{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T15:56:10Z","timestamp":1776182170921,"version":"3.50.1"},"reference-count":41,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61502352"],"award-info":[{"award-number":["61502352"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61373167"],"award-info":[{"award-number":["61373167"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1636219"],"award-info":[{"award-number":["U1636219"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61772377"],"award-info":[{"award-number":["61772377"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61772551"],"award-info":[{"award-number":["61772551"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"National Basic Research Program of China","doi-asserted-by":"crossref","award":["2014CB340600"],"award-info":[{"award-number":["2014CB340600"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100003819","name":"Natural Science Foundation of Hubei Province","doi-asserted-by":"publisher","award":["2017CFA007"],"award-info":[{"award-number":["2017CFA007"]}],"id":[{"id":"10.13039\/501100003819","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003819","name":"Natural Science Foundation of Hubei Province","doi-asserted-by":"publisher","award":["2017CFA047"],"award-info":[{"award-number":["2017CFA047"]}],"id":[{"id":"10.13039\/501100003819","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003819","name":"Natural Science Foundation of Hubei Province","doi-asserted-by":"publisher","award":["2017CFB503"],"award-info":[{"award-number":["2017CFB503"]}],"id":[{"id":"10.13039\/501100003819","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Shandong Provincial Key Program of Research and Development","award":["2018GGX101035"],"award-info":[{"award-number":["2018GGX101035"]}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"crossref","award":["2042018gf0043"],"award-info":[{"award-number":["2042018gf0043"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"crossref","award":["18CX07003A"],"award-info":[{"award-number":["18CX07003A"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. on Mobile Comput."],"published-print":{"date-parts":[[2019,6,1]]},"DOI":"10.1109\/tmc.2018.2861765","type":"journal-article","created":{"date-parts":[[2018,7,31]],"date-time":"2018-07-31T21:29:23Z","timestamp":1533072563000},"page":"1356-1367","source":"Crossref","is-referenced-by-count":111,"title":["Privacy-Preserving Crowd-Sourced Statistical Data Publishing with An Untrusted Server"],"prefix":"10.1109","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5804-3279","authenticated-orcid":false,"given":"Zhibo","family":"Wang","sequence":"first","affiliation":[]},{"given":"Xiaoyi","family":"Pang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0739-6338","authenticated-orcid":false,"given":"Yahong","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Huajie","family":"Shao","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8967-8525","authenticated-orcid":false,"given":"Qian","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Libing","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Honglong","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Hairong","family":"Qi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/1807085.1807106"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/49.668972"},{"key":"ref33","first-page":"1","article-title":"Privacy-preserving online task assignment in spatial crowdsourcing with untrusted server","author":"to","year":"2018","journal-title":"Proc IEEE 34th Int Conf Data Eng"},{"key":"ref32","first-page":"2399","article-title":"Efficient algorithms for k-anonymous location privacy in participatory sensing","author":"vu","year":"2012","journal-title":"Proc IEEE InfoCom"},{"key":"ref31","first-page":"613","article-title":"Privacy assurance in mobile sensing networks: Go beyond trusted servers","author":"hu","year":"2010","journal-title":"Proc IEEE 8th Int Conf Pervasive Comput Commun Workshops"},{"key":"ref30","first-page":"1","article-title":"Privacy preserving big histogram aggregation for spatial crowdsensing","author":"wang","year":"2015","journal-title":"Proc IEEE 34th Int Perform Comput Commun Conf"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/1559845.1559850"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2013.96"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2018.00066"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2017.12.010"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1989323.1989348"},{"key":"ref40","year":"2015"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-013-0309-y"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.14778\/1920841.1920970"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.14778\/2732977.2732989"},{"key":"ref14","first-page":"591","article-title":"Real-time and spatio-temporal crowd-sourced social network data publishing with differential privacy","volume":"15","author":"wang","year":"2018","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/Med-Hoc-Net.2011.5970495"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2002.1004361"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1807167.1807247"},{"key":"ref18","first-page":"193","article-title":"Privacy-preserving aggregation of time-series data","author":"shi","year":"2011","journal-title":"Proc Australasian Conf Inf Security Privacy"},{"key":"ref19","year":"0"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/1460412.1460440"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12654-3_18"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623361"},{"key":"ref3","first-page":"529","article-title":"Air quality monitoring with sensormap","author":"v\u00f6lgyesi","year":"2008","journal-title":"Proc Int Conf Inf Process Sensor Netw"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2012.2204051"},{"key":"ref29","first-page":"140","article-title":"Participant-density-aware privacy-preserving aggregate statistics for mobile crowd-sensing","author":"chen","year":"2015","journal-title":"Proc IEEE 21st Int Conf Parallel Distrib Syst"},{"key":"ref5","first-page":"1130","article-title":"Location-based recommendation system using bayesian users preference model in mobile devices","author":"park","year":"2007","journal-title":"Proc IEEE 4th Int Conf Ubiquitous Intell Comput"},{"key":"ref8","first-page":"1","article-title":"Differential privacy","author":"dwork","year":"2006","journal-title":"Proc 33rd Int Conf Automata Languages Program"},{"key":"ref7","article-title":"Unique in the crowd: The privacy bounds of human mobility","volume":"3","author":"de montjoye","year":"2013","journal-title":"Reports Science"},{"key":"ref2","year":"2018"},{"key":"ref9","first-page":"265","article-title":"Calibrating noise to sensitivity in private data analysis","author":"dwork","year":"2006","journal-title":"Proc Conf Theory of Cryptography"},{"key":"ref1","year":"2018"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.14778\/2732951.2732966"},{"key":"ref22","first-page":"137","article-title":"Hiding routing information","author":"goldschlag","year":"1996","journal-title":"Proc Int Workshop Inf Hiding"},{"key":"ref21","first-page":"1","article-title":"Distributed data aggregation with privacy preservation at endpoint","author":"shahani","year":"2017","journal-title":"Proc IEEE Int Conf on Management of Data"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICBK.2017.34"},{"key":"ref41","year":"2015"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1645953.1646146"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2012.16"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2011.26"}],"container-title":["IEEE Transactions on Mobile Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7755\/8706558\/08423660.pdf?arnumber=8423660","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T21:13:21Z","timestamp":1657746801000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8423660\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6,1]]},"references-count":41,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/tmc.2018.2861765","relation":{},"ISSN":["1536-1233","1558-0660","2161-9875"],"issn-type":[{"value":"1536-1233","type":"print"},{"value":"1558-0660","type":"electronic"},{"value":"2161-9875","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,6,1]]}}}