{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T15:56:52Z","timestamp":1774454212922,"version":"3.50.1"},"reference-count":33,"publisher":"Tech Science Press","issue":"3","license":[{"start":{"date-parts":[[2024,12,29]],"date-time":"2024-12-29T00:00:00Z","timestamp":1735430400000},"content-version":"vor","delay-in-days":363,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2024]]},"DOI":"10.32604\/cmc.2024.057131","type":"journal-article","created":{"date-parts":[[2024,10,18]],"date-time":"2024-10-18T06:56:53Z","timestamp":1729234613000},"page":"3781-3804","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":1,"title":["A Location Trajectory Privacy Protection Method Based on Generative Adversarial Network and Attention Mechanism"],"prefix":"10.32604","volume":"81","author":[{"given":"Xirui","family":"Yang","sequence":"first","affiliation":[]},{"given":"Chen","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2024]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"1703","DOI":"10.1111\/tgis.12924","article-title":"PrivyTo: A privacy-preserving location-sharing platform","volume":"26","author":"McKenzie","year":"2022","journal-title":"Trans. GIS"},{"key":"ref2","article-title":"Privacy protection for Wi-Fi location positioning systems","volume":"58","author":"Boutet","year":"2021","journal-title":"J. Inf. Secur. Appl."},{"key":"ref3","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1109\/JIOT.2022.3202628","article-title":"Deep-distributed-learning-based POI recommendation under mobile-edge networks","volume":"10","author":"Guo","year":"2023","journal-title":"IEEE Internet Things J."},{"key":"ref4","first-page":"1","article-title":"Context-aware semantic annotation of mobility records","volume":"16","author":"Wang","year":"2021","journal-title":"ACM Trans. Knowl. Discov. Data."},{"key":"ref5","first-page":"58","article-title":"The livehoods project: Utilizing social media to understand the dynamics of a city","volume":"6","author":"Cranshaw","journal-title":"Proc. Sixth Int. AAAI Conf. Weblogs Soc. Med. (ICWSM)"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"88651","DOI":"10.1109\/ACCESS.2021.3090582","article-title":"Human mobility prediction with region-based flows and water consumption","volume":"9","author":"Terroso-S\u00e1enz","year":"2021","journal-title":"IEEE Access"},{"key":"ref7","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2022.102665","article-title":"On the privacy protection of indoor location dataset using anonymization","volume":"117","author":"Fathalizadeh","year":"2022","journal-title":"Comput. Secur."},{"key":"ref8","doi-asserted-by":"crossref","first-page":"178","DOI":"10.1016\/j.comcom.2023.09.009","article-title":"Privacy-friendly statistical counting for pedestrian dynamics","volume":"211","author":"Stanciu","year":"2023","journal-title":"Comput. Commun."},{"key":"ref9","doi-asserted-by":"crossref","first-page":"523","DOI":"10.1007\/s11069-016-2329-6","article-title":"Spatial, temporal, and content analysis of Twitter for wildfire hazards","volume":"83","author":"Wang","year":"2016","journal-title":"Nat. Hazards"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"1549","DOI":"10.3390\/ijgi4031549","article-title":"Geographic situational awareness: Mining tweets for disaster preparedness, emergency response, impact, and recovery","volume":"4","author":"Huang","year":"2015","journal-title":"ISPRS Int. J. Geo Inf."},{"key":"ref11","article-title":"A privacy-preserving trajectory data synthesis framework based on differential privacy","volume":"77","author":"Ma","year":"2023","journal-title":"J. Inf. Secur. Appl."},{"key":"ref12","doi-asserted-by":"crossref","first-page":"150","DOI":"10.1080\/13658816.2019.1654109","article-title":"Modelling perceived risks to personal privacy from location disclosure on online social networks","volume":"34","author":"Alrayes","year":"2020","journal-title":"Int. J. Geogr. Inf. Sci."},{"key":"ref13","doi-asserted-by":"crossref","first-page":"567","DOI":"10.1007\/978-981-15-8983-6_32","author":"Dobson","year":"2021","journal-title":"Urban Informatics"},{"key":"ref14","first-page":"105","article-title":"Exploring the effectiveness of geomasking techniques for protecting the geoprivacy of Twitter users","volume":"2019","author":"Gao","year":"2019","journal-title":"J. Spatial Inf. Sci."},{"key":"ref15","doi-asserted-by":"crossref","first-page":"2538","DOI":"10.1080\/13658816.2023.2262550","article-title":"CATS: Conditional adversarial trajectory synthesis for privacy-preserving trajectory data publication using deep learning approaches","volume":"37","author":"Rao","year":"2023","journal-title":"Int. J. Geogr. Inf. Sci."},{"key":"ref16","series-title":"2020 Int. Conf. Localization GNSS (ICL-GNSS)","first-page":"1","article-title":"Privacy versus location accuracy in opportunistic wearable networks","author":"Shubina","year":"2020"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1016\/j.comcom.2020.03.027","article-title":"Privacy protection-based incentive mechanism for mobile crowdsensing","volume":"156","author":"Tao","year":"2020","journal-title":"Comput. Commun."