{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T15:37:17Z","timestamp":1767713837104},"reference-count":31,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,4]]},"DOI":"10.1109\/icde.2013.6544830","type":"proceedings-article","created":{"date-parts":[[2013,6,26]],"date-time":"2013-06-26T19:02:52Z","timestamp":1372273372000},"source":"Crossref","is-referenced-by-count":187,"title":["Destination prediction by sub-trajectory synthesis and privacy protection against such prediction"],"prefix":"10.1109","author":[{"given":"A. Y.","family":"Xue","sequence":"first","affiliation":[]},{"family":"Rui Zhang","sequence":"additional","affiliation":[]},{"family":"Yu Zheng","sequence":"additional","affiliation":[]},{"family":"Xing Xie","sequence":"additional","affiliation":[]},{"family":"Jin Huang","sequence":"additional","affiliation":[]},{"family":"Zhenghua Xu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-009-0163-0"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1007\/s007790200035"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/1503402.1503413"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2007.141"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1016\/j.artint.2007.01.006"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/2370216.2370273"},{"key":"14","first-page":"243","article-title":"Predestination: Inferring destinations from partial trajectories","author":"krumm","year":"0","journal-title":"Proc UbiComp 2006"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/1739041.1739100"},{"key":"12","article-title":"Countering overlapping rectangle privacy attack for moving knn queries","author":"hashem","year":"2012","journal-title":"Information Systems"},{"key":"21","year":"2012","journal-title":"T-drive Trajectory Data Sample [Online]"},{"key":"20","first-page":"73","article-title":"Inferring high-level behavior from low-level sensors","author":"patterson","year":"0","journal-title":"Proc Ubicomp 2003"},{"key":"22","year":"2012","journal-title":"Share My Route [Online]"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC.2006.1706730"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/MDM.2008.29"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1145\/1463434.1463452"},{"key":"26","author":"williams","year":"2011","journal-title":"Breaking the Coppersmith-Winograd Barrier"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1145\/2339530.2339562"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1145\/2020408.2020462"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1145\/1869790.1869807"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-003-0240-0"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2010.05.070"},{"key":"10","year":"2012","journal-title":"GPS Track Log Route Exchange Forum [Online]"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2008.4497446"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-1629-6"},{"key":"7","author":"d'keesto","year":"2012","journal-title":"Fast Facebook Checkin [Online]"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2010.08.004"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/313451.313457"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1145\/1409635.1409678"},{"key":"4","year":"2012","journal-title":"Schedule Automatic Foursquare Checkin [Online]"},{"key":"9","article-title":"Modeling transportation routines using hybrid dynamic mixed networks","author":"gogate","year":"0","journal-title":"Proc UAI 2005"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/MDM.2007.18"}],"event":{"name":"2013 29th IEEE International Conference on Data Engineering (ICDE 2013)","location":"Brisbane, QLD","start":{"date-parts":[[2013,4,8]]},"end":{"date-parts":[[2013,4,12]]}},"container-title":["2013 IEEE 29th International Conference on Data Engineering (ICDE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6530811\/6544790\/06544830.pdf?arnumber=6544830","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T19:17:59Z","timestamp":1490210279000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6544830\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,4]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/icde.2013.6544830","relation":{},"subject":[],"published":{"date-parts":[[2013,4]]}}}