{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T16:31:51Z","timestamp":1776184311756,"version":"3.50.1"},"reference-count":148,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2021,1,2]],"date-time":"2021-01-02T00:00:00Z","timestamp":1609545600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61872416, 61772184, 61732017, 61502162, 61572219, 61702175, and 61902060"],"award-info":[{"award-number":["61872416, 61772184, 61732017, 61502162, 61572219, 61702175, and 61902060"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Hunan Natural Science Foundation of China","award":["2018JJ2059"],"award-info":[{"award-number":["2018JJ2059"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Comput. Surv."],"published-print":{"date-parts":[[2022,1,31]]},"abstract":"<jats:p>Location-based services (LBSs) provide enhanced functionality and convenience of ubiquitous computing, but they open up new vulnerabilities that can be utilized to violate the users\u2019 privacy. The leakage of private location data in the LBS context has drawn significant attention from academics and industry due to its importance, leading to numerous research efforts aiming to confront the related challenges. However, to the best of our knowledge, none of relevant studies have performed a qualitative and quantitative comparison and analysis of the complex topic of designing countermeasures and discussed the viability of their use with different kinds of services and the potential elements that could be deployed to meet new challenges. Accordingly, the purpose of this survey is to examine the privacy-preserving techniques in LBSs. We categorize and provide an inside-out review of the existing techniques. Performing a retrospective analysis of several typical studies in each category, we summarize their basic principles and recent advances. Additionally, we highlight the use of privacy-preserving techniques in LBSs for enabling new research opportunities. Providing an up-to-date and comprehensive overview of existing studies, this survey may further stimulate new research efforts into this promising field.<\/jats:p>","DOI":"10.1145\/3423165","type":"journal-article","created":{"date-parts":[[2021,1,2]],"date-time":"2021-01-02T17:08:21Z","timestamp":1609607301000},"page":"1-36","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":172,"title":["Location Privacy-preserving Mechanisms in Location-based Services"],"prefix":"10.1145","volume":"54","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7372-2539","authenticated-orcid":false,"given":"Hongbo","family":"Jiang","sequence":"first","affiliation":[{"name":"Hunan University, Changsha"}]},{"given":"Jie","family":"Li","sequence":"additional","affiliation":[{"name":"Hunan University, Changsha"}]},{"given":"Ping","family":"Zhao","sequence":"additional","affiliation":[{"name":"Donghua University"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4262-5223","authenticated-orcid":false,"given":"Fanzi","family":"Zeng","sequence":"additional","affiliation":[{"name":"Hunan University, Changsha"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5645-160X","authenticated-orcid":false,"given":"Zhu","family":"Xiao","sequence":"additional","affiliation":[{"name":"Hunan University, Changsha"}]},{"given":"Arun","family":"Iyengar","sequence":"additional","affiliation":[{"name":"IBM Thomas J. Watson Research"}]}],"member":"320","published-online":{"date-parts":[[2021,1,2]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"Nathan Eddy. 2012. Location-based applications popular despite privacy concerns: ISACA. eWEEK. Retrieved from https:\/\/www.eweek.com\/mobile\/location-based-applications-popular-despite-privacy-concerns-isaca.  Nathan Eddy. 2012. Location-based applications popular despite privacy concerns: ISACA. eWEEK. Retrieved from https:\/\/www.eweek.com\/mobile\/location-based-applications-popular-despite-privacy-concerns-isaca."},{"key":"e_1_2_1_2_1","volume-title":"Proceedings of the International Conference on Mobile Systems, Applications, and Services. 197--210","author":"Amini Shahriyar"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516735"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2720195"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2008.34"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2003.1186725"},{"key":"e_1_2_1_7_1","volume-title":"Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops. 127--131","author":"Alastair"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.39"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660345"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73275-4_10"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/PCCC.2011.6108111"},{"key":"e_1_2_1_12_1","first-page":"4008","article-title":"A predictive differentially private mechanism for location privacy","volume":"1311","author":"Chatzikokolakis Konstantinos","year":"2013","journal-title":"CoRR"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2015-0023"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/358549.358563"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2018.2811481"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382263"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/11957454_23"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2020408.2020579"},{"key":"e_1_2_1_19_1","volume-title":"Proceedings of the International Symposium on Spatial and Temporal Databases. 