{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T21:19:10Z","timestamp":1775510350942,"version":"3.50.1"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.1109\/iscc.2018.8538629","type":"proceedings-article","created":{"date-parts":[[2018,11,20]],"date-time":"2018-11-20T01:49:31Z","timestamp":1542678571000},"page":"1-7","source":"Crossref","is-referenced-by-count":2,"title":["Query-Aware User Privacy Protection for LBS over Query-Feature-based Attacks"],"prefix":"10.1109","author":[{"given":"Mingming","family":"Guo","sequence":"first","affiliation":[]},{"given":"Kianoosh G.","family":"Boroojeni","sequence":"additional","affiliation":[]},{"given":"Niki","family":"Pissinou","sequence":"additional","affiliation":[]},{"given":"Kia","family":"Makki","sequence":"additional","affiliation":[]},{"given":"Jerry","family":"Miller","sequence":"additional","affiliation":[]},{"given":"Sitharama","family":"Iyengar","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2014.2309133"},{"key":"ref11","first-page":"733","article-title":"Personalized Point-ofInterest Recommendation by Mining Users&#x2019; Preference Transition","author":"liu","year":"2013","journal-title":"Proc 22nd ACM CIKM"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s10707-010-0117-0"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516735"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-25150-9_2"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6567110"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2020408.2020602"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2013.6644972"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2818183"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"ref5","article-title":"ASA: Against Statistical Attacks for Privacy-aware Users in Location-based Service","author":"sun","year":"2016","journal-title":"Future Generation Computer Systems"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2015.7157998"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1217299.1217302"},{"key":"ref2","year":"2017"},{"key":"ref1","year":"2017"},{"key":"ref9","doi-asserted-by":"crossref","DOI":"10.1145\/1066116.1189037","article-title":"Anonymous Usage of Locationbased Services through Spatial and Temporal Cloaking","author":"gruteser","year":"2003","journal-title":"ACM MobiSys"}],"event":{"name":"2018 IEEE Symposium on Computers and Communications (ISCC)","location":"Natal","start":{"date-parts":[[2018,6,25]]},"end":{"date-parts":[[2018,6,28]]}},"container-title":["2018 IEEE Symposium on Computers and Communications (ISCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8510755\/8538441\/08538629.pdf?arnumber=8538629","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,7]],"date-time":"2023-09-07T08:49:54Z","timestamp":1694076594000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8538629\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/iscc.2018.8538629","relation":{},"subject":[],"published":{"date-parts":[[2018,6]]}}}