{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T05:22:29Z","timestamp":1770268949651,"version":"3.49.0"},"reference-count":55,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Key R&amp;D Program of China","award":["2020YFB1005900"],"award-info":[{"award-number":["2020YFB1005900"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62002159"],"award-info":[{"award-number":["62002159"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61872176"],"award-info":[{"award-number":["61872176"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61972195"],"award-info":[{"award-number":["61972195"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Leading-Edge Technology Program of Jiangsu NSF","award":["BK20202001"],"award-info":[{"award-number":["BK20202001"]}]},{"name":"Jiangsu Shuang-Chuang Program","award":["JSSCBS20210035"],"award-info":[{"award-number":["JSSCBS20210035"]}]},{"DOI":"10.13039\/501100008982","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1816399"],"award-info":[{"award-number":["CNS-1816399"]}],"id":[{"id":"10.13039\/501100008982","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Commonwealth Cyber Initiative"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2023,5,1]]},"DOI":"10.1109\/tdsc.2022.3184279","type":"journal-article","created":{"date-parts":[[2022,6,20]],"date-time":"2022-06-20T20:24:59Z","timestamp":1655756699000},"page":"2433-2449","source":"Crossref","is-referenced-by-count":6,"title":["Understanding Location Privacy of the Point-of-Interest Aggregate Data via Practical Attacks and Defenses"],"prefix":"10.1109","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8427-6068","authenticated-orcid":false,"given":"Wei","family":"Tong","sequence":"first","affiliation":[{"name":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China"}]},{"given":"Yinggang","family":"Tong","sequence":"additional","affiliation":[{"name":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0039-4794","authenticated-orcid":false,"given":"Chang","family":"Xia","sequence":"additional","affiliation":[{"name":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6709-4801","authenticated-orcid":false,"given":"Jingyu","family":"Hua","sequence":"additional","affiliation":[{"name":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China"}]},{"given":"Qun","family":"Li","sequence":"additional","affiliation":[{"name":"Department of Computer Science, College of William &amp; Mary, Williamsburg, VA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6581-8730","authenticated-orcid":false,"given":"Sheng","family":"Zhong","sequence":"additional","affiliation":[{"name":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1023\/B:STCO.0000035301.49549.88"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1066116.1189037"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1247480.1247546"},{"key":"ref14","first-page":"263","article-title":"R&#x00E9;nyi differential privacy","author":"mironov","year":"2017","journal-title":"Proc 30th IEEE Symp Foundations of Computer Science"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23183"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2017-0043"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3139550.3139555"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/3393691.3394200"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516735"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052620"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1823854.1823897"},{"key":"ref16","article-title":"Jaccard index &#x2013; wikipedia, the free encyclopedia","year":"2020"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2487575.2487673"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2632048.2632092"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046781"},{"key":"ref50","first-page":"808","article-title":"Practical location privacy attacks and defense on point-of-interest aggregates, ICDCS 2021, Washington DC, USA","author":"tong","year":"2021","journal-title":"Proc 41st IEEE Int Conf Distrib Comput Syst"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/3478106"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00068"},{"key":"ref48","first-page":"19","article-title":"Not so unique in the crowd: A simple and effective algorithm for anonymizing location data","author":"song","year":"2014","journal-title":"Proc PIR SIGIR CEUR Workshop Proc"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1038\/srep01376"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/3380990"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2965065"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737457"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2975925"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2018.2877790"},{"key":"ref8","first-page":"1471","article-title":"Training and testing low-degree polynomial data mappings via linear SVM","volume":"11","author":"chang","year":"2010","journal-title":"J Mach Learn Res"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1561\/0400000042"},{"key":"ref9","first-page":"2825","article-title":"Scikit-learn: Machine learning in python","volume":"12","author":"pedregosa","year":"2011","journal-title":"J Mach Learn Res"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2014.2327053"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1869790.1869807"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3369829"},{"key":"ref5","first-page":"174:1","article-title":"Smartphone app usage prediction using points of interest","volume":"1","author":"yu","year":"2017","journal-title":"Proc ACM Interact Mobile Wearable Ubiquitous Technol"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2779402"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052601"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2019.2937296"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2707334"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01516-8_26"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3411812"},{"key":"ref30","first-page":"156:1","article-title":"Revisitation in urban space versus online: A comparison across POIs, websites, and smartphone apps","volume":"2","author":"cao","year":"2018","journal-title":"Proc ACM Interact Mobile Wearable Ubiquitous Technol"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3432229"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3191778"},{"key":"ref2","article-title":"OpenStreetMap","year":"2012"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3214265"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2912886"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3095933"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-6144-8"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098168"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/THMS.2015.2446953"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2393347.2396380"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972832.44"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2661829.2661983"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2484028.2484030"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2016.0192"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2014.2345405"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2019.2902403"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/8858\/10126099\/9800694-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8858\/10126099\/09800694.pdf?arnumber=9800694","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,20]],"date-time":"2023-06-20T17:38:03Z","timestamp":1687282683000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9800694\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,1]]},"references-count":55,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2022.3184279","relation":{},"ISSN":["1545-5971","1941-0018","2160-9209"],"issn-type":[{"value":"1545-5971","type":"print"},{"value":"1941-0018","type":"electronic"},{"value":"2160-9209","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,5,1]]}}}