{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T16:48:52Z","timestamp":1775666932926,"version":"3.50.1"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T00:00:00Z","timestamp":1725235200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T00:00:00Z","timestamp":1725235200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62272158"],"award-info":[{"award-number":["62272158"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["EURASIP J. on Info. Security"],"DOI":"10.1186\/s13635-024-00177-0","type":"journal-article","created":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T14:03:02Z","timestamp":1725285782000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Trajectory-aware privacy-preserving method with local differential privacy in crowdsourcing"],"prefix":"10.1186","volume":"2024","author":[{"given":"Yingcong","family":"Hong","sequence":"first","affiliation":[]},{"given":"Junyi","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yaping","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Qiao","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Xiehua","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,9,2]]},"reference":[{"issue":"3","key":"177_CR1","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1145\/3603256","volume":"4","author":"A Fornaroli","year":"2023","unstructured":"A. Fornaroli, D. Gatica-Perez, Urban crowdsourcing platforms across the world: A systematic review. Digit. Gov. Res. Pract. 4(3), 19 (2023). https:\/\/doi.org\/10.1145\/3603256","journal-title":"Digit. Gov. Res. Pract."},{"key":"177_CR2","doi-asserted-by":"publisher","first-page":"542","DOI":"10.1016\/j.procs.2019.01.174","volume":"149","author":"G Marzano","year":"2019","unstructured":"G. Marzano, J. Lizut, L.O. Siguencia, Crowdsourcing solutions for supporting urban mobility. Procedia Comput. Sci. 149, 542\u2013547 (2019). https:\/\/doi.org\/10.1016\/j.procs.2019.01.174","journal-title":"Procedia Comput. Sci."},{"key":"177_CR3","doi-asserted-by":"publisher","first-page":"1376","DOI":"10.1038\/srep01376","volume":"3","author":"YA de Montjoye","year":"2013","unstructured":"Y.A. de Montjoye, C. Hidalgo, M. Verleysen et al., Unique in the crowd: The privacy bounds of human mobility. Sci. Rep. 3, 1376 (2013). https:\/\/doi.org\/10.1038\/srep01376","journal-title":"Sci. Rep."},{"key":"177_CR4","doi-asserted-by":"crossref","unstructured":"S.-S. Ho, S. Ruan, in Proceedings of the 4th ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS (SPRINGL \u201911). Differential privacy for location pattern mining (Association for Computing Machinery, New York, 2011), pp. 17\u201324. https:\/\/doi.org\/10.1145\/2071880.2071884","DOI":"10.1145\/2071880.2071884"},{"key":"177_CR5","doi-asserted-by":"publisher","unstructured":"M.E. Gursoy, L. Liu, S. Truex, L. Yu, W. Wei, in Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (CCS \u201918). Utility-aware synthesis of differentially private and attack-resilient location traces (Association for Computing Machinery, New York, 2018), pp. 196\u2013211. https:\/\/doi.org\/10.1145\/3243734.3243741","DOI":"10.1145\/3243734.3243741"},{"issue":"11","key":"177_CR6","doi-asserted-by":"publisher","first-page":"1154","DOI":"10.14778\/2809974.2809978","volume":"8","author":"X He","year":"2015","unstructured":"X. He, G. Cormode, A. Machanavajjhala, C.M. Procopiuc, D. Srivastava, DPT: Differentially private trajectory synthesis using hierarchical reference systems. Proc. VLDB Endow. 8(11), 1154\u20131165 (2015). https:\/\/doi.org\/10.14778\/2809974.2809978","journal-title":"Proc. VLDB Endow."