},"DOI":"10.1109\/bigdata62323.2024.10825343","type":"proceedings-article","created":{"date-parts":[[2025,1,16]],"date-time":"2025-01-16T18:31:23Z","timestamp":1737052283000},"page":"6394-6402","source":"Crossref","is-referenced-by-count":0,"title":["LDA model for privacy access based on trajectories and POIs"],"prefix":"10.1109","author":[{"family":"Minzhu","sequence":"first","affiliation":[{"name":"Xi&#x2019;an Jiaotong University,Suzhou Academy,Suzhou,China"}]},{"given":"Huijun","family":"Dai","sequence":"additional","affiliation":[{"name":"Xi&#x2019;an Jiaotong University Shanxi Province Key Laboratory of Computer Network,School of Computer Science and Technology,Xi&#x2019;an,China"}]},{"given":"Xiaoling","family":"Gui","sequence":"additional","affiliation":[{"name":"Xi&#x2019;an Jiaotong University Shanxi Province Key Laboratory of Computer Network,School of Computer Science and Technology,Xi&#x2019;an,China"}]},{"given":"Yi","family":"Huang","sequence":"additional","affiliation":[{"name":"Xi&#x2019;an Jiaotong University Shanxi Province Key Laboratory of Computer Network,School of Computer Science and Technology,Xi&#x2019;an,China"}]}],"member":"263","reference":[{"article-title":"Socioeconomic correlations of urban patterns inferred from aerial images: interpreting activation maps of convolutional neural networks. (2020)","year":"2020","author":"Abitbol","key":"ref1"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1093\/jigpal\/jzae044"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3394138"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/34.1000236"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.gexplo.2024.107393"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/access.2022.3152770"},{"key":"ref7","first-page":"14","article-title":"A sensitiveinformation hiding treatment in quick-response codes based on error-correcting framework","volume-title":"International Journal of Network Security","volume":"23","author":"Zhang","year":"2021"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1049\/ise2.12034"},{"issue":"2","key":"ref9","first-page":"390","article-title":"Location privacy attack based on deep learning","volume":"59","author":"Zhengchen","year":"2022","journal-title":"Journal of Computer Research and Development"},{"key":"ref10","doi-asserted-by":"crossref","DOI":"10.1063\/5.0147861","article-title":"Tilted-angle insensitive received signal strength in visible light positioning systems using a deep neural network trained by synthetic data","volume-title":"AIP Advances.","author":"Zhu","year":"2023"}],"event":{"name":"2024 IEEE International Conference on Big Data (BigData)","start":{"date-parts":[[2024,12,15]]},"location":"Washington, DC, USA","end":{"date-parts":[[2024,12,18]]}},"container-title":["2024 IEEE International Conference on Big Data (BigData)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10824975\/10824942\/10825343.pdf?arnumber=10825343","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,17]],"date-time":"2025-01-17T08:25:34Z","timestamp":1737102334000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10825343\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,15]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/bigdata62323.2024.10825343","relation":{},"subject":[],"published":{"date-parts":[[2024,12,15]]}}}