{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T13:50:08Z","timestamp":1775310608990,"version":"3.50.1"},"reference-count":26,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"8","license":[{"start":{"date-parts":[[2018,8,1]],"date-time":"2018-08-01T00:00:00Z","timestamp":1533081600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61772282"],"award-info":[{"award-number":["61772282"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61373134"],"award-info":[{"award-number":["61373134"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61772454"],"award-info":[{"award-number":["61772454"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61402234"],"award-info":[{"award-number":["61402234"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012246","name":"Priority Academic Program Development of Jiangsu Higher Education Institutions","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100012246","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Postgraduate Research & Practice Innovation Program of Jiangsu Province","award":["KYCX17_0901"],"award-info":[{"award-number":["KYCX17_0901"]}]},{"name":"Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology","award":["TII-17-1942"],"award-info":[{"award-number":["TII-17-1942"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Ind. Inf."],"published-print":{"date-parts":[[2018,8]]},"DOI":"10.1109\/tii.2017.2773646","type":"journal-article","created":{"date-parts":[[2017,11,15]],"date-time":"2017-11-15T19:29:20Z","timestamp":1510774160000},"page":"3628-3636","source":"Crossref","is-referenced-by-count":289,"title":["Location Privacy Protection Based on Differential Privacy Strategy for Big Data in Industrial Internet of Things"],"prefix":"10.1109","volume":"14","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3340-0695","authenticated-orcid":false,"given":"Chunyong","family":"Yin","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0397-3241","authenticated-orcid":false,"given":"Jinwen","family":"Xi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8892-4424","authenticated-orcid":false,"given":"Ruxia","family":"Sun","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5764-2432","authenticated-orcid":false,"given":"Jin","family":"Wang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"754","article-title":"(?, k)-Anonymity: An enhanced\n k-anonymity model for privacy-preserving data publishing","author":"wong","year":"0","journal-title":"Proc 12th ACM SIGKDD Int Conf Knowl Discovery Data Mining"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2007.367856"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78478-4_9"},{"key":"ref13","first-page":"1355","article-title":"Link privacy in social networks","author":"korolova","year":"0","journal-title":"Proc 24th Int'l Conf Data Eng"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.26"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2184489.2184500"},{"key":"ref16","first-page":"237","article-title":"Supporting anonymous location queries in\n mobile environments with privacy grid","author":"bamba","year":"0","journal-title":"Proc 17th Int Conf World Wide Web"},{"key":"ref17","first-page":"1429","article-title":"From data privacy to location privacy: Models and algorithms","author":"liu","year":"0","journal-title":"Proc Int Conf On Very Large Data Bases"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611973075.16"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2014.2342533"},{"key":"ref4","first-page":"1","article-title":"VulHunter: A discovery for unknown bugs\n based on analysis for known patches in industry internet of things","author":"xiao","year":"0","journal-title":"IEEE Trans Emerg Topics Comput"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2650204"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.05.003"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3055515"},{"key":"ref8","first-page":"1","article-title":"Location privacy protection\n based on improved K-value method in augmented reality on mobile devices","volume":"2017","author":"yin","year":"2017","journal-title":"Mobile Inf Syst"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.3902"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2695487"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/275487.275508"},{"key":"ref1","first-page":"393","article-title":"Wireless sensor networks:\n A survey","volume":"38","author":"fakyildiz","year":"2010","journal-title":"Comput Netw Int J Comput Telecommun Netw"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2015.03.013"},{"key":"ref22","first-page":"1087","article-title":"On differential private frequent itemset mining","author":"zeng","year":"0","journal-title":"Proc 39th Conf Very Large Database"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2487575.2487601"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2046556.2046581"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1835804.1835868"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-016-3545-5"},{"key":"ref25","first-page":"104","article-title":"An\n accurate method for mining top-k frequent pattern under differential privacy","volume":"51","author":"zhang","year":"2014","journal-title":"J Comput Res Develop"}],"container-title":["IEEE Transactions on Industrial Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9424\/8426041\/08110700.pdf?arnumber=8110700","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T14:13:17Z","timestamp":1643206397000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8110700\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8]]},"references-count":26,"journal-issue":{"issue":"8"},"URL":"https:\/\/doi.org\/10.1109\/tii.2017.2773646","relation":{},"ISSN":["1551-3203","1941-0050"],"issn-type":[{"value":"1551-3203","type":"print"},{"value":"1941-0050","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,8]]}}}