{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:14:20Z","timestamp":1750220060512,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,4,24]],"date-time":"2023-04-24T00:00:00Z","timestamp":1682294400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Portugal 2020","award":["POCI-01-0247-FEDER-047264"],"award-info":[{"award-number":["POCI-01-0247-FEDER-047264"]}]},{"name":"COMPETE 2020"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,4,24]]},"DOI":"10.1145\/3577923.3583644","type":"proceedings-article","created":{"date-parts":[[2023,4,20]],"date-time":"2023-04-20T10:57:59Z","timestamp":1681988279000},"page":"141-152","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Velocity-Aware Geo-Indistinguishability"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2077-7223","authenticated-orcid":false,"given":"Ricardo","family":"Mendes","sequence":"first","affiliation":[{"name":"CISUC and Department of Informatics Engineering, University of Coimbra, Coimbra, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8920-8128","authenticated-orcid":false,"given":"Mariana","family":"Cunha","sequence":"additional","affiliation":[{"name":"CISUC, CRACS\/INESCTEC, and Departamento de Ci\u00eancia de Computadores, Faculdade de Ci\u00eancias, Universidade do Porto, Porto, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5805-1351","authenticated-orcid":false,"given":"Jo\u00e3o P.","family":"Vilela","sequence":"additional","affiliation":[{"name":"CISUC, CRACS\/INESCTEC, and Departamento de Ci\u00eancia de Computadores, Faculdade de Ci\u00eancias, Universidade do Porto, Porto, Portugal"}]}],"member":"320","published-online":{"date-parts":[[2023,4,24]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Science","volume":"347","author":"Acquisti Alessandro","year":"2015","unstructured":"Alessandro Acquisti, Laura Brandimarte, and George Loewenstein. 2015. Privacy and human behavior in the age of information. Science, Vol. 347, 6221 (2015), 509--514."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-017--1534-x"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516735"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2011.110103"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compenvurbsys.2017.05.004"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2017-0051"},{"volume-title":"Privacy Enhancing Technologies","author":"Chatzikokolakis Konstantinos","key":"e_1_3_2_1_7_1","unstructured":"Konstantinos Chatzikokolakis, Catuscia Palamidessi, and Marco Stronati. 2014. A Predictive Differentially-Private Mechanism for Mobility Traces. In Privacy Enhancing Technologies, Emiliano De Cristofaro and Steven J. Murdoch (Eds.). Springer International Publishing, Cham, 21--41."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDEW.2013.6547433"},{"key":"e_1_3_2_1_9_1","unstructured":"Lorrie Cranor Tal Rabin Vitaly Shmatikov Salil Vadhan and Daniel Weitzner. 2015. Towards a Privacy Research Roadmap for the Computing Community: A white paper prepared for the Computing Community Consortium committee of the Computing Research Association."},{"volume-title":"Clustering Geo-Indistinguishability for Privacy of Continuous Location Traces. In 4th International Conference on Computing, Communications and Security (ICCCS). IEEE, 1--8.","author":"Cunha M.","key":"e_1_3_2_1_10_1","unstructured":"M. Cunha, R. Mendes, and J. P. Vilela. 2019. Clustering Geo-Indistinguishability for Privacy of Continuous Location Traces. In 4th International Conference on Computing, Communications and Security (ICCCS). IEEE, 1--8."},{"key":"e_1_3_2_1_11_1","volume-title":"Differential Privacy: A Survey of Results. In Theory and Applications of Models of Computation,","author":"Dwork Cynthia","year":"2008","unstructured":"Cynthia Dwork. 2008. Differential Privacy: A Survey of Results. In Theory and Applications of Models of Computation, , Manindra Agrawal, Dingzhu Du, Zhenhua Duan, and Angsheng Li (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 1--19."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1868470.1868479"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC.2012.6338627"},{"volume-title":"User Modeling, Adaptation, and Personalization, , Vania Dimitrova, Tsvi Kuflik","author":"Herder Eelco","key":"e_1_3_2_1_14_1","unstructured":"Eelco Herder, Patrick Siehndel, and Ricardo Kawase. 2014. Predicting User Locations and Trajectories. In User Modeling, Adaptation, and Personalization, , Vania Dimitrova, Tsvi Kuflik, David Chin, Francesco Ricci, Peter Dolog, and Geert-Jan Houben (Eds.). Springer International Publishing, Cham, 86--97."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2017.2647967"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102807"},{"volume-title":"Pervasive Computing, , Anthony LaMarca, Marc Langheinrich, and Khai N","author":"Krumm John","key":"e_1_3_2_1_17_1","unstructured":"John Krumm. 2007. Inference Attacks on Location Tracks. In Pervasive Computing, , Anthony LaMarca, Marc Langheinrich, and Khai N. Truong (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 127--143."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-008-0212-5"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/MITS.2018.2806630"},{"volume-title":"Information Security,","author":"Lee Jaewoo","key":"e_1_3_2_1_20_1","unstructured":"Jaewoo Lee and Chris Clifton. 2011. How Much Is Enough? Choosing \u03b5 for Differential Privacy. In Information Security, , Xuejia Lai, Jianying Zhou, and Hui Li (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 325--340."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2822260"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0032"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3212480.3212490"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3212480.3212490"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2706947"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2013.2262376"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653771.1653818"},{"key":"e_1_3_2_1_28_1","volume-title":"The California Consumer Privacy Act of","author":"State of California. 2018.","year":"2018","unstructured":"State of California. 2018. The California Consumer Privacy Act of 2018. California Civil Code , Vol. Assembly Bill No. 375 (2018), 1--24."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3139550.3139555"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMSNETS.2009.4808865"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2873950"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.18"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382261"},{"key":"e_1_3_2_1_34_1","volume-title":"Privacy loss in apple's implementation of differential privacy on macos 10.12. arXiv preprint arXiv:1709.02753","author":"Tang Jun","year":"2017","unstructured":"Jun Tang, Aleksandra Korolova, Xiaolong Bai, Xueqiang Wang, and Xiaofeng Wang. 2017. Privacy loss in apple's implementation of differential privacy on macos 10.12. arXiv preprint arXiv:1709.02753 (2017)."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2009.4939290"},{"key":"e_1_3_2_1_36_1","volume-title":"Official Journal L110","author":"European Union. 2016. Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46\/EC (General Data Protection Regulation).","year":"2016","unstructured":"European Union. 2016. Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46\/EC (General Data Protection Regulation). Official Journal L110 , Vol. 59 (2016), 1--88."},{"key":"e_1_3_2_1_37_1","volume-title":"A comparative analysis of intra-city human mobility by taxi. Physica A: Statistical Mechanics and its Applications","author":"Wang Wenjun","year":"2015","unstructured":"Wenjun Wang, Lin Pan, Ning Yuan, Sen Zhang, and Dong Liu. 2015a. A comparative analysis of intra-city human mobility by taxi. Physica A: Statistical Mechanics and its Applications , Vol. 420 (2015), 134--147."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2015.01.004"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-012-0633-z"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813640"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.10.053"}],"event":{"name":"CODASPY '23: Thirteenth ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Charlotte NC USA","acronym":"CODASPY '23"},"container-title":["Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3577923.3583644","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3577923.3583644","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:08:41Z","timestamp":1750183721000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3577923.3583644"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,24]]},"references-count":41,"alternative-id":["10.1145\/3577923.3583644","10.1145\/3577923"],"URL":"https:\/\/doi.org\/10.1145\/3577923.3583644","relation":{},"subject":[],"published":{"date-parts":[[2023,4,24]]},"assertion":[{"value":"2023-04-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}