{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:51:20Z","timestamp":1763344280539,"version":"3.45.0"},"reference-count":51,"publisher":"Tech Science Press","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.063984","type":"journal-article","created":{"date-parts":[[2025,5,19]],"date-time":"2025-05-19T04:45:22Z","timestamp":1747629922000},"page":"2273-2303","source":"Crossref","is-referenced-by-count":0,"title":["Design and Application of a New Distributed Dynamic Spatio-Temporal Privacy Preserving Mechanisms"],"prefix":"10.32604","volume":"84","author":[{"given":"Jiacheng","family":"Xiong","sequence":"first","affiliation":[]},{"given":"Xingshu","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Xiao","family":"Lan","sequence":"additional","affiliation":[]},{"given":"Liangguo","family":"Chen","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1109\/MCOMSTD.001.1900053","article-title":"Survey on the internet of vehicles: network architectures and applications","volume":"4","author":"Ji","year":"2020","journal-title":"IEEE Commun Stand Mag"},{"key":"ref2","first-page":"100182","article-title":"A survey on internet of vehicles: applications, security issues & solutions","volume":"20","author":"Sharma","year":"2019","journal-title":"Veh Commun"},{"key":"ref3","first-page":"1464","article-title":"Edge intelligence for adaptive multimedia streaming in heterogeneous internet of vehicles","volume":"22","author":"Dai","year":"2021","journal-title":"IEEE Trans Mob Comput"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"108613","DOI":"10.1016\/j.compeleceng.2023.108613","article-title":"An efficient privacy scheme for C-ITS stations","volume":"107","author":"Moussaoui","year":"2023","journal-title":"Comput Electr Eng"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"108778","DOI":"10.1016\/j.compeleceng.2023.108778","article-title":"Security and privacy protection communication protocol for internet of vehicles in smart cities","volume":"109","author":"Xu","year":"2023","journal-title":"Comput Electr Eng"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"106554","DOI":"10.1016\/j.compeleceng.2020.106554","volume":"82","author":"Amin","year":"2020","journal-title":"Comput Electr Eng"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1109\/JAS.2017.7510736","article-title":"Internet of vehicles in big data era","volume":"5","author":"Xu","year":"2017","journal-title":"IEEE CAA J Autom Sin"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1109\/MCE.2021.3092303","article-title":"Toward privacy protection composition framework on Internet of Vehicles","volume":"11","author":"Wu","year":"2021","journal-title":"IEEE Consum Electron Mag"},{"key":"ref9","series-title":"Proceedings of the Security and Privacy in the Internet of Vehicles","article-title":"Security and privacy in the internet of vehicles","author":"Sun","year":"2015 Oct 22\u201323"},{"key":"ref10","series-title":"Proceedings of the 2017 26th International Conference on Computer Communication and Networks (ICCCN)","article-title":"Internet of vehicles and autonomous connected car-privacy and security issues","author":"Joy","year":"2017 Jul 31\u2013Aug 3"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"106713","DOI":"10.1016\/j.compeleceng.2020.106713","article-title":"Blockchain-based asymmetric group key agreement protocol for internet of vehicles","volume":"86","author":"Zhang","year":"2020","journal-title":"Comput Electr Eng"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"127","DOI":"10.26599\/TST.2020.9010031","article-title":"IDEA: a utility-enhanced approach to incomplete data stream anonymization","volume":"27","author":"Yang","year":"2021","journal-title":"Tsinghua Sci Technol"},{"key":"ref13","first-page":"24","article-title":"A state-of-the-art review of data stream anonymization schemes","author":"Sakpere","year":"2014","journal-title":"Inf Secur Divers Comput Environ"},{"key":"ref14","series-title":"Proceedings of the 2015 International Conference on Information Systems Security and Privacy (ICISSP)","article-title":"Adaptive buffer resizing for efficient anonymization of streaming data with minimal information loss","author":"Sakpere","year":"2015 Feb 9\u201311"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"6940","DOI":"10.1109\/TWC.2017.2734758","article-title":"Incentivizing crowdsensing with location-privacy preserving","volume":"16","author":"Wang","year":"2017","journal-title":"IEEE Trans Wirel Commun"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"2948","DOI":"10.1016\/j.ins.2009.05.004","article-title":"K-Anonymous data collection","volume":"179","author":"Zhong","year":"2009","journal-title":"Inf Sci"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"402","DOI":"10.1109\/TIFS.2012.2235831","article-title":"Privacy preserving data sharing with anonymous ID assignment","volume":"8","author":"Dunning","year":"2012","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"ref18","first-page":"2528","article-title":"Slide window method adapted for privacy-preserving: transactional data streams","volume":"8","author":"Kumar","year":"2021","journal-title":"Eur J Mol Clin Med"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"1008","DOI":"10.1016\/j.jcss.2014.02.007","article-title":"A hybrid approach for scalable sub-tree anonymization over big data using MapReduce on cloud","volume":"80","author":"Zhang","year":"2014","journal-title":"J Comput Syst Sci"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"79","DOI":"10.14778\/3626292.3626293","article-title":"Cryptographically secure private record linkage using locality-sensitive hashing","volume":"17","author":"Wei","year":"2023","journal-title":"Proc VLDB Endow"},{"key":"ref21","series-title":"Proceedings