{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:49:32Z","timestamp":1767340172159,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,4,8]],"date-time":"2024-04-08T00:00:00Z","timestamp":1712534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"CISUC","award":["UID\/CEC\/00326\/2020"],"award-info":[{"award-number":["UID\/CEC\/00326\/2020"]}]},{"name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia","award":["LA\/P\/0063\/2020","2020.04714.BD"],"award-info":[{"award-number":["LA\/P\/0063\/2020","2020.04714.BD"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,4,8]]},"DOI":"10.1145\/3605098.3636050","type":"proceedings-article","created":{"date-parts":[[2024,5,21]],"date-time":"2024-05-21T17:59:16Z","timestamp":1716314356000},"page":"1433-1440","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["A Privacy-Aware Remapping Mechanism for Location Data"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4119-0694","authenticated-orcid":false,"given":"Guilherme","family":"Duarte","sequence":"first","affiliation":[{"name":"CISUC, CRACS\/INESCTEC, and Department of Computer Science Faculty of Sciences, University of Porto, Porto, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8920-8128","authenticated-orcid":false,"given":"Mariana","family":"Cunha","sequence":"additional","affiliation":[{"name":"CISUC, CRACS\/INESCTEC, and Department of Computer Science Faculty of Sciences, University of Porto, Porto, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5805-1351","authenticated-orcid":false,"given":"Jo\u00e3o","family":"Vilela","sequence":"additional","affiliation":[{"name":"CISUC, CRACS\/INESCTEC and Department of Computer Science, University of Porto, Porto, Portugal"}]}],"member":"320","published-online":{"date-parts":[[2024,5,21]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-017-1534-x"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516735"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1080\/17445647.2013.764830"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2017-0051"},{"volume-title":"Clustering Geo-Indistinguishability for Privacy of Continuous Location Traces. In 4th International Conference on Computing, Communications and Security (ICCCS). IEEE, 1--8.","author":"Cunha M.","key":"e_1_3_2_1_5_1","unstructured":"M. Cunha, R. Mendes, and J. P. Vilela. 2019. Clustering Geo-Indistinguishability for Privacy of Continuous Location Traces. In 4th International Conference on Computing, Communications and Security (ICCCS). IEEE, 1--8."},{"key":"e_1_3_2_1_6_1","volume-title":"A survey of privacy-preserving mechanisms for heterogeneous data types. Computer science review 41","author":"Cunha Mariana","year":"2021","unstructured":"Mariana Cunha, Ricardo Mendes, and Jo\u00e3o P Vilela. 2021. A survey of privacy-preserving mechanisms for heterogeneous data types. Computer science review 41 (2021), 100403."},{"key":"e_1_3_2_1_7_1","volume-title":"Differential Privacy: A Survey of Results. In Theory and Applications of Models of Computation","author":"Dwork Cynthia","year":"2008","unstructured":"Cynthia Dwork. 2008. Differential Privacy: A Survey of Results. In Theory and Applications of Models of Computation, Manindra Agrawal, Dingzhu Du, Zhenhua Duan, and Angsheng Li (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 1--19."},{"key":"e_1_3_2_1_8_1","unstructured":"Martin Ester Hans-Peter Kriegel J\u00f6rg Sander Xiaowei Xu et al. 1996. A density-based algorithm for discovering clusters in large spatial databases with noise. In kdd Vol. 96. 226--231."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1868470.1868479"},{"key":"e_1_3_2_1_10_1","unstructured":"Marco Gramaglia Marco Fiore Alberto Tarable and Albert Banchs. 2017. k\u03c4 \u03f5 - anonymity: Towards Privacy-Preserving Publishing of Spatiotemporal Trajectory Data. arXiv:1701.02243 [cs.CY]"},{"key":"e_1_3_2_1_11_1","volume-title":"Proceedings on Privacy Enhancing Technologies. Privacy Enhancing Technologies Symposium","volume":"2023","author":"Jiang Yuzhou","year":"2023","unstructured":"Yuzhou Jiang, Emre Yilmaz, and Erman Ayday. 2023. Robust Fingerprint of Location Trajectories Under Differential Privacy. In Proceedings on Privacy Enhancing Technologies. Privacy Enhancing Technologies Symposium, Vol. 2023. NIH Public Access, 5."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-008-0212-5"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-1705-7"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1155\/2015\/326953"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0032"},{"key":"e_1_3_2_1_16_1","volume-title":"Velocity-Aware Geo-Indistinguishability. In Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy. 141--152","author":"Mendes Ricardo","year":"2023","unstructured":"Ricardo Mendes, Mariana Cunha, and Jo\u00e3o P Vilela. 2023. Velocity-Aware Geo-Indistinguishability. In Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy. 141--152."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3212480.3212490"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1503402.1503413"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2902185"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compenvurbsys.2020.101550"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2019.00038"},{"key":"e_1_3_2_1_22_1","volume-title":"Mining top-k trajectory-patterns from anonymized data. arXiv preprint arXiv:1912.01861","author":"Saxena Anuj S","year":"2019","unstructured":"Anuj S Saxena, Siddharth Dawar, Vikram Goyal, and Debajyoti Bera. 2019. Mining top-k trajectory-patterns from anonymized data. arXiv preprint arXiv:1912.01861 (2019)."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2020.2964658"},{"key":"e_1_3_2_1_24_1","volume-title":"Limits of predictability in human mobility. Science 327, 5968","author":"Song Chaoming","year":"2010","unstructured":"Chaoming Song, Zehui Qu, Nicholas Blumm, and Albert-L\u00e1szl\u00f3 Barab\u00e1si. 2010. Limits of predictability in human mobility. Science 327, 5968 (2010), 1018--1021."},{"key":"e_1_3_2_1_25_1","volume-title":"Quynh Chi Truong, and Tran Khanh Dang","author":"Truong Anh Tuan","year":"2010","unstructured":"Anh Tuan Truong, Quynh Chi Truong, and Tran Khanh Dang. 2010. An adaptive grid-based approach to location privacy preservation. Advances in intelligent information and database systems (2010), 133--144."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC.2009.47"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813640"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653704"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2971648.2971685"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2030613.2030630"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526816"}],"event":{"name":"SAC '24: 39th ACM\/SIGAPP Symposium on Applied Computing","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"location":"Avila Spain","acronym":"SAC '24"},"container-title":["Proceedings of the 39th ACM\/SIGAPP Symposium on Applied Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3605098.3636050","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3605098.3636050","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:04:00Z","timestamp":1750291440000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3605098.3636050"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,8]]},"references-count":31,"alternative-id":["10.1145\/3605098.3636050","10.1145\/3605098"],"URL":"https:\/\/doi.org\/10.1145\/3605098.3636050","relation":{},"subject":[],"published":{"date-parts":[[2024,4,8]]},"assertion":[{"value":"2024-05-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}