},{"key":"177_CR7","doi-asserted-by":"publisher","unstructured":"M. Mohammady, S. Xie, Y. Hong, M. Zhang, L. Wang, M. Pourzandi, M. Debbabi, in Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security (CCS \u201920). R2DP: A universal and automated approach to optimizing the randomization mechanisms of differential privacy for utility metrics with no known optimal distributions (Association for Computing Machinery, New York, 2020). pp. 677-696. https:\/\/doi.org\/10.1145\/3372297.3417259","DOI":"10.1145\/3372297.3417259"},{"key":"177_CR8","doi-asserted-by":"publisher","first-page":"277","DOI":"10.2478\/popets-2020-0073","volume":"2020","author":"H Wang","year":"2020","unstructured":"H. Wang, S. Xie, Y. Hong, VideoDP: A flexible platform for video analytics with differential privacy. Proc. Priv. Enhancing Technol. 2020, 277\u2013296 (2020)","journal-title":"Proc. Priv. Enhancing Technol."},{"key":"177_CR9","doi-asserted-by":"publisher","unstructured":"K. Chatzikokolakis, E. ElSalamouny, C. Palamidessi, A. Pazii, Methods for location privacy: A comparative overview, now. (2017). https:\/\/doi.org\/10.1561\/3300000017","DOI":"10.1561\/3300000017"},{"issue":"2","key":"177_CR10","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1016\/j.dcan.2022.07.003","volume":"10","author":"HH Arcolezi","year":"2024","unstructured":"H.H. Arcolezi, J.-F. Couchot, B. Al\u00a0Bouna, X. Xiao, Improving the utility of locally differentially private protocols for longitudinal and multidimensional frequency estimates. Digit. Commun. Netw. 10(2), 369\u2013379 (2024). https:\/\/doi.org\/10.1016\/j.dcan.2022.07.003","journal-title":"Digit. Commun. Netw."},{"key":"177_CR11","doi-asserted-by":"publisher","unstructured":"G. Cormode, S. Jha, T. Kulkarni, N. Li, D. Srivastava, T. Wang, in Proceedings of the 2018 International Conference on Management of Data (SIGMOD \u201918). Privacy at scale: Local differential privacy in practice (Association for Computing Machinery, New York, 2018), pp. 1655\u20131658. https:\/\/doi.org\/10.1145\/3183713.3197390","DOI":"10.1145\/3183713.3197390"},{"key":"177_CR12","doi-asserted-by":"publisher","unstructured":"\u00da. Erlingsson, V. Pihur, A. Korolova, in Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (CCS \u201914). RAPPOR: Randomized aggregatable privacy-preserving ordinal response (Association for Computing Machinery, New York, 2014), pp. 1054\u20131067. https:\/\/doi.org\/10.1145\/2660267.2660348","DOI":"10.1145\/2660267.2660348"},{"key":"177_CR13","unstructured":"B. Ding, J. Kulkarni, S. Yekhanin, in Proceedings of the 31st International Conference on Neural Information Processing Systems (NIPS\u201917). Collecting telemetry data privately (Curran Associates Inc., Red Hook, 2017), pp. 3574\u20133583"},{"key":"177_CR14","doi-asserted-by":"publisher","first-page":"1352","DOI":"10.1109\/LCOMM.2019.2922963","volume":"23","author":"JW Kim","year":"2019","unstructured":"J.W. Kim, B. Jang, Workload-aware indoor positioning data collection via local differential privacy. IEEE Commun. Lett. 23, 1352\u20131356 (2019)","journal-title":"IEEE Commun. Lett."},{"key":"177_CR15","doi-asserted-by":"publisher","first-page":"31435","DOI":"10.1109\/ACCESS.2019.2899099","volume":"7","author":"X Zhao","year":"2019","unstructured":"X. Zhao, Y. Li, Y. Yuan, X. Bi, G. Wang, LDPart: Effective location-record data publication via local differential privacy. IEEE Access 7, 31435\u201331445 (2019)","journal-title":"IEEE Access"},{"key":"177_CR16","doi-asserted-by":"publisher","unstructured":"A. Haydari, C.-N. Chuah, M. Zhang, J. Macfarlane, S. Peisert, in Proceedings of the 38th Annual Computer Security Applications Conference (ACSAC \u201922). Differentially private map matching for mobility trajectories (Association for Computing Machinery, New York, 2022), pp. 293\u2013303. https:\/\/doi.org\/10.1145\/3564625.3567974","DOI":"10.1145\/3564625.3567974"},{"key":"177_CR17","doi-asserted-by":"publisher","unstructured":"H. Wang, H. Hong, L. Xiong, Z. Qin, Y. Hong, in Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security (CCS \u201922). L-SRR: Local differential privacy for location-based services with staircase randomized response (Association for Computing