{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T06:55:04Z","timestamp":1760597704014,"version":"3.37.3"},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2016,5,4]],"date-time":"2016-05-04T00:00:00Z","timestamp":1462320000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China (CN)","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1186\/s13638-016-0624-2","type":"journal-article","created":{"date-parts":[[2016,5,4]],"date-time":"2016-05-04T03:39:44Z","timestamp":1462333184000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":22,"title":["Privacy-preserving crowdsourced site survey in WiFi fingerprint-based localization"],"prefix":"10.1186","volume":"2016","author":[{"given":"Shujun","family":"Li","sequence":"first","affiliation":[]},{"given":"Hong","family":"Li","sequence":"additional","affiliation":[]},{"given":"Limin","family":"Sun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,5,4]]},"reference":[{"key":"624_CR1","unstructured":"P Bahl, VN Padmanabhan, in Proc. of IEEE INFOCOM. Radar: an in-building RF-based user location and tracking system, (2000), pp. 775\u2013784."},{"key":"624_CR2","unstructured":"Z Yang, C Wu, Y Liu, in Proc. of ACM MobiCom. Locating in fingerprint space: wireless indoor localization with little human intervention, (2012), pp. 269\u2013280."},{"key":"624_CR3","unstructured":"H Liu, Y Gan, J Yang, S Sidhom, Y Wang, Y Chen, F Ye, in Proc. of ACM MobiCom. Push the limit of WiFi based localization for smartphones, (2012), pp. 305\u2013316."},{"key":"624_CR4","unstructured":"W Cheng, D Wu, X Cheng, D Chen, in WASA. Routing for information leakage reduction in multi-channel multi-hop ad-hoc social networks, (2012), pp. 31\u201342."},{"key":"624_CR5","doi-asserted-by":"crossref","unstructured":"D Milioris, L Kriara, A Papakonstantinou, G Tzagkarakis, P Tsakalides, M Papadopouli, in Proceedings of the 13th ACM International Conference on Modeling, Analysis, and Simulation of Wireless and Mobile Systems. Empirical evaluation of signal-strength fingerprint positioning in wireless LANs (ACM, 2010), pp. 5\u201313.","DOI":"10.1145\/1868521.1868525"},{"key":"624_CR6","doi-asserted-by":"crossref","unstructured":"J Niu, B Wang, L Cheng, JJ Rodrigues, in Communications (ICC) 2015 IEEE International Conference on. WicLoc: an indoor localization system based on WiFi fingerprints and crowdsourcing (IEEE, 2015), pp. 3008\u20133013.","DOI":"10.1109\/ICC.2015.7248785"},{"key":"624_CR7","unstructured":"J Li, Z Cai, M Yan, Y Li, in INFOCOM, year=2016 Proceedings IEEE. Using crowdsourced data in location-based social networks to explore influence maximization (IEEE, 2016)."},{"key":"624_CR8","unstructured":"R Shokri, G Theodorakopoulos, J Le Boudec, J Hubaux, in IEEE Symposium on Security and Privacy. Quantifying location privacy, (2011), pp. 247\u2013262."},{"key":"624_CR9","doi-asserted-by":"publisher","unstructured":"Y He, L Sun, W Yang, H Li, A game theory-based analysis of data privacy in vehicular sensor networks. Int. J. Distrib. Sens. Networks. 2014: (2014).","DOI":"10.1155\/2014\/838391"},{"key":"624_CR10","doi-asserted-by":"crossref","unstructured":"T Shu, Y Chen, J Yang, A Williams, in INFOCOM, 2014 Proceedings IEEE. Multi-lateral privacy-preserving localization in pervasive environments (IEEE, 2014), pp. 2319\u20132327.","DOI":"10.1109\/INFOCOM.2014.6848176"},{"key":"624_CR11","doi-asserted-by":"crossref","unstructured":"X Wang, Y Liu, Z Shi, X Lu, L Sun, A privacy-preserving fuzzy localization scheme with CSI fingerprint, (2016).","DOI":"10.1109\/GLOCOM.2015.7417168"},{"key":"624_CR12","doi-asserted-by":"crossref","unstructured":"H Li, L Sun, H Zhu, X Lu, X Cheng, in INFOCOM, 2014 Proceedings IEEE. Achieving privacy preservation in WiFi fingerprint-based localization (IEEE, 2014), pp. 2337\u20132345.","DOI":"10.1109\/INFOCOM.2014.6848178"},{"key":"624_CR13","unstructured":"D Yang, X Fang, G Xue, in Proc. of IEEE INFOCOM. Truthful incentive mechanisms for k-anonymity location privacy, (2013), pp. 3094\u20133102."