},{"key":"ref18","doi-asserted-by":"crossref","first-page":"385","DOI":"10.1080\/15230406.2022.2056510","article-title":"An exploratory assessment of the effectiveness of geomasking methods on privacy protection and analytical accuracy for individual-level geospatial data","volume":"49","author":"Wang","year":"2022","journal-title":"Cartogr. Geogr. Inf. Sci."},{"key":"ref19","series-title":"Proc. 12th Int. Conf. Meas. Technol. Mechatron. Autom. (ICMTMA)","first-page":"953","article-title":"Research on user privacy protection algorithm in location service","author":"Liu","year":"2020"},{"key":"ref20","series-title":"Proc. 5th Int. Confe. Big Data Comput. Commun. (BIGCOM)","first-page":"142","article-title":"Real-location reporting based differential privacy trajectory protection for mobile crowdsensing","author":"Chen","year":"2019"},{"key":"ref21","series-title":"Web Information Systems and Applications","first-page":"347","article-title":"Private trajectory data publication for trajectory classification","volume":"11817","author":"Zhu","year":"2019"},{"key":"ref22","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2021.102310","article-title":"Joint obfuscation of location and its semantic information for privacy protection","volume":"107","author":"Bostanipour","year":"2021","journal-title":"Comput. Secur."},{"key":"ref23","doi-asserted-by":"crossref","first-page":"1428","DOI":"10.1080\/13658816.2019.1707835","article-title":"MARC: A robust method for multiple-aspect trajectory classification via space, time, and semantic embeddings","volume":"34","author":"May Petry","year":"2020","journal-title":"Int. J. Geogr. Inf. Sci."},{"key":"ref24","series-title":"Proc. 27th Int. Conf. Neural Inf. Process. Syst.","first-page":"2672","article-title":"Generative adversarial nets","volume":"2","author":"Goodfellow","year":"2014"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"e342","DOI":"10.1016\/S2589-7500(20)30133-3","article-title":"The need for privacy with public digital contact tracing during the COVID-19 pandemic","volume":"2","author":"Bengio","year":"2020","journal-title":"Lancet Digit. Health"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"15796","DOI":"10.1109\/JIOT.2020.3024180","article-title":"A first look at privacy analysis of COVID-19 contact-tracing mobile applications","volume":"8","author":"Azad","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"ref27","unstructured":"C. Troncoso et al., \u201cDecentralized privacy-preserving proximity tracing,\u201d 2020. doi: 10.48550\/arXiv.2005.12273."},{"key":"ref28","doi-asserted-by":"crossref","first-page":"8256","DOI":"10.1109\/TMC.2023.3348136","article-title":"Privacy-preserving location-based advertising via longitudinal geo-indistinguishability","volume":"23","author":"Yu","year":"2024","journal-title":"IEEE Trans. Mob. Comput."},{"key":"ref29","doi-asserted-by":"crossref","first-page":"776","DOI":"10.1109\/TKDE.2020.2986198","article-title":"Maximizing the utility in location-based mobile advertising","volume":"34","author":"Cheng","year":"2022","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"ref30","doi-asserted-by":"crossref","first-page":"1770","DOI":"10.1109\/TKDE.2018.2805356","article-title":"Privacy enhanced matrix factorization for recommendation with local differential privacy","volume":"30","author":"Shin","year":"2018","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"ref31","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1109\/TSMC.2014.2327053","article-title":"Modeling user activity preference by leveraging user spatial temporal characteristics in LBSNs","volume":"45","author":"Yang","year":"2015","journal-title":"IEEE Trans. Syst., Man, Cybern.: Syst."},{"key":"ref32","series-title":"11th Int. Conf. Geogr. Inf. Sci. (GIScience 2021)","first-page":"12:1","article-title":"LSTM-TrajGAN: A deep learning approach to trajectory privacy protection","volume":"177","author":"Rao","year":"2020"},{"key":"ref33","series-title":"19th Int. Conf. Wirel. Mob. Comput. Netw. Commun. (WiMob)","first-page":"306","article-title":"Privacy vs utility analysis when applying differential privacy on machine learning classifiers","author":"Selvarathnam","year":"2023"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.techscience.com\/cmc\/v81n3\/59039\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,7]],"date-time":"2025-03-07T06:06:20Z","timestamp":1741327580000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v81n3\/59039"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":33,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2024]]},"published-print":{"date-parts":[[2024]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2024.057131","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"2024-08-08","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-09-30","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-12-19","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}