{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T22:36:03Z","timestamp":1774650963170,"version":"3.50.1"},"reference-count":38,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"10","license":[{"start":{"date-parts":[[2017,10,1]],"date-time":"2017-10-01T00:00:00Z","timestamp":1506816000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/501100001809","name":"NFSC","doi-asserted-by":"publisher","award":["61425024"],"award-info":[{"award-number":["61425024"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"NFSC","doi-asserted-by":"publisher","award":["61402223"],"award-info":[{"award-number":["61402223"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Jiangsu Province Double Innovation Talent Program"},{"DOI":"10.13039\/501100001809","name":"NFSC","doi-asserted-by":"publisher","award":["61321491"],"award-info":[{"award-number":["61321491"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"NFSC","doi-asserted-by":"publisher","award":["61300235"],"award-info":[{"award-number":["61300235"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2017,10]]},"DOI":"10.1109\/tifs.2017.2707334","type":"journal-article","created":{"date-parts":[[2017,5,23]],"date-time":"2017-05-23T20:25:49Z","timestamp":1495571149000},"page":"2444-2456","source":"Crossref","is-referenced-by-count":34,"title":["A Jointly Differentially Private Scheduling Protocol for Ridesharing Services"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8427-6068","authenticated-orcid":false,"given":"Wei","family":"Tong","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6709-4801","authenticated-orcid":false,"given":"Jingyu","family":"Hua","sequence":"additional","affiliation":[]},{"given":"Sheng","family":"Zhong","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-008-0212-5"},{"key":"ref33","first-page":"161","article-title":"Preserving privacy in GPS traces via uncertainty-aware path cloaking","author":"hoh","year":"2007","journal-title":"Proc ACM Conf Comput Commun Secur (CCS)"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2013.6596033"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-014-0351-4"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660348"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-015-0981-4"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2587241"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2307697"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2007.1062"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2525314.2525365"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICTAI.2014.91"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2014.2334313"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.trb.2013.08.012"},{"key":"ref14","first-page":"410","article-title":"T-share: A large-scale dynamic taxi ridesharing service","author":"ma","year":"2013","journal-title":"Proc IEEE Int Conf on Data Engineering (ICDE)"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1561\/0400000042","article-title":"The algorithmic foundations of differential privacy","volume":"9","author":"dwork","year":"2014","journal-title":"Found Trends Theor Comput Sci"},{"key":"ref16","first-page":"928","article-title":"Online convex programming and generalized infinitesimal gradient ascent","author":"zinkevich","year":"2003","journal-title":"Proc 20th Int Conf Mach Learn (ICML)"},{"key":"ref17","author":"han","year":"2000","journal-title":"Data Mining Concepts and Techniques"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2007.66"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516735"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/1806689.1806787"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2016.7524588"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2043621.2043626"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1007\/11681878_14","article-title":"Calibrating noise to sensitivity in private data analysis","volume":"3876","author":"dwork","year":"2006","journal-title":"Proceedings of Theoretical Cryptography Conference (TCC)"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2016.2605798"},{"key":"ref29","author":"soria-comas","year":"2016","journal-title":"Individual differential privacy A utility-preserving formulation of differential privacy guarantees"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978426"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2554797.2554834"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2591796.2591826"},{"key":"ref2","article-title":"Berlin bans Uber app, citing passenger safety concerns","author":"kell","year":"2014","journal-title":"Proc FORTUNE"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611974331.ch43"},{"key":"ref1","year":"2015","journal-title":"The Year the Rideshare Industry Crushed the Taxi [Infographic]"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1869790.1869807"},{"key":"ref22","author":"gaulin","year":"2016","journal-title":"Pyroutelib2"},{"key":"ref21","year":"2015","journal-title":"Gurobi Optimizer Reference Manual"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2012.05.028"},{"key":"ref23","author":"contributors","year":"2016","journal-title":"OpenStreetMap"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611973075.90"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2845080"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/7956594\/07932877.pdf?arnumber=7932877","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:59:57Z","timestamp":1642006797000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7932877\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10]]},"references-count":38,"journal-issue":{"issue":"10"},"URL":"https:\/\/doi.org\/10.1109\/tifs.2017.2707334","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,10]]}}}