},{"key":"624_CR14","unstructured":"X Liu, K Liu, L Guo, X Li, Y Fang, in Proc. of IEEE INFOCOM. A game-theoretic approach for achieving k-anonymity in location based services, (2013), pp. 3085\u20133093."},{"key":"624_CR15","unstructured":"AR Beresford, F Stajano, in Proc. of the IEEE PerSec. Mix zones: user privacy in location-aware services, (2004), pp. 127\u2013131."},{"key":"624_CR16","doi-asserted-by":"crossref","unstructured":"J Shao, R Lu, X Lin, in INFOCOM, 2014 Proceedings IEEE. FINE: a fine-grained privacy-preserving location-based service framework for mobile devices (IEEE, 2014), pp. 244\u2013252.","DOI":"10.1109\/INFOCOM.2014.6847945"},{"key":"624_CR17","doi-asserted-by":"crossref","unstructured":"I Bilogrevic, M Jadliwala, K Kalkan, J-P Hubaux, I Aad, in Privacy Enhancing Technologies. Privacy in mobile computing for location-sharing-based services (Springer, 2011), pp. 77\u201396.","DOI":"10.1007\/978-3-642-22263-4_5"},{"issue":"3","key":"624_CR18","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1145\/1317425.1317431","volume":"11","author":"A Chen","year":"2007","unstructured":"A Chen, C Harko, D Lambert, P Whiting, An algorithm for fast, model-free tracking indoors. ACM SIGMOBILE Mob. Comput. Commun. Rev. 11(3), 48\u201358 (2007).","journal-title":"ACM SIGMOBILE Mob. Comput. Commun. Rev"},{"key":"624_CR19","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1016\/j.adhoc.2011.12.006","volume":"12","author":"D Milioris","year":"2014","unstructured":"D Milioris, G Tzagkarakis, A Papakonstantinou, M Papadopouli, P Tsakalides, Low-dimensional signal-strength fingerprint-based positioning in wireless LANs. Ad Hoc Netw. 12:, 100\u2013114 (2014).","journal-title":"Ad Hoc Netw"},{"key":"624_CR20","doi-asserted-by":"crossref","unstructured":"C Dwork, in Encyclopedia of Cryptography and Security. Differential privacy (Springer, 2011), pp. 338\u2013340.","DOI":"10.1007\/978-1-4419-5906-5_752"},{"key":"624_CR21","unstructured":"P Paillier, in Proc. of ACM EUROCRYPT. Public-key cryptosystems based on composite degree residuosity classes, (1999)."},{"key":"624_CR22","doi-asserted-by":"crossref","unstructured":"ME Andr\u00e9s, NE Bordenabe, K Chatzikokolakis, C Palamidessi, in Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security. Geo-indistinguishability: differential privacy for location-based systems (ACM, 2013), pp. 901\u2013914.","DOI":"10.1145\/2508859.2516735"},{"key":"624_CR23","doi-asserted-by":"crossref","unstructured":"FD Garcia, B Jacobs, in Security and Trust Management. Privacy-friendly energy-metering via homomorphic encryption (Springer, 2011), pp. 226\u2013238.","DOI":"10.1007\/978-3-642-22444-7_15"},{"key":"624_CR24","unstructured":"S Kotz, T Kozubowski, K Podgorski, The Laplace Distribution and Generalizations: A Revisit with Applications to Communications, Economics, Engineering, and Finance (Springer Science & Business Media, 2012)."}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-016-0624-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13638-016-0624-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-016-0624-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-016-0624-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,19]],"date-time":"2020-09-19T11:17:41Z","timestamp":1600514261000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/s13638-016-0624-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5,4]]},"references-count":24,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2016,12]]}},"alternative-id":["624"],"URL":"https:\/\/doi.org\/10.1186\/s13638-016-0624-2","relation":{},"ISSN":["1687-1499"],"issn-type":[{"type":"electronic","value":"1687-1499"}],"subject":[],"published":{"date-parts":[[2016,5,4]]},"article-number":"123"}}