258--275","author":"Chow Chi-Yin"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1183471.1183500"},{"key":"e_1_2_1_21_1","volume-title":"Proceedings of the IEEE Conference on Decision and Control. 4252--4272","author":"Cort\u00e9s Jorge"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2012.208"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23151"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/11428572_10"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/11787006_1"},{"key":"e_1_2_1_26_1","volume-title":"Proceedings of the ACM Symposium on Theory of Computing. 715--724","author":"Dwork Cynthia"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2011.6069719"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2619091"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2590296.2590320"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.10.017"},{"key":"e_1_2_1_31_1","volume-title":"Proceedings of the ACM International Workshop on Wireless Networking for Intelligent Transportation Systems.","author":"Freudiger Julien","year":"2007"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03168-7_13"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2005.48"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2007.1062"},{"key":"e_1_2_1_35_1","volume-title":"Proceedings of the Embedded Security in Cars Conference.","author":"Gerlach Matthias","year":"2006"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1376616.1376631"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73540-3_13"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1412734.1412739"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2017.2653102"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2693965"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1066116.1189037"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-32004-3_19"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243741"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2526060"},{"key":"e_1_2_1_45_1","volume-title":"Proceedings of the USENIX Security Symposium. 497--512","author":"Hassan Wajih Ul","year":"2018"},{"key":"e_1_2_1_46_1","volume-title":"Proceedings of the IFIP Workshop on IP and ATM Traffic Management.","author":"Hauser Christian","year":"2001"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2017.2760179"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.14778\/2809974.2809978"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECURECOMM.2005.33"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315266"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2010.62"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2017.1800127"},{"key":"e_1_2_1_53_1","volume-title":"Proceedings of the IEEE Wireless Communications and Networking Conference. 1187--1192","author":"Huang Leping","year":"2005"},{"key":"e_1_2_1_54_1","volume-title":"Proceedings of the International Workshop on Privacy Enhancing Technologies. 59--77","author":"Huang Leping","year":"2005"},{"key":"e_1_2_1_55_1","unstructured":"IETF. 2004. Geographic Location\/Privacy (GeoRriv) Working Group. Retrieved from https:\/\/www.ietf.org\/.  IETF. 2004. Geographic Location\/Privacy (GeoRriv) Working Group. Retrieved from https:\/\/www.ietf.org\/."},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2633620"},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2018.2812851"},{"key":"e_1_2_1_58_1","volume-title":"Proceedings of the ACM SIGSAC Conference on Computer and Communications Security. 1439--1441","author":"Jin Lei"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2007.190662"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40173-2_22"},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/2424321.2424354"},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.14778\/2732977.2732989"},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73540-3_14"},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.5555\/3225647.3225866"},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10707-012-0172-9"},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERSER.2005.1506394"},{"key":"e_1_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2005.269"},{"key":"e_1_2_1_68_1","unstructured":"John Leyden. 2016. Dark Net LinkedIn Sale Looks Like the Real Deal. Retrieved from https:\/\/www.theregister.co.uk\/2016\/05\/18\/linkedin\/.  