{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T22:32:51Z","timestamp":1772836371228,"version":"3.50.1"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2022,1,8]],"date-time":"2022-01-08T00:00:00Z","timestamp":1641600000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,1,8]],"date-time":"2022-01-08T00:00:00Z","timestamp":1641600000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61962009"],"award-info":[{"award-number":["61962009"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100018533","name":"Major Scientific and Technological Special Project of Guizhou Province","doi-asserted-by":"crossref","award":["20183001"],"award-info":[{"award-number":["20183001"]}],"id":[{"id":"10.13039\/501100018533","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Science and Technology Support Plan of Guizhou Province","award":["[2020] 2Y011"],"award-info":[{"award-number":["[2020] 2Y011"]}]},{"name":"Talent project of Guizhou Big Data Academy Guizhou Provincial Key Laboratory of Public Big Data","award":["[2018]01"],"award-info":[{"award-number":["[2018]01"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cloud Comp"],"published-print":{"date-parts":[[2022,12]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>K-anonymity has been gaining widespread attention as one of the most widely used technologies to protect location privacy. Nevertheless, there are still some threats such as behavior deception and service swing, since utilizing distributed k-anonymity technology to construct an anonymous domain. More specifically, the coordinate of the honest node will be a leak if the malicious nodes submit wrong locations coordinate to take part in the domain construction process. Worse still, owing to service swing, the attacker increases the reputation illegally to deceive honest nodes again. To overcome those drawbacks, we propose a trusted de-swinging k-anonymity scheme for location privacy protection. Primarily, we introduce a de-swinging reputation evaluation method (DREM), which designs a penalty factor to curb swinging behavior. This method calculates the reputation from entity honesty degree, location information entropy, and service swing degree. Besides, based on our proposed DREM, a credible cloaking area is constructed to protect the location privacy of the requester. In the area, nodes can choose some nodes with a high reputation for completing the construction process of the anonymous domain. Finally, we design reputation contracts to calculate credit automatically based on smart contracts. The security analysis and simulation results indicate that our proposed scheme effectively resists malicious attacks, curbs the service swing, and encourages nodes to participate honestly in the construction of cloaking areas.<\/jats:p>","DOI":"10.1186\/s13677-021-00272-4","type":"journal-article","created":{"date-parts":[[2022,1,8]],"date-time":"2022-01-08T20:02:42Z","timestamp":1641672162000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["A trusted de-swinging k-anonymity scheme for location privacy protection"],"prefix":"10.1186","volume":"11","author":[{"given":"Manxiang","family":"Yang","sequence":"first","affiliation":[]},{"given":"Baopeng","family":"Ye","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8674-8356","authenticated-orcid":false,"given":"Yuling","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Tao","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yixian","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Xiaobin","family":"Qian","sequence":"additional","affiliation":[]},{"given":"Xiaomei","family":"Yu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,8]]},"reference":[{"issue":"9","key":"272_CR1","first-page":"2373","volume":"26","author":"ZZW