{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T03:20:22Z","timestamp":1774495222374,"version":"3.50.1"},"reference-count":28,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2022,4,12]],"date-time":"2022-04-12T00:00:00Z","timestamp":1649721600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key R&D Program of China","doi-asserted-by":"crossref","award":["2017YFC0704200"],"award-info":[{"award-number":["2017YFC0704200"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61872053, 61572413, and U1636205"],"award-info":[{"award-number":["61872053, 61572413, and U1636205"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Research Grants Council, Hong Kong SAR, China","award":["15238116, 15222118, 15218919, and C1008-16G"],"award-info":[{"award-number":["15238116, 15222118, 15218919, and C1008-16G"]}]},{"name":"Open Project of the State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences","award":["2020-ZD-04"],"award-info":[{"award-number":["2020-ZD-04"]}]},{"name":"Key-Area Research and Development Program of Guangdong Province","award":["2019B010136001"],"award-info":[{"award-number":["2019B010136001"]}]},{"DOI":"10.13039\/501100012245","name":"Science and Technology Planning Project of Guangdong Province","doi-asserted-by":"crossref","award":["LZC0023"],"award-info":[{"award-number":["LZC0023"]}],"id":[{"id":"10.13039\/501100012245","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Intell. Syst. Technol."],"published-print":{"date-parts":[[2022,6,30]]},"abstract":"<jats:p>With the proliferation of location-aware devices, trajectory data have been used widely in real-life applications. However, trajectory data are often associated with sensitive labels, such as users\u2019 purchase transactions and planned activities. As such, inappropriate sharing or publishing of these data could threaten users\u2019 privacy, especially when an adversary has sufficient background knowledge about a trajectory through other data sources, such as social media (check-in tags). Though differential privacy has been used to address the privacy of trajectory data, no existing method can protect the privacy of both trajectory data and sensitive labels. In this article, we propose a comprehensive trajectory publishing algorithm with three effective procedures. First, we apply density-based clustering to determine hotspots and outliers and then blur their locations by generalization. Second, we propose a graph-based model to efficiently capture the relationship among sensitive labels and trajectory points in all records and leverage Laplace noise to achieve differential privacy. Finally, we generate and publish trajectories by traversing and updating this graph until we travel all vertexes. Our experiments on synthetic and real-life datasets demonstrate that our algorithm effectively protects the privacy of both sensitive labels and location data in trajectory publication. Compared with existing works on trajectory publishing, our algorithm can also achieve higher data utility.<\/jats:p>","DOI":"10.1145\/3474839","type":"journal-article","created":{"date-parts":[[2022,4,12]],"date-time":"2022-04-12T09:31:42Z","timestamp":1649755902000},"page":"1-21","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":26,"title":["Privacy Preservation for Trajectory Publication Based on Differential Privacy"],"prefix":"10.1145","volume":"13","author":[{"given":"Lin","family":"Yao","sequence":"first","affiliation":[{"name":"International School of Information Science &amp; Engineering, Dalian University of Technology, China, and Peng Cheng Laboratory, Cyberspace Security Research Center, Shenzhen, Guangdong, China"}]},{"given":"Zhenyu","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Software, Dalian University of Technology, Dalian, Liaoning, China"}]},{"given":"Haibo","family":"Hu","sequence":"additional","affiliation":[{"name":"Department of Electronic and Information Engineering, The Hong Kong Polytechnic University, Hong Kong, China"}]},{"given":"Guowei","family":"Wu","sequence":"additional","affiliation":[{"name":"School of Software, Dalian University of Technology, Dalian, Liaoning, China"}]},{"given":"Bin","family":"Wu","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2022,4,12]]},"reference":[{"key":"e_1_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2008.4497446"},{"key":"e_1_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1145\/2830834.2830835"},{"key":"e_1_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382263"},{"key":"e_1_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2011.07.035"},{"key":"e_1_3_1_6_2","unstructured":"Rui Chen Benjamin C. M. Fung and Bipin C. Desai. 