{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T14:05:35Z","timestamp":1774533935642,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,10,22]],"date-time":"2021-10-22T00:00:00Z","timestamp":1634860800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100002855","name":"Ministry of Science and Technology of the People's Republic of China","doi-asserted-by":"publisher","award":["2018YFC0407105"],"award-info":[{"award-number":["2018YFC0407105"]}],"id":[{"id":"10.13039\/501100002855","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,10,22]]},"DOI":"10.1145\/3494885.3494890","type":"proceedings-article","created":{"date-parts":[[2021,12,21]],"date-time":"2021-12-21T01:53:51Z","timestamp":1640051631000},"page":"25-30","source":"Crossref","is-referenced-by-count":2,"title":["Location Privacy Protection Method based on Variable-Order Markov Prediction Model"],"prefix":"10.1145","author":[{"given":"Simin","family":"Zhu","sequence":"first","affiliation":[{"name":"College of Computer Science and Technology, Hohai University, China"}]},{"given":"Xin","family":"Lv","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Hohai University, China"}]},{"given":"Lin","family":"Yu","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Hohai University, China"}]}],"member":"320","published-online":{"date-parts":[[2021,12,20]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2003.1186725"},{"key":"e_1_3_2_1_2_1","first-page":"124","article-title":"Research progress on location privacy-preserving techniques","volume":"37","author":"Wan Sheng","year":"2016","unstructured":"Sheng Wan , Fenghua Li , Ben Niu , Zhe Sun , and Hui Li . 2016 . Research progress on location privacy-preserving techniques . Journal on Communications 37 , 12 (2016), 124 - 141 . https:\/\/doi.org\/10.11959\/j.issn.1000-436x.2016279 Sheng Wan, Fenghua Li, Ben Niu, Zhe Sun, and Hui Li. 2016. Research progress on location privacy-preserving techniques. Journal on Communications 37, 12 (2016), 124-141. https:\/\/doi.org\/10.11959\/j.issn.1000-436x.2016279","journal-title":"Journal on Communications"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/568271.223813"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2012.6155874"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/1182635.1164193"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICTC.2018.8539593"},{"key":"e_1_3_2_1_7_1","first-page":"3328","article-title":"A solution to privacy preservation in publishing human trajectories","volume":"14","author":"Li Xianming","year":"2020","unstructured":"Xianming Li , Guangzhou Sun . 2020 . A solution to privacy preservation in publishing human trajectories . KSII Transactions on Internet and Information Systems (TIIS) 14 , 8 (2020), 3328 - 3349 . https:\/\/doi.org\/10.3837\/tiis.2020.08.010 Xianming Li, Guangzhou Sun. 2020. A solution to privacy preservation in publishing human trajectories. KSII Transactions on Internet and Information Systems (TIIS) 14, 8 (2020), 3328-3349. https:\/\/doi.org\/10.3837\/tiis.2020.08.010","journal-title":"KSII Transactions on Internet and Information Systems (TIIS)"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10707-008-0047-2"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2016.2520473"},{"key":"e_1_3_2_1_10_1","first-page":"76","article-title":"CP-ABE based users collaborative privacy protection scheme for continuous query","volume":"38","author":"Zhang Lei","year":"2017","unstructured":"Lei Zhang , Chunguang Ma , Songtao Yang , and Zengpeng Li . 2017 , CP-ABE based users collaborative privacy protection scheme for continuous query . Journal on Communications 38 , 9 (2017), 76 - 85 . https:\/\/doi.org\/10.11959\/j.issn.1000-436x.2017184 Lei Zhang, Chunguang Ma, Songtao Yang, and Zengpeng Li. 2017, CP-ABE based users collaborative privacy protection scheme for continuous query. Journal on Communications 38, 9 (2017), 76-85. https:\/\/doi.org\/10.11959\/j.issn.1000-436x.2017184","journal-title":"Journal on Communications"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2015.11.007"},{"key":"e_1_3_2_1_12_1","first-page":"83","article-title":"Attribute generalization mix-zone based on multiple secure computing","volume":"40","author":"Wang Bin","year":"2019","unstructured":"Bin Wang , Lei Zhang , and Guoyin Zhang . 