{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T05:42:17Z","timestamp":1757310137533},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,4]]},"DOI":"10.1109\/infocom.2015.7218473","type":"proceedings-article","created":{"date-parts":[[2015,8,24]],"date-time":"2015-08-24T17:33:36Z","timestamp":1440437616000},"page":"1008-1016","source":"Crossref","is-referenced-by-count":22,"title":["Personalized location privacy in mobile networks: A social group utility approach"],"prefix":"10.1109","author":[{"given":"Xiaowen","family":"Gong","sequence":"first","affiliation":[]},{"given":"Xu","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Kai","family":"Xing","sequence":"additional","affiliation":[]},{"given":"Dong-Hoon","family":"Shin","sequence":"additional","affiliation":[]},{"given":"Mengyuan","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Junshan","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2013.SUP.0513049"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2008.080602"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1530748.1530790"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2491288.2491302"},{"key":"ref14","article-title":"Social group utility maximization game with applications in mobile social networks","author":"gong","year":"2013","journal-title":"IEEE Allerton"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CISS.2014.6814138"},{"key":"ref16","article-title":"Enhancing security and privacy in traffic-monitoring systems","author":"hoh","year":"2006","journal-title":"IEEE Pervasive Computing"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72037-9_8"},{"journal-title":"A Course in Game Theory","year":"1994","author":"osborne","key":"ref18"},{"journal-title":"Technical Report","article-title":"Personalized location privacy in mobile networks: A social group utility approach","year":"0","key":"ref19"},{"key":"ref4","article-title":"On noncooperative location privacy: A game-theoretic analysis","author":"freudiger","year":"2009","journal-title":"ACM CCS"},{"year":"0","key":"ref3","article-title":"eMarketer: Social networking reaches nearly one in four around the world"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6567111"},{"key":"ref5","article-title":"Traffic-aware multiple mix zone placement for protecting location privacy","author":"liu","year":"2012","journal-title":"IEEE INFOCOM"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6567110"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848136"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2003.1186725"},{"key":"ref9","article-title":"Protecting location privacy through path confusion","author":"hoh","year":"2005","journal-title":"SECURECOMM"},{"year":"2013","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-75551-7_5"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195574"},{"key":"ref21","article-title":"Private proximity detection via computational geometric approaches","author":"mu","year":"2013","journal-title":"ACM MobiDE"},{"key":"ref24","first-page":"17","article-title":"On the evolution of random graphs","author":"erdos","year":"1960","journal-title":"Publications of the Mathematical Institute of the Hungarian Academy of Sciences"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2013.38"},{"year":"0","key":"ref25","article-title":"SNAP: Network datasets: Brightkite"}],"event":{"name":"IEEE INFOCOM 2015 - IEEE Conference on Computer Communications","start":{"date-parts":[[2015,4,26]]},"location":"Kowloon, Hong Kong","end":{"date-parts":[[2015,5,1]]}},"container-title":["2015 IEEE Conference on Computer Communications (INFOCOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7172813\/7218353\/07218473.pdf?arnumber=7218473","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,25]],"date-time":"2017-03-25T02:12:29Z","timestamp":1490407949000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7218473\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,4]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/infocom.2015.7218473","relation":{},"subject":[],"published":{"date-parts":[[2015,4]]}}}