2011. Differentially private trajectory data publication. arxiv:1112.2020 [cs.DB]"},{"key":"e_1_3_1_7_2","first-page":"1","volume-title":"International Colloquium on Automata, Languages, and Programming","author":"Dwork Cynthia","year":"2006","unstructured":"Cynthia Dwork. 2006. Differential privacy. In International Colloquium on Automata, Languages, and Programming (Venice, Italy). Springer-Verlag, Berlin, 1\u201312."},{"key":"e_1_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.5555\/1791834.1791836"},{"key":"e_1_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1145\/1401890.1401926"},{"key":"e_1_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.trc.2013.12.003"},{"key":"e_1_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2015.7218422"},{"key":"e_1_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1145\/2484838.2484846"},{"key":"e_1_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1038\/sdata.2016.35"},{"key":"e_1_3_1_14_2","first-page":"232","volume-title":"Applications of Digital Information and Web Technologies","author":"Khan Kamran","year":"2014","unstructured":"Kamran Khan, Saif Ur Rehman, Kamran Aziz, Simon Fong, and S. Sarasvady. 2014. DBSCAN: Past, present and future. In Applications of Digital Information and Web Technologies (Chennai, India). IEEE, 232\u2013238."},{"key":"e_1_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2015.11.007"},{"key":"e_1_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24861-0_22"},{"key":"e_1_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2017.03.015"},{"key":"e_1_3_1_18_2","first-page":"231","volume-title":"Database Systems for Advanced Applications","author":"Lv Zhongjian","year":"2017","unstructured":"Zhongjian Lv, Jiajie Xu, Pengpeng Zhao, Guanfeng Liu, Lei Zhao, and Xiaofang Zhou. 2017. Outlier trajectory detection: A trajectory analytics based approach. In Database Systems for Advanced Applications, Sel\u00e7uk Candan, Lei Chen, Torben Bach Pedersen, Lijun Chang, and Wen Hua (Eds.) (Suzhou, China). Springer International Publishing, Cham, 231\u2013246."},{"issue":"10","key":"e_1_3_1_19_2","first-page":"2437\u2013 2456","article-title":"An overview on trajectory outlier detection","volume":"52","author":"Meng Fanrong","year":"2018","unstructured":"Fanrong Meng, Guan Yuan, Shaoqian Lv, Zhixiao Wang, and Shixiong Xia. 2018. An overview on trajectory outlier detection. Artificial Intelligence Review 52, 10 (2018), 2437\u2013 2456.","journal-title":"Artificial Intelligence Review"},{"key":"e_1_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-018-9619-1"},{"key":"e_1_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2853105"},{"key":"e_1_3_1_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/MDM.2008.29"},{"key":"e_1_3_1_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2016.2599873"},{"key":"e_1_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.02.002"},{"key":"e_1_3_1_25_2","first-page":"1","article-title":"Sensitive attribute privacy preservation of trajectory data publishing based on l-diversity","author":"Yao Lin","year":"2020","unstructured":"Lin Yao, Zhenyu Chen, Haibo Hu, Guowei Wu, and Bin Wu. 2020. Sensitive attribute privacy preservation of trajectory data publishing based on l-diversity. Distributed and Parallel Databases (2020), 1\u201327. Issue Special.","journal-title":"Distributed and Parallel Databases"},{"key":"e_1_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/MDM.2019.00-61"},{"key":"e_1_3_1_27_2","doi-asserted-by":"publisher","DOI":"10.1145\/2020408.2020462"},{"key":"e_1_3_1_28_2","doi-asserted-by":"publisher","DOI":"10.1145\/1869790.1869807"},{"key":"e_1_3_1_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2014.2314119"}],"container-title":["ACM Transactions on Intelligent Systems and Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3474839","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3474839","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:28:44Z","timestamp":1750195724000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3474839"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,12]]},"references-count":28,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2022,6,30]]}},"alternative-id":["10.1145\/3474839"],"URL":"https:\/\/doi.org\/10.1145\/3474839","relation":{},"ISSN":["2157-6904","2157-6912"],"issn-type":[{"value":"2157-6904","type":"print"},{"value":"2157-6912","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,4,12]]},"assertion":[{"value":"2020-12-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-07-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-04-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}