John Leyden. 2016. Dark Net LinkedIn Sale Looks Like the Real Deal. Retrieved from https:\/\/www.theregister.co.uk\/2016\/05\/18\/linkedin\/."},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2974669"},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6567113"},{"key":"e_1_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/1179601.1179605"},{"key":"e_1_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2007.367856"},{"key":"e_1_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/1503402.1503414"},{"key":"e_1_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2531185"},{"key":"e_1_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2822260"},{"key":"e_1_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8056978"},{"key":"e_1_2_1_77_1","volume-title":"Proceedings of the IEEE International Conference on Computer Communications. 972--980","author":"Liu Xinxin","year":"2012"},{"key":"e_1_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/1626536.1626540"},{"key":"e_1_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2016.7524459"},{"key":"e_1_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2019.2892300"},{"key":"e_1_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2006.1"},{"key":"e_1_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.4018\/jitsa.2011070104"},{"key":"e_1_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1109\/WOWMOM.2005.60"},{"key":"e_1_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-016-4154-z"},{"key":"e_1_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2706947"},{"key":"e_1_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1145\/1614320.1614358"},{"key":"e_1_2_1_87_1","volume-title":"Proceedings of the International Conference on Very Large Data Bases. 763--774","author":"Mokbel Mohamed F."},{"key":"e_1_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.14778\/2212351.2212352"},{"key":"e_1_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848002"},{"key":"e_1_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2015.7218474"},{"key":"e_1_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2014.6883443"},{"key":"e_1_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2013.6831391"},{"key":"e_1_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2015.7069322"},{"key":"e_1_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2016.2561281"},{"key":"e_1_2_1_95_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134004"},{"key":"e_1_2_1_96_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2011.5767898"},{"key":"e_1_2_1_97_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2014.2321747"},{"key":"e_1_2_1_98_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10619-013-7128-4"},{"key":"e_1_2_1_99_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSN.2012.27"},{"key":"e_1_2_1_100_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653771.1653808"},{"key":"e_1_2_1_101_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2011.105"},{"key":"e_1_2_1_102_1","doi-asserted-by":"publisher","DOI":"10.14778\/1920841.1920920"},{"key":"e_1_2_1_103_1","unstructured":"Sarah Perez. 2016. Recently Confirmed Myspace Hack could be the Largest yet. Retrieved from https:\/\/techcrunch.com\/2016\/05\/31\/recently-confirmed-myspace-hack-could-be-the-largest-yet\/.  Sarah Perez. 2016. Recently Confirmed Myspace Hack could be the Largest yet. Retrieved from https:\/\/techcrunch.com\/2016\/05\/31\/recently-confirmed-myspace-hack-could-be-the-largest-yet\/."},{"key":"e_1_2_1_104_1","first-page":"40","volume-title":"App downloads up 15 percent","author":"Perez Sarah","year":"2016"},{"key":"e_1_2_1_105_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5934968"},{"key":"e_1_2_1_106_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2873950"},{"key":"e_1_2_1_107_1","unstructured":"Differential Privacy Team Apple. 2017. Learning with Privacy at Scale. Retrieved from https:\/\/machinelearning.apple.com\/docs\/learning-with-privacy-at-scale\/appledifferentialprivacysystem.pdf.  Differential Privacy Team Apple. 2017. Learning with Privacy at Scale. Retrieved from https:\/\/machinelearning.apple.com\/docs\/learning-with-privacy-at-scale\/appledifferentialprivacysystem.pdf."},{"key":"e_1_2_1_108_1","unstructured":"Pew Research Center. 2016. Americans Increasingly Use Smartphones for More than Voice Calls Texting. Retrieved from http:\/\/www.pewresearch.org\/fact-tank\/2016\/01\/29\/us-smartphone-use\/ft_01-27-16_smartphoneactivities_640\/.  Pew Research Center. 2016. Americans Increasingly Use Smartphones for More than Voice Calls Texting. Retrieved from http:\/\/www.pewresearch.org\/fact-tank\/2016\/01\/29\/us-smartphone-use\/ft_01-27-16_smartphoneactivities_640\/."},{"key":"e_1_2_1_109_1","unstructured":"Synopsys Inc.2017. The Heartbleed Bug. Retrieved from http:\/\/heartbleed.com\/.  