{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T19:12:09Z","timestamp":1772910729317,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,11,7]],"date-time":"2017-11-07T00:00:00Z","timestamp":1510012800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1649469"],"award-info":[{"award-number":["CNS-1649469"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,11,7]]},"DOI":"10.1145\/3139958.3140057","type":"proceedings-article","created":{"date-parts":[[2018,9,13]],"date-time":"2018-09-13T12:54:52Z","timestamp":1536843292000},"page":"1-4","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["LocBorg"],"prefix":"10.1145","author":[{"given":"Victor","family":"Zakhary","sequence":"first","affiliation":[{"name":"University of California, Santa Barbara, CA"}]},{"given":"Cetin","family":"Sahin","sequence":"additional","affiliation":[{"name":"University of California, Santa Barbara, CA"}]},{"given":"Theodore","family":"Georgiou","sequence":"additional","affiliation":[{"name":"University of California, Santa Barbara, CA"}]},{"given":"Amr","family":"El Abbadi","sequence":"additional","affiliation":[{"name":"University of California, Santa Barbara, CA"}]}],"member":"320","published-online":{"date-parts":[[2017,11,7]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2016. Police are increasingly using social media surveillance tools. https:\/\/techcrunch.com\/2016\/09\/23\/police-are-increasingly-using-social-media-surveillance-tools\/. (2016).  2016. Police are increasingly using social media surveillance tools. https:\/\/techcrunch.com\/2016\/09\/23\/police-are-increasingly-using-social-media-surveillance-tools\/. (2016)."},{"key":"e_1_3_2_1_2_1","unstructured":"2017. Tor Browser. https:\/\/www.torproject.org\/. (2017).  2017. Tor Browser. https:\/\/www.torproject.org\/. (2017)."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516735"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1367497.1367531"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2525314.2525323"},{"key":"e_1_3_2_1_6_1","volume-title":"Privacy, Security, Risk and Trust (PASSAT)","author":"Chandra Swarup","unstructured":"Swarup Chandra , Latifur Khan , and Fahad Bin Muhaya . 2011. Estimating twitter user location using social interactions--a content based approach . In Privacy, Security, Risk and Trust (PASSAT) . IEEE , 838--843. Swarup Chandra, Latifur Khan, and Fahad Bin Muhaya. 2011. Estimating twitter user location using social interactions--a content based approach. In Privacy, Security, Risk and Trust (PASSAT). IEEE, 838--843."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1871437.1871535"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/11428572_10"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/11787006_1"},{"key":"e_1_3_2_1_10_1","volume-title":"In Proceedings of ICS.","author":"Dwork Cynthia","year":"2010","unstructured":"Cynthia Dwork , Moni Naor , Toniann Pitassi , Guy N. Rothblum , and Sergey Yekhanin . 2010 . Pan-private streaming algorithms . In In Proceedings of ICS. Cynthia Dwork, Moni Naor, Toniann Pitassi, Guy N. Rothblum, and Sergey Yekhanin. 2010. Pan-private streaming algorithms. In In Proceedings of ICS."},{"key":"e_1_3_2_1_11_1","volume-title":"El Abbadi Amr, and Xifeng Yan","author":"Georgiou Theodore","year":"2017","unstructured":"Theodore Georgiou , El Abbadi Amr, and Xifeng Yan . 2017 . Privacy-Preserving Community-Aware Trending Topic Detection in Online Social Media. In DBSec . Theodore Georgiou, El Abbadi Amr, and Xifeng Yan. 2017. Privacy-Preserving Community-Aware Trending Topic Detection in Online Social Media. In DBSec."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998259"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2820783.2820812"},{"key":"e_1_3_2_1_14_1","volume-title":"Personalized location privacy in mobile networks: A social group utility approach. In (INFOCOM)","author":"Gong Xiaowen","unstructured":"Xiaowen Gong , Xu Chen , Kai Xing , Dong-Hoon Shin , Mengyuan Zhang , and Junshan Zhang . 2015. Personalized location privacy in mobile networks: A social group utility approach. In (INFOCOM) . IEEE , 1008--1016. Xiaowen Gong, Xu Chen, Kai Xing, Dong-Hoon Shin, Mengyuan Zhang, and Junshan Zhang. 2015. Personalized location privacy in mobile networks: A social group utility approach. In (INFOCOM). IEEE, 1008--1016."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2012.120"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2071880.2071884"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2005.269"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1218772110"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"N. Li T. Li and S. Venkatasubramanian. 2007. t-Closeness: Privacy Beyond k-Anonymity and l-Diversity. In IEEE ICDE. 106--115.  N. Li T. Li and S. Venkatasubramanian. 2007. t-Closeness: Privacy Beyond k-Anonymity and l-Diversity. In IEEE ICDE. 106--115.","DOI":"10.1109\/ICDE.2007.367856"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2008.4497436"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1217299.1217302"},{"key":"e_1_3_2_1_22_1","volume-title":"Proc. of VLDB. 763--774","author":"Mokbel Mohamed F","year":"2006","unstructured":"Mohamed F Mokbel , Chi-Yin Chow , and Walid G Aref . 2006 . The new casper: Query processing for location services without compromising privacy . In Proc. of VLDB. 763--774 . Mohamed F Mokbel, Chi-Yin Chow, and Walid G Aref. 2006. The new casper: Query processing for location services without compromising privacy. In Proc. of VLDB. 763--774."},{"key":"e_1_3_2_1_23_1","first-page":"265","article-title":"You are what you Tweet: Analyzing Twitter for public health","volume":"20","author":"Paul Michael J","year":"2011","unstructured":"Michael J Paul and Mark Dredze . 2011 . You are what you Tweet: Analyzing Twitter for public health . Icwsm 20 (2011), 265 -- 272 . Michael J Paul and Mark Dredze. 2011. You are what you Tweet: Analyzing Twitter for public health. Icwsm 20 (2011), 265--272.","journal-title":"Icwsm"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/69.971193"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1620545.1620550"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1142\/S021848850200165X"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01721-6_5"},{"key":"e_1_3_2_1_29_1","first-page":"266","article-title":"Privometer: Privacy protection in social networks","volume":"00","author":"Yakout Mohamed","year":"2010","unstructured":"Mohamed Yakout , Mourad Ouzzani , Hazem Elmeleegy , Nilothpal Talukder , and Ahmed K. Elmagarmid . 2010 . Privometer: Privacy protection in social networks . IEEE ICDEW 00 (2010), 266 -- 269 . Mohamed Yakout, Mourad Ouzzani, Hazem Elmeleegy, Nilothpal Talukder, and Ahmed K. Elmagarmid. 2010. Privometer: Privacy protection in social networks. IEEE ICDEW 00 (2010), 266--269.","journal-title":"IEEE ICDEW"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526781"}],"event":{"name":"SIGSPATIAL'17: 25th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems","location":"Redondo Beach CA USA","acronym":"SIGSPATIAL'17","sponsor":["SIGSPATIAL ACM Special Interest Group on Spatial Information"]},"container-title":["Proceedings of the 25th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3139958.3140057","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3139958.3140057","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3139958.3140057","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:14:02Z","timestamp":1750212842000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3139958.3140057"}},"subtitle":["Hiding Social Media User Location while Maintaining Online Persona"],"short-title":[],"issued":{"date-parts":[[2017,11,7]]},"references-count":30,"alternative-id":["10.1145\/3139958.3140057","10.1145\/3139958"],"URL":"https:\/\/doi.org\/10.1145\/3139958.3140057","relation":{},"subject":[],"published":{"date-parts":[[2017,11,7]]},"assertion":[{"value":"2017-11-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}