Xuejun","year":"2015","unstructured":"Xuejun ZZW, Xiaolin G (2015) Overview of research on privacy protection of location services. J Softw 26(9):2373\u20132395.","journal-title":"J Softw"},{"issue":"1","key":"272_CR2","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/MPRV.2003.1186725","volume":"2","author":"AR Beresford","year":"2003","unstructured":"Beresford AR, Stajano F (2003) Location privacy in pervasive computing. IEEE Pervasive Comput 2(1):46\u201355. https:\/\/doi.org\/10.1109\/MPRV.2003.1186725.","journal-title":"IEEE Pervasive Comput"},{"issue":"7","key":"272_CR3","doi-asserted-by":"publisher","first-page":"3174","DOI":"10.1002\/int.22412","volume":"36","author":"Y Liu","year":"2021","unstructured":"Liu Y, Pei A, Wang F, Yang Y, Zhang X, Wang H, Dai H, Qi L, Ma R (2021) An attention-based category-aware gru model for the next poi recommendation. Int J Intell Syst 36(7):3174\u20133189. https:\/\/doi.org\/10.1002\/int.22412.","journal-title":"Int J Intell Syst"},{"issue":"3","key":"272_CR4","doi-asserted-by":"publisher","first-page":"139","DOI":"10.26599\/BDMA.2020.9020026","volume":"4","author":"P Nitu","year":"2021","unstructured":"Nitu P, Coelho J, Madiraju P (2021) Improvising personalized travel recommendation system with recency effects. Big Data Mining Analytics 4(3):139\u2013154. https:\/\/doi.org\/10.26599\/BDMA.2020.9020026.","journal-title":"Big Data Mining Analytics"},{"key":"272_CR5","doi-asserted-by":"publisher","unstructured":"Jiang H, Li J, Zhao P, Zeng F, Xiao Z, Iyengar A (2021) Location privacy-preserving mechanisms in location-based services: A comprehensive survey. ACM Comput Surv 54(1). https:\/\/doi.org\/10.1145\/3423165.","DOI":"10.1145\/3423165"},{"issue":"6","key":"272_CR6","doi-asserted-by":"publisher","first-page":"743","DOI":"10.26599\/TST.2020.9010010","volume":"25","author":"Y Khazbak","year":"2020","unstructured":"Khazbak Y, Fan J, Zhu S, Cao G (2020) Preserving personalized location privacy in ride-hailing service. Tsinghua Sci Technol 25(6):743\u2013757. https:\/\/doi.org\/10.26599\/TST.2020.9010010.","journal-title":"Tsinghua Sci Technol"},{"issue":"11","key":"272_CR7","doi-asserted-by":"publisher","first-page":"2625","DOI":"10.1109\/JSAC.2017.2760179","volume":"35","author":"T He","year":"2017","unstructured":"He T, Ciftcioglu EN, Wang S, Chan KS (2017) Location privacy in mobile edge clouds: A chaff-based approach. IEEE J Sel Areas Commun 35(11):2625\u20132636. https:\/\/doi.org\/10.1109\/JSAC.2017.2760179.","journal-title":"IEEE J Sel Areas Commun"},{"issue":"8","key":"272_CR8","doi-asserted-by":"publisher","first-page":"2146","DOI":"10.1109\/TMM.2019.2892300","volume":"21","author":"C Ma","year":"2019","unstructured":"Ma C, Yan Z, Chen CW (2019) sspa\u2212lbs: Scalable and social-friendly privacy-aware location-based services. IEEE Trans Multimed 21(8):2146\u20132156. https:\/\/doi.org\/10.1109\/TMM.2019.2892300.","journal-title":"IEEE Trans Multimed"},{"issue":"6","key":"272_CR9","doi-asserted-by":"publisher","first-page":"5116","DOI":"10.1109\/JIOT.2020.2974669","volume":"7","author":"J Li","year":"2020","unstructured":"Li J, Zeng F, Xiao Z, Jiang H, Zheng Z, Liu W, Ren J (2020) Drive2friends: Inferring social relationships from individual vehicle mobility data. IEEE Internet Things J 7(6):5116\u20135127. https:\/\/doi.org\/10.1109\/JIOT.2020.2974669.","journal-title":"IEEE Internet Things J"},{"key":"272_CR10","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1145\/1066116.1189037","volume-title":"Proceedings of the 1st International Conference on Mobile Systems, Applications and Services (MobiSys \u201903)","author":"M Gruteser","year":"2003","unstructured":"Gruteser M, Grunwald D (2003) Anonymous usage of location-based services through spatial and temporal cloaking In: Proceedings of the 1st International Conference on Mobile Systems, Applications and Services (MobiSys \u201903), 31\u201342.. Association for Computing Machinery, New York. https:\/\/doi.org\/10.1145\/1066116.1189037."