Synopsys Inc.2017. The Heartbleed Bug. Retrieved from http:\/\/heartbleed.com\/."},{"key":"e_1_2_1_110_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2012.247"},{"key":"e_1_2_1_111_1","volume-title":"Technology, Software, Hardware, Service and Application Area-Global Forecast to","year":"2021"},{"key":"e_1_2_1_113_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2015.2388488"},{"key":"e_1_2_1_114_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2012.6155874"},{"key":"e_1_2_1_115_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2015-0024"},{"key":"e_1_2_1_116_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22263-4_4"},{"key":"e_1_2_1_117_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2013.57"},{"key":"e_1_2_1_118_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382261"},{"key":"e_1_2_1_119_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382262"},{"key":"e_1_2_1_120_1","doi-asserted-by":"publisher","DOI":"10.1109\/WIMOB.2010.5645011"},{"key":"e_1_2_1_121_1","doi-asserted-by":"publisher","DOI":"10.1109\/PDP.2017.79"},{"key":"e_1_2_1_122_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2925571"},{"key":"e_1_2_1_123_1","doi-asserted-by":"publisher","DOI":"10.1109\/CIT.2010.472"},{"key":"e_1_2_1_124_1","doi-asserted-by":"publisher","DOI":"10.1145\/1869790.1869846"},{"key":"e_1_2_1_125_1","doi-asserted-by":"publisher","DOI":"10.14778\/2732951.2732966"},{"key":"e_1_2_1_126_1","volume-title":"Proceedings of the IEEE International Conference on Computer Communications. 2399--2407","author":"Vu Khuong","year":"2012"},{"key":"e_1_2_1_127_1","unstructured":"W3C. 2007. Platform for Privacy Preferences (P3P) Project. Retrieved from https:\/\/www.w3.org\/P3P\/.  W3C. 2007. Platform for Privacy Preferences (P3P) Project. Retrieved from https:\/\/www.w3.org\/P3P\/."},{"key":"e_1_2_1_128_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23211"},{"key":"e_1_2_1_129_1","doi-asserted-by":"publisher","DOI":"10.1145\/3041021.3054140"},{"key":"e_1_2_1_130_1","first-page":"591","article-title":"Real-time and spatio-temporal crowd-sourced social network data publishing with differential privacy","volume":"15","author":"Wang Qian","year":"2018","journal-title":"IEEE Trans. Depend. Sec. Comput."},{"key":"e_1_2_1_131_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1701051"},{"key":"e_1_2_1_132_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195577"},{"key":"e_1_2_1_133_1","doi-asserted-by":"publisher","DOI":"10.1145\/1247480.1247556"},{"key":"e_1_2_1_134_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813640"},{"key":"e_1_2_1_135_1","doi-asserted-by":"publisher","DOI":"10.1109\/MDMW.2008.20"},{"key":"e_1_2_1_136_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.103"},{"key":"e_1_2_1_137_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653704"},{"key":"e_1_2_1_138_1","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2016.0136"},{"key":"e_1_2_1_139_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01721-6_5"},{"key":"e_1_2_1_140_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2017.2693986"},{"key":"e_1_2_1_141_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2008.4497445"},{"key":"e_1_2_1_142_1","doi-asserted-by":"publisher","DOI":"10.1109\/MDM.2007.58"},{"key":"e_1_2_1_143_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23241"},{"key":"e_1_2_1_144_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.10.022"},{"key":"e_1_2_1_145_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2791402"},{"key":"e_1_2_1_146_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2842470"},{"key":"e_1_2_1_147_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2019.2947452"},{"key":"e_1_2_1_148_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-75551-7_5"},{"key":"e_1_2_1_149_1","volume-title":"Proceedings of the IEEE Global Communications Conference. 820--825","author":"Zhu Xiaoyan"}],"container-title":["ACM Computing Surveys"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3423165","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3423165","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:24:56Z","timestamp":1750195496000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3423165"}},"subtitle":["A Comprehensive Survey"],"short-title":[],"issued":{"date-parts":[[2021,1,2]]},"references-count":148,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,1,31]]}},"alternative-id":["10.1145\/3423165"],"URL":"https:\/\/doi.org\/10.1145\/3423165","relation":{},"ISSN":["0360-0300","1557-7341"],"issn-type":[{"value":"0360-0300","type":"print"},{"value":"1557-7341","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1,2]]},"assertion":[{"value":"2020-01-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-09-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-01-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}