{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T14:41:19Z","timestamp":1774449679738,"version":"3.50.1"},"reference-count":30,"publisher":"SAGE Publications","issue":"4","license":[{"start":{"date-parts":[[2018,4,1]],"date-time":"2018-04-01T00:00:00Z","timestamp":1522540800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"funder":[{"name":"the Key Technologies R&D Program of Henan Province","award":["No.162102210032"],"award-info":[{"award-number":["No.162102210032"]}]},{"name":"the Plan for Scientific Innovation Talent of Henan Province","award":["No.2018JR0018"],"award-info":[{"award-number":["No.2018JR0018"]}]},{"name":"the National Key R&D Program of China","award":["No.2016QY01W0105"],"award-info":[{"award-number":["No.2016QY01W0105"]}]},{"name":"the National Key R&D Program of China","award":["No.2016YFB0801303"],"award-info":[{"award-number":["No.2016YFB0801303"]}]},{"DOI":"10.13039\/501100001809","name":"the National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["N0.61672354"],"award-info":[{"award-number":["N0.61672354"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"the National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["No.61379151"],"award-info":[{"award-number":["No.61379151"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"the National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["No.61572052"],"award-info":[{"award-number":["No.61572052"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"the National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["No.61572445"],"award-info":[{"award-number":["No.61572445"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"the National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["No.61772549"],"award-info":[{"award-number":["No.61772549"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"the National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["No.U1636219"],"award-info":[{"award-number":["No.U1636219"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2018,4]]},"abstract":"<jats:p> The combination of social networks and the Internet of Things has raised a new wave of network technology application. However, the presence of malicious social network users poses a potential threat to Internet of Things security, and the research on social network user geolocation technology is of great significance. The accuracy of existing geolocation methods for WeChat users depends on the stable correspondence between the reported distance and actual distance. In view of the difficulty to pinpoint users\u2019 location in the real world due to WeChat location protection strategy, a WeChat user geolocation algorithm based on the reported and actual distance relation analysis is proposed. The proposed algorithm selects the target reported distance and determines the initial target space based on statistical characteristics of the relation between the reported distance and actual distance. What is more, stepwise strategies are taken to improve the accuracy rate of space partition. Experimental results show that, on the premise that target users can be discovered, the proposed algorithm could achieve higher accuracy compared with the classical space partition\u2013based algorithm and the heuristic number theory based algorithm. The highest geolocation accuracy is within 10\u2009m and 56% of geolocation results are within 60\u2009m. <\/jats:p>","DOI":"10.1177\/1550147718774462","type":"journal-article","created":{"date-parts":[[2018,4,30]],"date-time":"2018-04-30T09:33:42Z","timestamp":1525080822000},"page":"155014771877446","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":9,"title":["Geolocating a WeChat user based on the relation between reported and actual distance"],"prefix":"10.1177","volume":"14","author":[{"given":"Wenqi","family":"Shi","sequence":"first","affiliation":[{"name":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou Science and Technology Institute, Zhengzhou, China"}]},{"given":"Xiangyang","family":"Luo","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou Science and Technology Institute, Zhengzhou, China"}]},{"given":"Fan","family":"Zhao","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou Science and Technology Institute, Zhengzhou, China"}]},{"given":"Ziru","family":"Peng","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou Science and Technology Institute, Zhengzhou, China"}]},{"given":"Qingfeng","family":"Cheng","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou Science and Technology Institute, Zhengzhou, China"}]},{"given":"Yong","family":"Gan","sequence":"additional","affiliation":[{"name":"School of Computer and Communication Engineering, Zhengzhou University of Light Industry, Zhengzhou, China"}]}],"member":"179","published-online":{"date-parts":[[2018,4,30]]},"reference":[{"key":"bibr1-1550147718774462","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.05.010"},{"issue":"1","key":"bibr2-1550147718774462","first-page":"1","volume":"25","author":"Sun LM","year":"2014","journal-title":"J Softw"},{"key":"bibr3-1550147718774462","doi-asserted-by":"publisher","DOI":"10.1002\/sec.795"},{"key":"bibr4-1550147718774462","first-page":"266","volume-title":"International conference on ICT and knowledge engineering","author":"Elkhodr M"},{"key":"bibr5-1550147718774462","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.07.010"},{"key":"bibr6-1550147718774462","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2014.6710070"},{"key":"bibr9-1550147718774462","first-page":"591","volume-title":"Proceedings of the international conference on world wide web","author":"Kwak H"},{"key":"bibr10-1550147718774462","first-page":"99","volume-title":"Proceedings of the ACM conference on online social networks","author":"Nemelka CL"},{"key":"bibr11-1550147718774462","first-page":"137","volume-title":"Proceedings of the Internet measurement conference","author":"Wang G"},{"key":"bibr12-1550147718774462","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2615098"},{"key":"bibr13-1550147718774462","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.100913.00195"},{"key":"bibr14-1550147718774462","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2013.2295802"},{"key":"bibr15-1550147718774462","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2013.57"},{"key":"bibr16-1550147718774462","first-page":"19","volume-title":"Computer security applications conference","author":"Polakis I"},{"key":"bibr17-1550147718774462","author":"Ma Y","year":"2018","journal-title":"Epub ahead of print"},{"key":"bibr18-1550147718774462","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2018.01.011"},{"key":"bibr19-1550147718774462","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2465934"},{"key":"bibr20-1550147718774462","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.249"},{"key":"bibr21-1550147718774462","first-page":"1043","volume-title":"Proceedings of the 32nd IEEE International Conference on Computer Communications (INFOCOM\u201913)","author":"Ling Z"},{"key":"bibr22-1550147718774462","first-page":"243","volume-title":"Computing with spatial trajectories","author":"Zheng Y","year":"2010"},{"key":"bibr23-1550147718774462","first-page":"715","volume-title":"Proceedings of the 18th international conference on advanced communication technology","author":"Hoang NP"},{"key":"bibr24-1550147718774462","first-page":"1","volume-title":"Online international conference on green engineering and technologies","author":"Chithrapavai V"},{"key":"bibr26-1550147718774462","first-page":"179","volume-title":"Proceedings of the IEEE conference on computer communications workshops","author":"Xue M"},{"key":"bibr27-1550147718774462","first-page":"64","volume-title":"Proceedings of the international symposium on security and privacy in social networks and big data","author":"Peng J"},{"key":"bibr28-1550147718774462","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-49148-6_29"},{"key":"bibr29-1550147718774462","first-page":"75","volume-title":"Proceedings of the 4th ACM workshop on security and privacy in smartphones & mobile devices","author":"Ding Y"},{"key":"bibr30-1550147718774462","first-page":"43","volume-title":"In: Proceedings of the 15th ACM international symposium on mobile ad hoc networking and computing","author":"Li M"},{"key":"bibr31-1550147718774462","first-page":"817","volume-title":"Proceedings of the ACM SIGSAC conference on computer and communications security","author":"Polakis I"},{"key":"bibr32-1550147718774462","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-21837-3_55"},{"key":"bibr33-1550147718774462","doi-asserted-by":"publisher","DOI":"10.1080\/03772063.2014.890826"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1550147718774462","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/1550147718774462","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1550147718774462","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,12,8]],"date-time":"2020-12-08T20:55:40Z","timestamp":1607460940000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1177\/1550147718774462"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4]]},"references-count":30,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2018,4]]}},"alternative-id":["10.1177\/1550147718774462"],"URL":"https:\/\/doi.org\/10.1177\/1550147718774462","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"value":"1550-1477","type":"print"},{"value":"1550-1477","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,4]]}}}