},{"key":"272_CR11","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1145\/1183471.1183500","volume-title":"Proceedings of the 14th Annual ACM International Symposium on Advances in Geographic Information Systems (GIS \u201906)","author":"C-Y Chow","year":"2006","unstructured":"Chow C-Y, Mokbel MF, Liu X (2006) A peer-to-peer spatial cloaking algorithm for anonymous location-based service In: Proceedings of the 14th Annual ACM International Symposium on Advances in Geographic Information Systems (GIS \u201906), 171\u2013178.. Association for Computing Machinery, New York. https:\/\/doi.org\/10.1145\/1183471.1183500."},{"key":"272_CR12","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1016\/j.future.2016.08.023","volume":"74","author":"G Sun","year":"2017","unstructured":"Sun G, Liao D, Li H, Yu H, Chang V (2017) L2p2: A location-label based approach for privacy preserving in lbs. Futur Gener Comput Syst 74:375\u2013384. https:\/\/doi.org\/10.1016\/j.future.2016.08.023.","journal-title":"Futur Gener Comput Syst"},{"key":"272_CR13","doi-asserted-by":"publisher","unstructured":"Zhong G, Hengartner U (2009) A distributed k-anonymity protocol for location privacy In: 2009 IEEE International Conference on Pervasive Computing and Communications, 1\u201310. https:\/\/doi.org\/10.1109\/PERCOM.2009.4912774.","DOI":"10.1109\/PERCOM.2009.4912774"},{"issue":"10","key":"272_CR14","doi-asserted-by":"publisher","first-page":"9458","DOI":"10.1109\/TVT.2017.2703631","volume":"66","author":"M Ghaffari","year":"2017","unstructured":"Ghaffari M, Ghadiri N, Manshaei MH, Lahijani MS (2017) p4qs: A peer-to-peer privacy preserving query service for location-based mobile applications. IEEE Trans Veh Technol 66(10):9458\u20139469. https:\/\/doi.org\/10.1109\/TVT.2017.2703631.","journal-title":"IEEE Trans Veh Technol"},{"issue":"2","key":"272_CR15","doi-asserted-by":"publisher","first-page":"1033","DOI":"10.1109\/JIOT.2018.2799545","volume":"5","author":"P Zhao","year":"2018","unstructured":"Zhao P, Li J, Zeng F, Xiao F, Wang C, Jiang H (2018) Illia: Enabling k -anonymity-based privacy preserving against location injection attacks in continuous lbs queries. IEEE Internet Things J 5(2):1033\u20131042. https:\/\/doi.org\/10.1109\/JIOT.2018.2799545.","journal-title":"IEEE Internet Things J"},{"issue":"6","key":"272_CR16","doi-asserted-by":"publisher","first-page":"6114","DOI":"10.1109\/TVT.2019.2906819","volume":"68","author":"B Ying","year":"2019","unstructured":"Ying B, Nayak A (2019) A distributed social-aware location protection method in untrusted vehicular social networks. IEEE Trans Veh Technol 68(6):6114\u20136124. https:\/\/doi.org\/10.1109\/TVT.2019.2906819.","journal-title":"IEEE Trans Veh Technol"},{"key":"272_CR17","doi-asserted-by":"publisher","first-page":"797","DOI":"10.1016\/j.future.2019.04.026","volume":"100","author":"Z Li","year":"2019","unstructured":"Li Z, Li W, Wen Q, Chen J, Yin W, Liang K (2019) An efficient blind filter: Location privacy protection and the access control in fintech. Futur Gener Comput Syst 100:797\u2013810. https:\/\/doi.org\/10.1016\/j.future.2019.04.026.","journal-title":"Futur Gener Comput