{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T03:16:16Z","timestamp":1767842176984,"version":"3.49.0"},"reference-count":50,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2018,7,1]],"date-time":"2018-07-01T00:00:00Z","timestamp":1530403200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61272444"],"award-info":[{"award-number":["61272444"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61672350"],"award-info":[{"award-number":["61672350"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["71671114"],"award-info":[{"award-number":["71671114"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1401253"],"award-info":[{"award-number":["U1401253"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1405251"],"award-info":[{"award-number":["U1405251"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2018,7,1]]},"DOI":"10.1109\/tdsc.2016.2604383","type":"journal-article","created":{"date-parts":[[2016,8,30]],"date-time":"2016-08-30T18:34:40Z","timestamp":1472582080000},"page":"646-660","source":"Crossref","is-referenced-by-count":166,"title":["Privacy Leakage of Location Sharing in Mobile Social Networks: Attacks and Defense"],"prefix":"10.1109","volume":"15","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8347-2841","authenticated-orcid":false,"given":"Huaxin","family":"Li","sequence":"first","affiliation":[]},{"given":"Haojin","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Suguo","family":"Du","sequence":"additional","affiliation":[]},{"given":"Xiaohui","family":"Liang","sequence":"additional","affiliation":[]},{"given":"Xuemin","family":"Shen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2014.6766086"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2015.7218391"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TCST.2015.2462741"},{"key":"ref32","article-title":"Learning-based jamming attack against low-duty-cycle networks","volume":"pp","author":"yang","year":"2015","journal-title":"IEEE Trans Depend and Sec Comp"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2016.7721742"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660345"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICCChina.2015.7448638"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2013.2253420"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2014.6863135"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2014.6812286"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1002\/widm.8"},{"key":"ref27","year":"2015"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2009.25"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1864349.1864363"},{"key":"ref1","article-title":"How many people use the top social media, apps & services?","author":"smith","year":"2014"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1002\/0471200611"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2020408.2020491"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1126\/science.1177170"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511574931"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2370216.2370288"},{"key":"ref26","article-title":"You are\n what you like! information leakage through users&#x2019; interests","author":"chaabane","year":"0","journal-title":"Proc Symp Netw Distrib Syst Security"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1463434.1463477"},{"key":"ref50","article-title":"DeepDroid: Dynamically enforcing enterprise\n policy on android devices","author":"wang","year":"0","journal-title":"Proc Symp Netw Distrib Syst Security"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195818"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382262"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2016.7524528"},{"key":"ref12","first-page":"9","article-title":"Context-centric security","author":"tiwari","year":"0","journal-title":"Proc USENIX Conf Hot Topics Secur"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"504","DOI":"10.1126\/science.aaa4961","article-title":"Control use of data to protect privacy","volume":"347","author":"landau","year":"2015","journal-title":"Science"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"509","DOI":"10.1126\/science.aaa1465","article-title":"Privacy and human behavior in the age of information","volume":"347","author":"acquisti","year":"2015","journal-title":"Science"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2535771.2535786"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.18"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2480362.2480418"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1456403.1456409"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2030613.2030630"},{"key":"ref4","article-title":"Skout 3.4.3 Apk Meet, Chat, Friend","year":"2014"},{"key":"ref3","author":"xiang","year":"2014"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2666620.2666625"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2662389"},{"key":"ref8","first-page":"817","article-title":"Where&#x2019;s wally?: Precise user discovery attacks in\n location proximity services","author":"polakis","year":"0","journal-title":"Proc 22nd ACM SIGSAC Conf Comput Commun Secur"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2632951.2632953"},{"key":"ref49","article-title":"Unobservable\n Re-authentication for smartphones","author":"li","year":"0","journal-title":"Proc 20th Annu Netw Distrib Syst Security Symp"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2399291"},{"key":"ref46","first-page":"161","article-title":"Preserving privacy in GPS traces via uncertainty-aware\n path cloaking","author":"hoh","year":"0","journal-title":"Proc 14th ACM Conf Comput Commun Secur"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/1066116.1189037"},{"key":"ref48","first-page":"239","article-title":"Location privacy protection for smartphone users","author":"fawaz","year":"0","journal-title":"Proc ACM SIGSAC Conf Comput Commun Secur"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/2184489.2184500"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382261"},{"key":"ref41","article-title":"Location privacy via private proximity testing","author":"narayanan","year":"0","journal-title":"Proc 18th Annu Netw Distrib Syst Secur Symp"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2662367"},{"key":"ref43","first-page":"87","article-title":"Practical privacy-preserving\n location-sharing based services with aggregate statistics","author":"herrmann","year":"0","journal-title":"Proc ACM Conf Sec Privacy Wireless Mobile Netw"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8858\/8408571\/07556276.pdf?arnumber=7556276","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T10:55:31Z","timestamp":1643194531000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7556276\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7,1]]},"references-count":50,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2016.2604383","relation":{},"ISSN":["1545-5971","1941-0018","2160-9209"],"issn-type":[{"value":"1545-5971","type":"print"},{"value":"1941-0018","type":"electronic"},{"value":"2160-9209","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,7,1]]}}}