{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T08:35:29Z","timestamp":1770453329624,"version":"3.49.0"},"reference-count":32,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2018,4,1]],"date-time":"2018-04-01T00:00:00Z","timestamp":1522540800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61502192"],"award-info":[{"award-number":["61502192"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61572219"],"award-info":[{"award-number":["61572219"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61671216"],"award-info":[{"award-number":["61671216"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61471408"],"award-info":[{"award-number":["61471408"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["41701479"],"award-info":[{"award-number":["41701479"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002858","name":"China Post-Doctoral Science Foundation","doi-asserted-by":"publisher","award":["2017T100556"],"award-info":[{"award-number":["2017T100556"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"crossref","award":["2016YXMS297"],"award-info":[{"award-number":["2016YXMS297"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"crossref","award":["2016JCTD118"],"award-info":[{"award-number":["2016JCTD118"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2018,4]]},"DOI":"10.1109\/jiot.2018.2799545","type":"journal-article","created":{"date-parts":[[2018,1,30]],"date-time":"2018-01-30T19:20:15Z","timestamp":1517340015000},"page":"1033-1042","source":"Crossref","is-referenced-by-count":101,"title":["ILLIA: Enabling &lt;inline-formula&gt; \n                     &lt;tex-math notation=\"LaTeX\"&gt;$k$ &lt;\/tex-math&gt;\n                  &lt;\/inline-formula&gt;-Anonymity-Based Privacy Preserving Against Location Injection Attacks in Continuous LBS Queries"],"prefix":"10.1109","volume":"5","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0907-9926","authenticated-orcid":false,"given":"Ping","family":"Zhao","sequence":"first","affiliation":[]},{"given":"Jie","family":"Li","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3094-016X","authenticated-orcid":false,"given":"Fanzi","family":"Zeng","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1815-2793","authenticated-orcid":false,"given":"Fu","family":"Xiao","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1963-4954","authenticated-orcid":false,"given":"Chen","family":"Wang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7372-2539","authenticated-orcid":false,"given":"Hongbo","family":"Jiang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref32","author":"leskovec","year":"2014","journal-title":"SNAP Datasets Stanford large network dataset collection"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1007\/978-3-642-22263-4_4","article-title":"Quantifying location privacy: The case of sporadic location exposure","author":"shokri","year":"2011","journal-title":"Proc Int Symp Privacy Enhancing Technol Symp"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2017.7996911"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2560768"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2014.2316155"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2549046"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1066116.1189037"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.39"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2014.2366467"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2587241"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848002"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6567110"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3084041.3084056"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2704093"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"504","DOI":"10.1126\/science.aaa4961","article-title":"Control use of data to protect privacy","volume":"347","author":"landau","year":"2015","journal-title":"Science"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2873055"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2015.2451639"},{"key":"ref6","article-title":"Social network de-anonymization with overlapping communities: Analysis, algorithm and experiments","author":"wu","year":"2018","journal-title":"Proc IEEE InfoCom"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8057008"},{"key":"ref5","first-page":"753","article-title":"Anatomization and protection of mobile apps&#x2019; location privacy threats","author":"fawaz","year":"2015","journal-title":"Proc Usenix Security Symp"},{"key":"ref8","year":"2016","journal-title":"Dark Net Linkedin Sale Looks Like the Real Deal"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2619091"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2535165"},{"key":"ref9","year":"2017","journal-title":"Recently Confirmed Myspace Hack Could Be the Largest Yet"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"750","DOI":"10.1109\/TPDS.2013.43","article-title":"Secure and efficient data transmission for cluster-based wireless sensor networks","volume":"25","author":"lu","year":"2014","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1653771.1653807"},{"key":"ref22","year":"2017","journal-title":"FakeGPStracker"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2910580"},{"key":"ref24","first-page":"617","article-title":"Protecting location privacy: Optimal strategy against localization attacks","author":"shokri","year":"2102","journal-title":"Proc ACM CCS"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2662386"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2011.105"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-008-0181-5"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/8334665\/08274909.pdf?arnumber=8274909","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T08:32:04Z","timestamp":1643185924000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8274909\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4]]},"references-count":32,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2018.2799545","relation":{},"ISSN":["2327-4662"],"issn-type":[{"value":"2327-4662","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,4]]}}}