{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T08:18:26Z","timestamp":1774945106840,"version":"3.50.1"},"reference-count":41,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2019,3,1]],"date-time":"2019-03-01T00:00:00Z","timestamp":1551398400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,3,1]],"date-time":"2019-03-01T00:00:00Z","timestamp":1551398400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,3,1]],"date-time":"2019-03-01T00:00:00Z","timestamp":1551398400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Basic Research Program of China","doi-asserted-by":"crossref","award":["2013CB329105"],"award-info":[{"award-number":["2013CB329105"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61301080"],"award-info":[{"award-number":["61301080"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["91338203"],"award-info":[{"award-number":["91338203"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["91338102"],"award-info":[{"award-number":["91338102"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61321061"],"award-info":[{"award-number":["61321061"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004147","name":"Tsinghua University","doi-asserted-by":"publisher","award":["MCM20160104"],"award-info":[{"award-number":["MCM20160104"]}],"id":[{"id":"10.13039\/501100004147","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Serv. Manage."],"published-print":{"date-parts":[[2019,3]]},"DOI":"10.1109\/tnsm.2018.2877790","type":"journal-article","created":{"date-parts":[[2018,10,24]],"date-time":"2018-10-24T18:54:27Z","timestamp":1540407267000},"page":"264-278","source":"Crossref","is-referenced-by-count":94,"title":["Protecting Trajectory From Semantic Attack Considering ${k}$ -Anonymity, ${l}$ -Diversity, and ${t}$ -Closeness"],"prefix":"10.1109","volume":"16","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5431-6842","authenticated-orcid":false,"given":"Zhen","family":"Tu","sequence":"first","affiliation":[]},{"given":"Kai","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Fengli","family":"Xu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5617-1659","authenticated-orcid":false,"given":"Yong","family":"Li","sequence":"additional","affiliation":[]},{"given":"Li","family":"Su","sequence":"additional","affiliation":[]},{"given":"Depeng","family":"Jin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/IWQoS.2016.7590444"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052620"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/1066116.1189037"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.14778\/1687627.1687717"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2017.132"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813640"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/2020408.2020602"},{"key":"ref36","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1007\/978-3-642-01721-6_5","article-title":"Location diversity: Enhanced privacy protection in location based services","author":"xue","year":"2009","journal-title":"International Symposium on Location and Context Awareness"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/1367497.1367531"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2003.1186725"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/IWQoS.2017.7969154"},{"key":"ref11","first-page":"58","article-title":"The livehoods project: Utilizing social media to understand the dynamics of a city","author":"cranshaw","year":"2012","journal-title":"Proc 6th AAAI Int Conf on Weblogs and Social Media"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2133806.2133826"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8056979"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2396761.2398683"},{"key":"ref15","article-title":"Smartphone app usage prediction using points of interest","volume":"1","author":"yu","year":"2017","journal-title":"Proc ACM Interact Mob Wearable Ubiquitous Technol"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1217299.1217302"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2007.367856"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557079"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1007\/11552338_13","article-title":"Protecting privacy against location-based personal identification","author":"bettini","year":"2005","journal-title":"Proc VDLB Int Conf Secure Data Manag"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623361"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2815675.2815681"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382263"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2971648.2971673"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2030613.2030630"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516735"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"1376","DOI":"10.1038\/srep01376","article-title":"Unique in the crowd: The privacy bounds of human mobility","volume":"3","author":"de montjoye","year":"2013","journal-title":"Sci Rep"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2716281.2836111"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2008.4497446"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"15274","DOI":"10.1073\/pnas.0900282106","article-title":"Inferring friendship network structure by using mobile phone data","volume":"106","author":"eagle","year":"2009","journal-title":"Proc Nat Acad Sci USA"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2010.05.003"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MDM.2009.50"},{"key":"ref20","first-page":"225","article-title":"Dijkstra&#x2019;s algorithm","author":"skiena","year":"1990","journal-title":"Implementing Discrete Mathematics Combinatorics and Graph Theory with Mathematica"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2577036"},{"key":"ref21","first-page":"265","article-title":"Calibrating noise to sensitivity in private data analysis","author":"dwork","year":"2006","journal-title":"Proc Theory Cryptography Conf"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2017.7997113"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2017.7964921"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1749603.1749605"},{"key":"ref26","article-title":"Differentially private trajectory data publication","author":"chen","year":"2011","journal-title":"Computer Science"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2017.2697856"}],"container-title":["IEEE Transactions on Network and Service Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4275028\/8664201\/08506438.pdf?arnumber=8506438","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T20:52:44Z","timestamp":1657745564000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8506438\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3]]},"references-count":41,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tnsm.2018.2877790","relation":{},"ISSN":["1932-4537","2373-7379"],"issn-type":[{"value":"1932-4537","type":"electronic"},{"value":"2373-7379","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,3]]}}}