Machinery, New York, 2022), pp. 2809\u20132823. https:\/\/doi.org\/10.1145\/3548606.3560636","DOI":"10.1145\/3548606.3560636"},{"key":"177_CR18","doi-asserted-by":"publisher","unstructured":"Z. Wang, W. Liu, X. Pang, J. Ren, Z. Liu, Y. Chen, in IEEE INFOCOM 2020 - IEEE Conference on Computer Communications. Towards pattern-aware privacy-preserving real-time data collection (Toronto, 2020), pp. 109\u2013118. https:\/\/doi.org\/10.1109\/INFOCOM41043.2020.9155290","DOI":"10.1109\/INFOCOM41043.2020.9155290"},{"key":"177_CR19","doi-asserted-by":"publisher","unstructured":"C. Dwork, J. Lei, in Proceedings of the forty-first annual ACM symposium on Theory of computing (STOC \u201909). Differential privacy and robust statistics (Association for Computing Machinery, New York, 2009), pp. 371\u2013380. https:\/\/doi.org\/10.1145\/1536414.1536466","DOI":"10.1145\/1536414.1536466"},{"key":"177_CR20","doi-asserted-by":"publisher","unstructured":"Y. Zheng, L. Zhang, X. Xie, W.-Y. Ma, in Proceedings of the 18th international conference on World wide web (WWW \u201909). Mining interesting locations and travel sequences from GPS trajectories (Association for Computing Machinery, New York, 2009), pp. 791\u2013800. https:\/\/doi.org\/10.1145\/1526709.1526816","DOI":"10.1145\/1526709.1526816"},{"key":"177_CR21","unstructured":"Hong Kong Univ. Sci. Technol., Smart City Res. Group, Shanghai, China, Feb. 2007."},{"key":"177_CR22","doi-asserted-by":"crossref","unstructured":"S. Wang, L. Huang, P. Wang, H. Deng, H. Xu, W. Yang, in Wireless Algorithms, Systems, and Applications. WASA 2016, ed by Q. Yang, W. Yu, Y Challal. Private weighted histogram aggregation in crowdsourcing. Lecture Notes in Computer Science, vol 9798 (Springer, Cham, 2016)","DOI":"10.1007\/978-3-319-42836-9_23"},{"key":"177_CR23","doi-asserted-by":"publisher","unstructured":"R. Chen, H. Li, A.K. Qin, S.P. Kasiviswanathan, H. Jin, in 2016 IEEE 32nd International Conference on Data Engineering (ICDE). Private spatial data aggregation in the local setting (Helsinki, 2016), pp. 289\u2013300. https:\/\/doi.org\/10.1109\/ICDE.2016.7498248","DOI":"10.1109\/ICDE.2016.7498248"},{"key":"177_CR24","unstructured":"Chen P , Gu J , Zhu D ,et al. A Dynamic Time Warping based Algorithm for Trajectory Matching in LBS[J]. International Journal of Database Theory & Application. 6, (2013)"},{"key":"177_CR25","doi-asserted-by":"publisher","unstructured":"W. Zhang, Z. Xie, A. M. Vera Venkata Sai, Q. Zia, Z. He, G. Yin, A Local Differential Privacy Trajectory Protection Method Based on Temporal and Spatial Restrictions for Staying Detection, in Tsinghua Science and Technology. 29(2), 617\u2013633 (2024). https:\/\/doi.org\/10.26599\/TST.2023.9010072.","DOI":"10.26599\/TST.2023.9010072"},{"key":"177_CR26","doi-asserted-by":"publisher","unstructured":"M.E. Andr\u00e9s, N.E. Bordenabe, K. Chatzikokolakis, C. Palamidessi, in Proceedings of the 2013 ACM SIGSAC conference on Computer and communications security (CCS \u201913). Geo-indistinguishability: Differential privacy for location-based systems (Association for Computing Machinery, New York, 2013), pp. 901\u2013914. https:\/\/doi.org\/10.1145\/2508859.2516735","DOI":"10.1145\/2508859.2516735"},{"key":"177_CR27","doi-asserted-by":"publisher","first-page":"16","DOI":"10.3390\/ijgi5020016","volume":"5","author":"A Degbelo","year":"2016","unstructured":"A. Degbelo, C. Granell, S. Trilles, D. Bhattacharya, S. Casteleyn, C. Kray, Opening up smart cities: citizen-centric challenges and opportunities from GIScience. ISPRS Int. J. Geo Inf. 5, 16 (2016)","journal-title":"ISPRS Int. J. Geo Inf."},{"key":"177_CR28","doi-asserted-by":"publisher","unstructured":"Crowdsourced Data Mining for Urban Activity: Review of Data Sources, Applications, and Methods[J].