{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T19:58:42Z","timestamp":1760299122913,"version":"3.37.3"},"reference-count":46,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2016,3,1]],"date-time":"2016-03-01T00:00:00Z","timestamp":1456790400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2016,3,1]],"date-time":"2016-03-01T00:00:00Z","timestamp":1456790400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2016,3,1]],"date-time":"2016-03-01T00:00:00Z","timestamp":1456790400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"publisher","award":["61190110"],"award-info":[{"award-number":["61190110"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"publisher","award":["61170213","61170220","61373146"],"award-info":[{"award-number":["61170213","61170220","61373146"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"NSFC\\RGC Joint Research","doi-asserted-by":"publisher","award":["61361166009"],"award-info":[{"award-number":["61361166009"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"RFDP","award":["20121018430"],"award-info":[{"award-number":["20121018430"]}]},{"name":"Excellent Young Scientist","award":["61422207"],"award-info":[{"award-number":["61422207"]}]},{"name":"Guangxi Key Lab of Wireless Wideband Communication & Signal Processing"},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1035894"],"award-info":[{"award-number":["CNS-1035894"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["ECCS-1247944"],"award-info":[{"award-number":["ECCS-1247944"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["ECCS-1343306"],"award-info":[{"award-number":["ECCS-1343306"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["CMMI-1436786"],"award-info":[{"award-number":["CMMI-1436786"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"publisher","award":["61170216","61228202","61373146"],"award-info":[{"award-number":["61170216","61228202","61373146"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. on Mobile Comput."],"published-print":{"date-parts":[[2016,3,1]]},"DOI":"10.1109\/tmc.2015.2421946","type":"journal-article","created":{"date-parts":[[2015,4,11]],"date-time":"2015-04-11T02:52:32Z","timestamp":1428720752000},"page":"719-732","source":"Crossref","is-referenced-by-count":31,"title":["Privacy-Aware High-Quality Map Generation with Participatory Sensing"],"prefix":"10.1109","volume":"15","author":[{"given":"Xi","family":"Chen","sequence":"first","affiliation":[{"name":"School of Software and TNLIST, Tsinghua University, China"}]},{"given":"Xiaopei","family":"Wu","sequence":"additional","affiliation":[{"name":"School of Software and TNLIST, Tsinghua University, China"}]},{"given":"Xiang-Yang","family":"Li","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Illinois Institute of Technology, Chicago, IL"}]},{"given":"Xiaoyu","family":"Ji","sequence":"additional","affiliation":[{"name":"Department of Computer Science, HKUST, Hong Kong"}]},{"given":"Yuan","family":"He","sequence":"additional","affiliation":[{"name":"School of Software and TNLIST, Tsinghua University, China"}]},{"given":"Yunhao","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Software and TNLIST, Tsinghua University, China"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2014.2366773"},{"key":"ref35","first-page":"901","article-title":"On k-anonymity and the curse of dimensionality","author":"aggarwal","year":"2005","journal-title":"Proc Int Conf On Very Large Data Bases"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2287092"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2013.6691626"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"452","DOI":"10.1109\/TST.2014.6919821","article-title":"Privacy quantification model based on the\n Bayes conditional risk in Location-based services","volume":"19","author":"gui","year":"2014","journal-title":"Tsinghua Sci Technol"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2003.1186725"},{"key":"ref14","first-page":"289","article-title":"MaskIt:\n Privately releasing user context streams for personalized mobile applications","author":"g\u00f6tz","year":"0","journal-title":"Proc ACM SIGMOD Int Conf Manag Data"},{"key":"ref36","article-title":"Unique in the crowd: The\n privacy bounds of human mobility","author":"de montjoye","year":"0","journal-title":"Nature Sci Rep"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/WICOM.2009.5303219"},{"key":"ref30","first-page":"13","article-title":"Secure Multi-party computation problems and their\n applications: A review and open problems","author":"atallah","year":"0","journal-title":"Proceedings New Security Paradigms Workshop"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2012.08.005"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/1460412.1460440"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2462456.2464460"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-11917-0_8"},{"key":"ref2","first-page":"469","article-title":"CrowdAtlas: Self-updating maps for cloud and personal use","author":"wang","year":"0","journal-title":"Proc ACM 11th Annu Int Conf Mobile Syst Appl Services"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2426656.2426674"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/BF01889981"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.14778\/1453856.1453874"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1006\/gmip.1998.0465"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-75551-7_5"},{"key":"ref19","first-page":"193","article-title":"Sampling and reconstructing manifolds using Alpha-shapes","author":"bernardini","year":"0","journal-title":"Proc 9th Can Conf Comput Geometry"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/S0925-7721(98)00013-3"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2008.80"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848175"},{"year":"0","key":"ref23"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2004.1281242"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-444-87806-9.50013-X"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/0925-7721(92)90003-B"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1006\/jcph.1995.1047"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/MASS.2011.41"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2013.01.003"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-0190(99)00031-9"},{"key":"ref44","first-page":"65","article-title":"Privacy preservation in the publication of trajectories","year":"2008","journal-title":"Proc IEEE 9th Int Conf Mobile Data Manag"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0008901"},{"key":"ref43","article-title":"PEPSI: Privacy-enhanced participatory sensing infrastructure","author":"de cristofaro","year":"0","journal-title":"Proc ACM WiSec"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-39881-3_6"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2004.1276918"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6567085"},{"key":"ref7","first-page":"199","article-title":"You&#x2019;re\n driving and texting: Detecting drivers using personal smart phones by leveraging inertial sensors","author":"bo","year":"0","journal-title":"Proc ACM 19th Annu Int Conf Mobile Comput Netw"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6567070"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6847959"},{"key":"ref3","first-page":"85","article-title":"Walkie-Markie: Indoor pathway mapping made easy","author":"shen","year":"0","journal-title":"Proc 10th USENIX Conf Netw Syst Des Implementation"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2500423.2504574"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848007"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2011.06.073"}],"container-title":["IEEE Transactions on Mobile Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7755\/7398217\/07084117.pdf?arnumber=7084117","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,27]],"date-time":"2023-04-27T22:25:51Z","timestamp":1682634351000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7084117\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3,1]]},"references-count":46,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tmc.2015.2421946","relation":{},"ISSN":["1536-1233","1558-0660","2161-9875"],"issn-type":[{"type":"print","value":"1536-1233"},{"type":"electronic","value":"1558-0660"},{"type":"electronic","value":"2161-9875"}],"subject":[],"published":{"date-parts":[[2016,3,1]]}}}