{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T06:11:52Z","timestamp":1729663912596,"version":"3.28.0"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,5]]},"DOI":"10.1109\/icce-tw.2016.7520964","type":"proceedings-article","created":{"date-parts":[[2016,7,28]],"date-time":"2016-07-28T16:43:06Z","timestamp":1469724186000},"page":"1-2","source":"Crossref","is-referenced-by-count":1,"title":["Cloaking sensitive patterns Td preserve location privacy for LBS applications"],"prefix":"10.1109","author":[{"given":"Feng-Yuan","family":"Tai","sequence":"first","affiliation":[]},{"given":"Jian-Kai","family":"Song","sequence":"additional","affiliation":[]},{"given":"Yi-Chen","family":"Tsai","sequence":"additional","affiliation":[]},{"given":"Hsia-Ping","family":"Tsai","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"A Fuzzy Based Scheme for Sanitizing Sensitive Sequential Patterns","volume":"12","author":"shahzad","year":"2015","journal-title":"The International Arab Journal of Information Technology"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5934968"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14527-8_6"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MDM.2008.20"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1066116.1189037"},{"year":"0","key":"ref3"},{"key":"ref6","article-title":"Protecting Moving Trajectories with Dummies","author":"peng","year":"2007","journal-title":"Mobile Data Management"},{"journal-title":"Mix-Zones for Location Privacy in Vehicular Networks","year":"2007","author":"freudiger","key":"ref5"},{"key":"ref8","article-title":"Pattern-Preserving k-Anonymization of Sequences and its Application to Mobility Data mining","author":"pensa","year":"0","journal-title":"PiLBA'08"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1281192.1281230"},{"year":"0","key":"ref2"},{"year":"0","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1667502.1667510"}],"event":{"name":"2016 IEEE International Conference on Consumer Electronics-Taiwan (ICCE-TW)","start":{"date-parts":[[2016,5,27]]},"location":"Nantou County, Taiwan","end":{"date-parts":[[2016,5,29]]}},"container-title":["2016 IEEE International Conference on Consumer Electronics-Taiwan (ICCE-TW)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7508353\/7520694\/07520964.pdf?arnumber=7520964","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,9,29]],"date-time":"2016-09-29T19:52:25Z","timestamp":1475178745000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7520964\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/icce-tw.2016.7520964","relation":{},"subject":[],"published":{"date-parts":[[2016,5]]}}}