\u00a0J Urban Plan Dev. 146(2), 4020007.1\u20134020007.15 (2020). https:\/\/doi.org\/10.1061\/(ASCE)UP.1943-5444.0000566","DOI":"10.1061\/(ASCE)UP.1943-5444.0000566"},{"issue":"6","key":"177_CR29","doi-asserted-by":"publisher","first-page":"1010","DOI":"10.1109\/69.971193","volume":"13","author":"P Samarati","year":"2001","unstructured":"P. Samarati, Protecting respondents\u2019 identities in microdata release. IEEE Trans. Knowl. Data Eng. 13(6), 1010\u20131027 (2001). https:\/\/doi.org\/10.1109\/69.971193","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"177_CR30","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"L. Sweeney, k-Anonymity: A model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 10, 557\u2013570 (2002)","journal-title":"Int. J. Uncertain. Fuzziness Knowl. Based Syst."},{"key":"177_CR31","doi-asserted-by":"publisher","first-page":"4778","DOI":"10.1109\/JIOT.2018.2820039","volume":"5","author":"PM Asuquo","year":"2018","unstructured":"P.M. Asuquo, H.S. Cruickshank, J.G. Morley, C.P. Anyigor\u00a0Ogah, A. Lei, W. Hathal, S. Bao, Z. Sun, Security and privacy in location-based services for vehicular and mobile communications: An overview, challenges, and countermeasures. IEEE Internet Things J. 5, 4778\u20134802 (2018)","journal-title":"IEEE Internet Things J."},{"key":"177_CR32","doi-asserted-by":"publisher","unstructured":"Dwork, C. Differential Privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds) Automata, Languages and Programming. ICALP 2006. Lecture Notes in Computer Science. 4052, (Springer,\u00a0Berlin Heidelberg, 2006). https:\/\/doi.org\/10.1007\/11787006_1","DOI":"10.1007\/11787006_1"},{"issue":"6","key":"177_CR33","doi-asserted-by":"publisher","first-page":"1356","DOI":"10.1109\/TMC.2018.2861765","volume":"18","author":"Z Wang","year":"2019","unstructured":"Z. Wang, X. Pang, Y. Chen, H. Shao, Q. Wang, L. Wu, H. Chen, H. Qi, Privacy-preserving crowd-sourced statistical data publishing with an untrusted server. IEEE Trans. Mob. Comput. 18(6), 1356\u20131367 (2019). https:\/\/doi.org\/10.1109\/TMC.2018.2861765","journal-title":"IEEE Trans. Mob. Comput."},{"issue":"9","key":"177_CR34","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1109\/MCOM.001.1800674","volume":"57","author":"Z Wang","year":"2019","unstructured":"Z. Wang, X. Pang, J. Hu, W. Liu, Q. Wang, Y. Li, H. Chen, When mobile crowdsensing meets privacy. Comm. Mag. 57(9), 72\u201378 (2019). https:\/\/doi.org\/10.1109\/MCOM.001.1800674","journal-title":"Comm. Mag."},{"key":"177_CR35","doi-asserted-by":"publisher","first-page":"1330","DOI":"10.1109\/TMC.2018.2861393","volume":"18","author":"Z Wang","year":"2019","unstructured":"Z. Wang, J. Hu, R. Lv, J. Wei, Q. Wang, D. Yang, H. Qi, Personalized privacy-preserving task allocation for mobile crowdsensing. IEEE Trans. Mob. Comput. 18, 1330\u20131341 (2019)","journal-title":"IEEE Trans. Mob. Comput."}],"container-title":["EURASIP Journal on Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13635-024-00177-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13635-024-00177-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13635-024-00177-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T14:08:57Z","timestamp":1725286137000},"score":1,"resource":{"primary":{"URL":"https:\/\/jis-eurasipjournals.springeropen.com\/articles\/10.1186\/s13635-024-00177-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,2]]},"references-count":35,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024,12]]}},"alternative-id":["177"],"URL":"https:\/\/doi.org\/10.1186\/s13635-024-00177-0","relation":{},"ISSN":["2510-523X"],"issn-type":[{"value":"2510-523X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,9,2]]},"assertion":[{"value":"28 April 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 August 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 September 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"All authors gave their consent for publication.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"28"}}