Syst"},{"issue":"6","key":"272_CR18","doi-asserted-by":"publisher","first-page":"4242","DOI":"10.1109\/TII.2019.2950057","volume":"16","author":"J Wang","year":"2020","unstructured":"Wang J, Cai Z, Yu J (2020) Achieving personalized k-anonymity-based content privacy for autonomous vehicles in cps. IEEE Trans Ind Inform 16(6):4242\u20134251. https:\/\/doi.org\/10.1109\/TII.2019.2950057.","journal-title":"IEEE Trans Ind Inform"},{"key":"272_CR19","doi-asserted-by":"publisher","unstructured":"Li F, Ge R, Zhou H, Wang Y, Liu Z, Yu XTesia: A trusted efficient service evaluation model in internet of things based on improved aggregation signature. Concurrency Comput Pract Experience:5739. https:\/\/doi.org\/10.1002\/cpe.5739.","DOI":"10.1002\/cpe.5739"},{"key":"272_CR20","doi-asserted-by":"publisher","first-page":"102641","DOI":"10.1016\/j.jnca.2020.102641","volume":"161","author":"Y Wang","year":"2020","unstructured":"Wang Y, Yang G, Li T, Li F, Tian Y, Yu X (2020) Belief and fairness: A secure two \u2212 party protocol toward the view of entropy for iot devices. J Netw Comput Appl 161:102641. https:\/\/doi.org\/10.1016\/j.jnca.2020.102641.","journal-title":"J Netw Comput Appl"},{"key":"272_CR21","doi-asserted-by":"publisher","unstructured":"Y S, Z K, Z H, Z GK-anonymous location privacy protections scheme based on the integration of game theory and blockchain. Comput Appl Res 38(5):7. https:\/\/doi.org\/10.19734\/j.issn.1001-3695.2019.10.0654.","DOI":"10.19734\/j.issn.1001-3695.2019.10.0654"},{"key":"272_CR22","unstructured":"Liu H, Xing-Hua LI, Luo B, Wang YW, Ren YB, Jian-Feng MA, Ding HF, Information SO (2019) Distributed k-anonymity location privacy protection scheme based on blockchain. J Comput."},{"issue":"7","key":"272_CR23","doi-asserted-by":"publisher","first-page":"3596","DOI":"10.1002\/int.22428","volume":"36","author":"T Li","year":"2021","unstructured":"Li T, Wang Z, Yang G, Cui Y, Chen Y, Yu X (2021) Semi-selfish mining based on hidden markov decision process. Int J Intell Syst 36(7):3596\u20133612. https:\/\/doi.org\/10.1002\/int.22428.","journal-title":"Int J Intell Syst"},{"key":"272_CR24","doi-asserted-by":"publisher","unstructured":"Li T, Chen Y, Wang Y, Wang Y, Zhao M, Zhu H, Tian Y, Yu X, Yang Y (2020) Rational protocols and attacks in blockchain system. Secur Commun Netw. https:\/\/doi.org\/10.1155\/2020\/8839047.","DOI":"10.1155\/2020\/8839047"},{"key":"272_CR25","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1016\/j.ins.2020.03.098","volume":"530","author":"Y Wang","year":"2020","unstructured":"Wang Y, Yang G, Bracciali A, Leung H. -f., Tian H, Ke L, Yu X (2020) Incentive compatible and anti \u2212 compounding of wealth in proof-of-stake. Inf Sci 530:85\u201394. https:\/\/doi.org\/10.1016\/j.ins.2020.03.098.","journal-title":"Inf Sci"},{"key":"272_CR26","doi-asserted-by":"publisher","first-page":"45655","DOI":"10.1109\/ACCESS.2018.2864189","volume":"6","author":"Z Lu","year":"2018","unstructured":"Lu Z, Liu W, Wang Q, Qu G, Liu Z (2018) A privacy \u2212 preserving trust model based on blockchain for vanets. IEEE Access 6:45655\u201345664. https:\/\/doi.org\/10.1109\/ACCESS.2018.2864189.","journal-title":"IEEE Access"},{"key":"272_CR27","doi-asserted-by":"publisher","unstructured":"Li X, Miao M, Liu H, Ma J, Li K-C (2017) An incentive mechanism for k-anonymity in lbs privacy protection based on credit mechanism. Soft Comput 21. https:\/\/doi.org\/10.1007\/s00500-016-2040-2.","DOI":"10.1007\/s00500-016-2040-2"},{"key":"272_CR28","doi-asserted-by":"publisher","unstructured":"Yang D, Fang X, Xue G (2013) Truthful incentive mechanisms for k-anonymity location privacy In: 2013 Proceedings IEEE INFOCOM, 