{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T11:18:32Z","timestamp":1774523912511,"version":"3.50.1"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,5]]},"DOI":"10.1109\/cns.2018.8433221","type":"proceedings-article","created":{"date-parts":[[2018,8,13]],"date-time":"2018-08-13T22:09:06Z","timestamp":1534198146000},"page":"1-9","source":"Crossref","is-referenced-by-count":18,"title":["Preserving Location Privacy in Ride-Hailing Service"],"prefix":"10.1109","author":[{"given":"Youssef","family":"Khazbak","sequence":"first","affiliation":[]},{"given":"Jingyao","family":"Fan","sequence":"additional","affiliation":[]},{"given":"Sencun","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Guohong","family":"Cao","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/116873.116880"},{"key":"ref11","doi-asserted-by":"crossref","DOI":"10.1007\/11957454_23","article-title":"Preserving user location privacy in mobile data management infrastructures","author":"cheng","year":"2006","journal-title":"Lecture Notes in Computer Science"},{"key":"ref12","author":"cover","year":"2012","journal-title":"Elements of Information Theory"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1835804.1835920"},{"key":"ref14","article-title":"Two algorithms for constructing a delaunay triangulation","author":"d -t","year":"1980","journal-title":"International Journal of Computer & Information Sciences"},{"key":"ref15","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-05105-4_2","article-title":"Discrete differential-geometry operators for triangulated 2-manifolds","author":"meyer","year":"2003","journal-title":"Vsualization and mathematics III"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/BF01840357"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-349-03521-2"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0038202"},{"key":"ref19","article-title":"Movable type scripts","author":"veness","year":"2017"},{"key":"ref4","article-title":"The probe framework for the personalized cloaking of private locations","author":"damiani","year":"2010","journal-title":"Trans Data Privacy"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2012.2208983"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.18"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848002"},{"key":"ref5","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-01721-6_5","article-title":"Location diversity: Enhanced privacy protection in location based services","author":"xue","year":"2009","journal-title":"International Symposium on Location and Context Awareness"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2017-0015"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2015.7218474"},{"key":"ref2","article-title":"Is ridesharing safe?","author":"feeney","year":"2015","journal-title":"Cato Policy Analysis"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1142\/9789814355858_0006"},{"key":"ref1","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-01516-8_26","article-title":"On the anonymity of home\/work location pairs","author":"golle","year":"2009","journal-title":"Pervasive Computing"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2014.05.009"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/MDM.2013.45"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2016.7511196"},{"key":"ref24","article-title":"Oride: A privacy-preserving yet accountable ride-hailing service","author":"pham","year":"2017","journal-title":"26th USENIX Security Symposium"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.trc.2016.09.017"},{"key":"ref26","article-title":"Deanonymizing mobility traces with colocation information","author":"khazbak","year":"2017","journal-title":"IEEE CNS"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2031331.2031335"}],"event":{"name":"2018 IEEE Conference on Communications and Network Security (CNS)","location":"Beijing","start":{"date-parts":[[2018,5,30]]},"end":{"date-parts":[[2018,6,1]]}},"container-title":["2018 IEEE Conference on Communications and Network Security (CNS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8410986\/8433121\/08433221.pdf?arnumber=8433221","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T13:14:30Z","timestamp":1643202870000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8433221\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/cns.2018.8433221","relation":{},"subject":[],"published":{"date-parts":[[2018,5]]}}}