{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:24:18Z","timestamp":1761402258813,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,10,26]],"date-time":"2022-10-26T00:00:00Z","timestamp":1666742400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"iMOVE CRC","award":["5-028"],"award-info":[{"award-number":["5-028"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,10,26]]},"DOI":"10.1145\/3545948.3545982","type":"proceedings-article","created":{"date-parts":[[2022,10,17]],"date-time":"2022-10-17T11:21:49Z","timestamp":1666005709000},"page":"160-170","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["New Cloaking Region Obfuscation for Road Network-Indistinguishability and Location Privacy"],"prefix":"10.1145","author":[{"given":"Baihe","family":"Ma","sequence":"first","affiliation":[{"name":"University of Technology Sydney, Australia"}]},{"given":"Xiaojie","family":"Lin","sequence":"additional","affiliation":[{"name":"University of Technology Sydney, Australia"}]},{"given":"Xu","family":"Wang","sequence":"additional","affiliation":[{"name":"University of Technology Sydney, Australia"}]},{"given":"Bin","family":"Liu","sequence":"additional","affiliation":[{"name":"University of Technology Sydney, Australia"}]},{"given":"Ying","family":"He","sequence":"additional","affiliation":[{"name":"University of Technology Sydney, Australia"}]},{"given":"Wei","family":"Ni","sequence":"additional","affiliation":[{"name":"CSIRO, Australia"}]},{"given":"Ren Ping","family":"Liu","sequence":"additional","affiliation":[{"name":"University of Technology Sydney, Australia"}]}],"member":"320","published-online":{"date-parts":[[2022,10,26]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/3287990.3288056"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516735"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-4469-4"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2820039"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102310"},{"key":"e_1_3_2_1_6_1","volume-title":"Preserving privacy in the internet of connected vehicles","author":"Ghane Soheila","year":"2020","unstructured":"Soheila Ghane , Alireza Jolfaei , Lars Kulik , Kotagiri Ramamohanarao , and Deepak Puthal . 2020. Preserving privacy in the internet of connected vehicles . IEEE Trans. Intell. Transp. Syst .( 2020 ). Soheila Ghane, Alireza Jolfaei, Lars Kulik, Kotagiri Ramamohanarao, and Deepak Puthal. 2020. Preserving privacy in the internet of connected vehicles. IEEE Trans. Intell. Transp. Syst.(2020)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2022.3141744"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2779402"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3423165","article-title":"Location privacy-preserving mechanisms in location-based services: A comprehensive survey","volume":"54","author":"Jiang Hongbo","year":"2021","unstructured":"Hongbo Jiang , Jie Li , Ping Zhao , Fanzi Zeng , Zhu Xiao , and Arun Iyengar . 2021 . Location privacy-preserving mechanisms in location-based services: A comprehensive survey . ACM Computing Surveys (CSUR) 54 , 1 (2021), 1 \u2013 36 . Hongbo Jiang, Jie Li, Ping Zhao, Fanzi Zeng, Zhu Xiao, and Arun Iyengar. 2021. Location privacy-preserving mechanisms in location-based services: A comprehensive survey. ACM Computing Surveys (CSUR) 54, 1 (2021), 1\u201336.","journal-title":"ACM Computing Surveys (CSUR)"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3052978"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102807"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2928205"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.3390\/fi13040096"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Jong\u00a0Wook Kim Kennedy Edemacu and Beakcheol Jang. 2022. Privacy-preserving mechanisms for location privacy in mobile crowdsensing: A survey. J. Netw. Comput. Appl.(2022) 103315.  Jong\u00a0Wook Kim Kennedy Edemacu and Beakcheol Jang. 2022. Privacy-preserving mechanisms for location privacy in mobile crowdsensing: A survey. J. Netw. Comput. Appl.(2022) 103315.","DOI":"10.1016\/j.jnca.2021.103315"},{"key":"e_1_3_2_1_15_1","unstructured":"Fragkiskos Koufogiannis Shuo Han and George\u00a0J Pappas. 2015. Optimality of the laplace mechanism in differential privacy. arXiv preprint arXiv:1504.00065(2015).  Fragkiskos Koufogiannis Shuo Han and George\u00a0J Pappas. 2015. Optimality of the laplace mechanism in differential privacy. arXiv preprint arXiv:1504.00065(2015)."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2859344"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/VTCSpring.2019.8746396"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3001381"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2957744"},{"key":"e_1_3_2_1_20_1","volume-title":"International Conference on Networked Systems. Springer, 11\u201327","author":"Meuser Tobias","year":"2020","unstructured":"Tobias Meuser , Oluwasegun\u00a0Taiwo Ojo , Daniel Bischoff , Antonio\u00a0Fern\u00e1ndez Anta , Ioannis Stavrakakis , and Ralf Steinmetz . 2020 . Hide me: Enabling location privacy in heterogeneous vehicular networks . In International Conference on Networked Systems. Springer, 11\u201327 . Tobias Meuser, Oluwasegun\u00a0Taiwo Ojo, Daniel Bischoff, Antonio\u00a0Fern\u00e1ndez Anta, Ioannis Stavrakakis, and Ralf Steinmetz. 2020. Hide me: Enabling location privacy in heterogeneous vehicular networks. In International Conference on Networked Systems. Springer, 11\u201327."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00068"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2019.00038"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2018.8622184"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2020.3037911"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/5129620"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3853"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-22479-0_8"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-017-0352-x"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2975925"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2988575"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813640"},{"key":"e_1_3_2_1_32_1","first-page":"1","article-title":"A trusted de-swinging k-anonymity scheme for location privacy protection","volume":"11","author":"Yang Manxiang","year":"2022","unstructured":"Manxiang Yang , Baopeng Ye , Yuling Chen , Tao Li , Yixian Yang , Xiaobin Qian , and Xiaomei Yu . 2022 . A trusted de-swinging k-anonymity scheme for location privacy protection . Journal of Cloud Computing 11 , 1 (2022), 1 \u2013 15 . Manxiang Yang, Baopeng Ye, Yuling Chen, Tao Li, Yixian Yang, Xiaobin Qian, and Xiaomei Yu. 2022. A trusted de-swinging k-anonymity scheme for location privacy protection. Journal of Cloud Computing 11, 1 (2022), 1\u201315.","journal-title":"Journal of Cloud Computing"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00018"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2020408.2020462"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3037194"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2944034"}],"event":{"name":"RAID 2022: 25th International Symposium on Research in Attacks, Intrusions and Defenses","acronym":"RAID 2022","location":"Limassol Cyprus"},"container-title":["Proceedings of the 25th International Symposium on Research in Attacks, Intrusions and Defenses"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3545948.3545982","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3545948.3545982","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:17Z","timestamp":1750188617000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3545948.3545982"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,26]]},"references-count":36,"alternative-id":["10.1145\/3545948.3545982","10.1145\/3545948"],"URL":"https:\/\/doi.org\/10.1145\/3545948.3545982","relation":{},"subject":[],"published":{"date-parts":[[2022,10,26]]},"assertion":[{"value":"2022-10-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}