2994\u20133002. https:\/\/doi.org\/10.1109\/INFCOM.2013.6567111.","DOI":"10.1109\/INFCOM.2013.6567111"},{"key":"272_CR29","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2020\/8864533","volume":"2020","author":"F Li","year":"2020","unstructured":"Li F, Wang D, Wang Y, Yu X, Wu N, Yu J, Zhou H (2020) Wireless communications and mobile computing blockchain-based trust management in distributed internet of things. Wirel Commun Mob Comput 2020:1\u201312. https:\/\/doi.org\/10.1155\/2020\/8864533.","journal-title":"Wirel Commun Mob Comput"},{"issue":"6","key":"272_CR30","doi-asserted-by":"publisher","first-page":"3765","DOI":"10.1109\/TITS.2020.3035869","volume":"22","author":"B Li","year":"2021","unstructured":"Li B, Liang R, Zhu D, Chen W, Lin Q (2021) Blockchain-based trust management model for location privacy preserving in vanet. IEEE Trans Intell Transp Syst 22(6):3765\u20133775. https:\/\/doi.org\/10.1109\/TITS.2020.3035869.","journal-title":"IEEE Trans Intell Transp Syst"},{"issue":"11","key":"272_CR31","doi-asserted-by":"publisher","first-page":"2528","DOI":"10.1109\/TIFS.2016.2587241","volume":"11","author":"Y Zhang","year":"2016","unstructured":"Zhang Y, Tong W, Zhong S (2016) On designing satisfaction-ratio-aware truthful incentive mechanisms for k -anonymity location privacy. Trans Info For Sec 11(11):2528\u20132541. https:\/\/doi.org\/10.1109\/TIFS.2016.2587241.","journal-title":"Trans Info For Sec"},{"key":"272_CR32","doi-asserted-by":"publisher","unstructured":"Li X, Miao M, Liu H, Ma J, Li K-C (2017) An incentive mechanism for k \u2212 anonymity in lbs privacy protection based on credit mechanism. Soft Comput 21. https:\/\/doi.org\/10.1007\/s00500-016-2040-2.","DOI":"10.1007\/s00500-016-2040-2"},{"key":"272_CR33","doi-asserted-by":"publisher","unstructured":"Chow CY, F. MM (2007) Enabling private continuous queries for revealed user locations In: Advances in Spatial and Temporal Databases, 10th International Symposium, 16\u201318. https:\/\/doi.org\/10.1007\/978-3-540-73540-3-15.","DOI":"10.1007\/978-3-540-73540-3-15"},{"key":"272_CR34","doi-asserted-by":"publisher","unstructured":"Gong X, Chen X, Xing K, Shin D-H, Zhang M, Zhang J (2015) Personalized location privacy in mobile networks: A social group utility approach In: 2015 IEEE Conference on Computer Communications (INFOCOM), 1008\u20131016. https:\/\/doi.org\/10.1109\/INFOCOM.2015.7218473.","DOI":"10.1109\/INFOCOM.2015.7218473"},{"key":"272_CR35","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1109\/TIFS.2019.2913232","volume":"15","author":"D Yuan","year":"2020","unstructured":"Yuan D, Li Q, Li G, Wang Q, Ren K (2020) Priradar: A privacy \u2212 preserving framework for spatial crowdsourcing. IEEE Trans Inf Forensic Secur 15:299\u2013314. https:\/\/doi.org\/10.1109\/TIFS.2019.2913232.","journal-title":"IEEE Trans Inf Forensic Secur"},{"issue":"6","key":"272_CR36","doi-asserted-by":"publisher","first-page":"4159","DOI":"10.1109\/TII.2020.3012157","volume":"17","author":"L Qi","year":"2021","unstructured":"Qi L, Hu C, Zhang X, Khosravi MR, Sharma S, Pang S, Wang T (2021) Privacy \u2212 aware data fusion and prediction with spatial \u2212 temporal context for smart city industrial environment. IEEE Trans Ind Inform 17(6):4159\u20134167. https:\/\/doi.org\/10.1109\/TII.2020.3012157.","journal-title":"IEEE Trans Ind Inform"},{"issue":"2","key":"272_CR37","doi-asserted-by":"publisher","first-page":"65","DOI":"10.26599\/BDMA.2020.9020013","volume":"4","author":"R Kumari","year":"2021","unstructured":"Kumari R, Kumar S, Poonia RC, Singh V, Raja L, Bhatnagar V, Agarwal P (2021) Analysis and predictions of spread, recovery, and death caused by covid \u221219 in india. Big Data Min Analytics 4(2):65\u201375. https:\/\/doi.org\/10.26599\/BDMA.2020.9020013.","journal-title":"Big Data Min Analytics"},{"issue":"6","key":"272_CR38","doi-asserted-by":"publisher","first-page":"845","DOI":"10.26599\/TST.2020.9010043","volume":"26","author":"S Xu","year":"2021","unstructured":"Xu S, Chen X, He Y (2021) Evchain: An anonymous blockchain-based system for charging-connected electric vehicles. Tsinghua Sci Technol 26(6):845\u2013856. https:\/\/doi.org\/10.26599\/TST.2020.9010043.","journal-title":"Tsinghua Sci Technol"},{"key":"272_CR39","doi-asserted-by":"publisher","unstructured":"Chen Y, Sun J, Yang Y, Li T, Niu X, Zhou HPsspr: A source location privacy protection scheme based on sector phantom routing in wsns. Int J Intell Syst. https:\/\/doi.org\/10.1002\/int.22666.","DOI":"10.1002\/int.22666"},{"issue":"1","key":"272_CR40","doi-asserted-by":"publisher","first-page":"1","DOI":"10.26599\/BDMA.2020.9020010","volume":"4","author":"M Azrour","year":"2021","unstructured":"Azrour M, Mabrouki J, Guezzaz A, Farhaoui Y (2021) New enhanced authentication protocol for internet of things. Big Data Min Analytics 4(1):1\u20139. https:\/\/doi.org\/10.26599\/BDMA.2020.9020010.","journal-title":"Big Data Min Analytics"},{"issue":"1","key":"272_CR41","doi-asserted-by":"publisher","first-page":"25","DOI":"10.26599\/BDMA.2020.9020018","volume":"4","author":"J Mabrouki","year":"2021","unstructured":"Mabrouki J, Azrour M, Dhiba D, Farhaoui Y, Hajjaji SE (2021) Iot-based data logger for weather monitoring using arduino-based wireless sensor networks with remote graphical application and alerts. Big Data Min Analytics 4(1):25\u201332. https:\/\/doi.org\/10.26599\/BDMA.2020.9020018.","journal-title":"Big Data Min Analytics"},{"issue":"6","key":"272_CR42","doi-asserted-by":"publisher","first-page":"894","DOI":"10.26599\/TST.2020.9010050","volume":"26","author":"H Chen","year":"2021","unstructured":"Chen H, Zhang Y, Cao Y, Xie J (2021) Security issues and defensive approaches in deep learning frameworks. Tsinghua Sci Technol 26(6):894\u2013905. https:\/\/doi.org\/10.26599\/TST.2020.9010050.","journal-title":"Tsinghua Sci Technol"},{"issue":"4","key":"272_CR43","doi-asserted-by":"publisher","first-page":"403","DOI":"10.26599\/TST.2020.9010014","volume":"26","author":"J Li","year":"2021","unstructured":"Li J, Pei X, Wang X, Yao D, Zhang Y, Yue Y (2021) Transportation mode identification with gps trajectory data and gis information. Tsinghua Sci Technol 26(4):403\u2013416. https:\/\/doi.org\/10.26599\/TST.2020.9010014.","journal-title":"Tsinghua Sci Technol"}],"container-title":["Journal of Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-021-00272-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13677-021-00272-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-021-00272-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,8]],"date-time":"2022-01-08T20:04:29Z","timestamp":1641672269000},"score":1,"resource":{"primary":{"URL":"https:\/\/journalofcloudcomputing.springeropen.com\/articles\/10.1186\/s13677-021-00272-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,8]]},"references-count":43,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,12]]}},"alternative-id":["272"],"URL":"https:\/\/doi.org\/10.1186\/s13677-021-00272-4","relation":{},"ISSN":["2192-113X"],"issn-type":[{"value":"2192-113X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,1,8]]},"assertion":[{"value":"1 September 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 November 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 January 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"2"}}