{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,29]],"date-time":"2025-12-29T11:46:53Z","timestamp":1767008813600,"version":"3.37.3"},"reference-count":36,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2018,9,1]],"date-time":"2018-09-01T00:00:00Z","timestamp":1535760000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"name":"NSF China","award":["61728201"],"award-info":[{"award-number":["61728201"]}]},{"name":"Australia ARC","award":["DP180102828"],"award-info":[{"award-number":["DP180102828"]}]},{"DOI":"10.13039\/501100004543","name":"China Scholarship Council","doi-asserted-by":"publisher","award":["201708240007"],"award-info":[{"award-number":["201708240007"]}],"id":[{"id":"10.13039\/501100004543","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Comput. Soc. Syst."],"published-print":{"date-parts":[[2018,9]]},"DOI":"10.1109\/tcss.2018.2861775","type":"journal-article","created":{"date-parts":[[2018,8,23]],"date-time":"2018-08-23T19:05:09Z","timestamp":1535051109000},"page":"773-784","source":"Crossref","is-referenced-by-count":60,"title":["A Hybrid Privacy Protection Scheme in Cyber-Physical Social Networks"],"prefix":"10.1109","volume":"5","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2944-4647","authenticated-orcid":false,"given":"Youyang","family":"Qu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4485-6743","authenticated-orcid":false,"given":"Shui","family":"Yu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3026-7537","authenticated-orcid":false,"given":"Longxiang","family":"Gao","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1680-2521","authenticated-orcid":false,"given":"Wanlei","family":"Zhou","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0865-3570","authenticated-orcid":false,"given":"Sancheng","family":"Peng","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","first-page":"324","article-title":"On non-cooperative location privacy: A game-theoretic analysis","author":"freudiger","year":"2009","journal-title":"Proc ACM Conf Comput Commun Secur (CCS)"},{"key":"ref32","article-title":"Diffusing private data over networks","author":"koufogiannis","year":"0","journal-title":"IEEE Trans Control Netw Syst"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2016.2618998"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2015.2485225"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1613\/jair.301"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2420686"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2016.2519819"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2014.2335537"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2016.2519463"},{"key":"ref12","first-page":"545","article-title":"Mining frequent graph patterns with differential privacy","author":"shen","year":"2013","journal-title":"Proc KDD"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8056978"},{"key":"ref14","first-page":"2399","article-title":"Efficient algorithms for k-anonymous location privacy in participatory sensing","author":"vu","year":"2012","journal-title":"Proc IEEE InfoCom"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382261"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2016.2639016"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2011.110418"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2213836.2213870"},{"journal-title":"Yelp Dataset 8th Round","year":"2017","author":"center","key":"ref19"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2015.2490021"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2684221"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5935010"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2015.2512301"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2679483"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2531185"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2003.1186725"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2611602"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2016.2563397"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2610963"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2577036"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2013.20"},{"key":"ref20","first-page":"1","article-title":"Protecting privacy when disclosing information: k-Anonymity and its enforcement through generalization and suppression","author":"pierangela","year":"1998","journal-title":"Proc IEEE Symp Res Secur Privacy"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2009.139"},{"key":"ref21","first-page":"24","article-title":"L-diversity: Privacy beyond k-anonymity","author":"machanavajjhala","year":"2006","journal-title":"Proc of the Intl Conf On Data Engineering ICDE"},{"key":"ref24","first-page":"7","article-title":"FuzzyDP: Fuzzy-based big data publishing against inquiry attacks","author":"qu","year":"2017","journal-title":"Proc IEEE Conf Comput Commun Workshops (INFOCOM)"},{"key":"ref23","first-page":"1","article-title":"Big data set privacy preserving through sensitive attribute-based grouping","author":"qu","year":"2017","journal-title":"Proc Int Conf Commun (ICC)"},{"key":"ref26","first-page":"1","article-title":"Differential privacy","author":"dwork","year":"2006","journal-title":"Proc ICALP"},{"key":"ref25","first-page":"1","article-title":"Improving data utility through game theory in personalized differential privacy","author":"qu","year":"2018","journal-title":"Proc IEEE Int Conf Commun (ICC)"}],"container-title":["IEEE Transactions on Computational Social Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6570650\/8464016\/08444976.pdf?arnumber=8444976","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T11:46:08Z","timestamp":1643197568000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8444976\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9]]},"references-count":36,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tcss.2018.2861775","relation":{},"ISSN":["2329-924X","2373-7476"],"issn-type":[{"type":"electronic","value":"2329-924X"},{"type":"electronic","value":"2373-7476"}],"subject":[],"published":{"date-parts":[[2018,9]]}}}