2019 . Attribute generalization mix-zone based on multiple secure computing . Journal on Communications 40 , 4 (2019), 83 - 94 . https:\/\/doi.org\/10.11959\/j.issn.1000-436x.2019077 Bin Wang, Lei Zhang, and Guoyin Zhang. 2019. Attribute generalization mix-zone based on multiple secure computing. Journal on Communications 40, 4 (2019), 83-94. https:\/\/doi.org\/10.11959\/j.issn.1000-436x.2019077","journal-title":"Journal on Communications"},{"key":"e_1_3_2_1_13_1","first-page":"1529","article-title":"Research on k-anonymous privacy protection scheme based on bilinear pairing","volume":"36","author":"Song Cheng","year":"2019","unstructured":"Cheng Song , Yadong Zhang , Weiping Peng , and Xixi Yan . 2019 . Research on k-anonymous privacy protection scheme based on bilinear pairing . Application Research of Computers 36 , 5 (2019), 1529 - 1532 . https:\/\/doi.org\/10.19734\/j.issn.1001-3695.2017.11.0756 Cheng Song, Yadong Zhang, Weiping Peng, and Xixi Yan. 2019. Research on k-anonymous privacy protection scheme based on bilinear pairing. Application Research of Computers 36, 5 (2019), 1529-1532. https:\/\/doi.org\/10.19734\/j.issn.1001-3695.2017.11.0756","journal-title":"Application Research of Computers"},{"key":"e_1_3_2_1_14_1","first-page":"942","article-title":"Distributed k-anonymity location privacy protection scheme based on blockchain","volume":"42","author":"Liu Hai","year":"2019","unstructured":"Hai Liu , Xinghua Li , Bin Luo , Yunwei Wang , Yanbing Ren , Jianfeng Ma , and Hongfa Ding . 2019 . Distributed k-anonymity location privacy protection scheme based on blockchain . Chinese Journal of Computers 42 , 5 (2019), 942 - 960 . https:\/\/doi.org\/10.11897\/SP.J.1016.2019.00942 Hai Liu, Xinghua Li, Bin Luo, Yunwei Wang, Yanbing Ren, Jianfeng Ma, and Hongfa Ding. 2019. Distributed k-anonymity location privacy protection scheme based on blockchain. Chinese Journal of Computers 42, 5 (2019), 942-960. https:\/\/doi.org\/10.11897\/SP.J.1016.2019.00942","journal-title":"Chinese Journal of Computers"},{"key":"e_1_3_2_1_15_1","first-page":"2437","article-title":"Two-level cache location privacy protection scheme based on user grid[J]","volume":"37","author":"Li Shuquan","year":"2020","unstructured":"Shuquan Li , Rui Li , Dayong Zhu , Chao Xiong , and Lei Liu . 2020 . Two-level cache location privacy protection scheme based on user grid[J] . Application Research of Computers 37 , 8 (2020), 2437 - 2441 , 2445. https:\/\/doi.org\/10.19734\/j.issn.1001-3695.2019.02.0074 Shuquan Li, Rui Li, Dayong Zhu, Chao Xiong, and Lei Liu. 2020. Two-level cache location privacy protection scheme based on user grid[J]. Application Research of Computers 37, 8 (2020), 2437-2441, 2445. https:\/\/doi.org\/10.19734\/j.issn.1001-3695.2019.02.0074","journal-title":"Application Research of Computers"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2016.08.010"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.05.054"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2013.55"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.10.053"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1281192.1281230"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1015231126594"}],"event":{"name":"CSSE 2021: 2021 4th International Conference on Computer Science and Software Engineering","location":"Singapore Singapore","acronym":"CSSE 2021"},"container-title":["2021 4th International Conference on Computer Science and Software Engineering (CSSE 2021)"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3494885.3494890","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3494885.3494890","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:31:18Z","timestamp":1750188678000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3494885.3494890"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,22]]},"references-count":21,"alternative-id":["10.1145\/3494885.3494890","10.1145\/3494885"],"URL":"https:\/\/doi.org\/10.1145\/3494885.3494890","relation":{},"subject":[],"published":{"date-parts":[[2021,10,22]]}}}