of the 2008 IEEE 24th International Conference on Data Engineering","article-title":"CASTLE: a delay-constrained scheme for ks-anonymizing data streams","author":"Cao","year":"2008 Apr 7\u201312"},{"key":"ref22","first-page":"2171","article-title":"Enhanced clustering based OSN privacy preservation to ensure k-anonymity, t-closeness, l-diversity, and balanced privacy utility","volume":"75","author":"Gangarde","year":"2023","journal-title":"Comput Mater Contin"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1142\/S0218488502001648","article-title":"K-Anonymity: a model for protecting privacy","volume":"10","author":"Sweeney","year":"2002","journal-title":"Int J Uncertain Fuzziness Knowl-Based Syst"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"627","DOI":"10.1197\/jamia.M2716","article-title":"Protecting privacy using k-anonymity","volume":"15","author":"El Emam","year":"2008","journal-title":"J Am Med Inform Assoc"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"571","DOI":"10.1142\/S021848850200165X","article-title":"Achieving k-anonymity privacy protection using generalization and suppression","volume":"10","author":"Sweeney","year":"2002","journal-title":"Int J Uncertain Fuzziness Knowl-Based Syst"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1145\/1217299.1217302","article-title":"L-diversity: privacy beyond k-anonymity","volume":"1","author":"Machanavajjhala","year":"2007","journal-title":"ACM Trans Knowl Discov Data"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"122878","DOI":"10.1109\/ACCESS.2019.2936301","article-title":"Efficient L-diversity algorithm for preserving privacy of dynamically published datasets","volume":"7","author":"Temuujin","year":"2019","journal-title":"IEEE Access"},{"key":"ref28","series-title":"Proceedings of the 2007 IEEE 23rd International Conference on Data Engineering","article-title":"T-closeness: privacy beyond k-anonymity and l-diversity","author":"Li","year":"2007 Apr 15\u201320"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"1231","DOI":"10.1007\/s11390-018-1884-6","article-title":"Privacy-preserving algorithms for multiple sensitive attributes satisfying t-closeness","volume":"33","author":"Wang","year":"2018","journal-title":"J Comput Sci Technol"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1080\/07421222.2018.1550550","article-title":"Regulating cryptocurrencies: a supervised machine learning approach to de-anonymizing the bitcoin blockchain","volume":"36","author":"Sun","year":"2019","journal-title":"J Manag Inf Syst"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3417987","article-title":"Security and privacy in IoT using machine learning and blockchain: threats and countermeasures","volume":"53","author":"Waheed","year":"2020","journal-title":"ACM Comput Surv"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"53066","DOI":"10.1109\/ACCESS.2022.3175219","article-title":"Toward privacy preservation using clustering based anonymization: recent advances and future research outlook","volume":"10","author":"Majeed","year":"2022","journal-title":"IEEE Access"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"103066","DOI":"10.1016\/j.jnca.2021.103066","article-title":"DP-GAN: differentially private consecutive data publishing using generative adversarial nets","volume":"185","author":"Ho","year":"2021","journal-title":"J Netw Comput Appl"},{"key":"ref34","first-page":"2094","article-title":"An adaptive approach to real-time aggregate monitoring with differential privacy","volume":"26","author":"Fan","year":"2013","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"ref35","article-title":"Privacy-preserving edge-aided eigenvalue decomposition in internet of things","author":"Zhao","year":"2025","journal-title":"IEEE Internet Things J Forthcoming"},{"key":"ref36","doi-asserted-by":"crossref","first-page":"415","DOI":"10.1016\/j.clinbiomech.2004.01.005","article-title":"PCA in studying coordination and variability: a tutorial","volume":"19","author":"Daffertshofer","year":"2004","journal-title":"Clin Biomech"},{"key":"ref37","doi-asserted-by":"crossref","first-page":"535","DOI":"10.1109\/TKDE.2005.53","article-title":"Antipole tree indexing to support range search and k-nearest neighbor search in metric spaces","volume":"17","author":"Cantone","year":"2005","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"ref38","doi-asserted-by":"crossref","first-page":"100276","DOI":"10.1016\/j.cosrev.2020.100276","article-title":"Multidisciplinary pattern recognition applications: a review","volume":"37","author":"Paolanti","year":"2020","journal-title":"Comput Sci Rev"},{"key":"ref39","doi-asserted-by":"crossref","first-page":"629","DOI":"10.3390\/s23020629","article-title":"Survey on exact kNN queries over high-dimensional data space","volume":"23","author":"Ukey","year":"2023","journal-title":"Sensors"},{"key":"ref40","first-page":"993","author":"Samet","year":"2006","journal-title":"Foundations of multidimensional and metric data structures"},{"key":"ref41","doi-asserted-by":"crossref","first-page":"2375","DOI":"10.3390\/electronics12112375","article-title":"k-NN query optimization for high-dimensional index using machine learning","volume":"12","author":"Choi","year":"2023","journal-title":"Electronics"},{"key":"ref42","series-title":"Proceedings of the 2018 IEEE Punecon","article-title":"Anonymization techniques for protecting privacy: a survey","author":"Pawar","year":"2018 Nov 30\u2013Dec 2"},{"key":"ref43","doi-asserted-by":"crossref","first-page":"e12297","DOI":"10.1002\/eng2.12297","article-title":"Parking recommender system privacy preservation through anonymization and differential privacy","volume":"3","author":"Saleem","year":"2021","journal-title":"Eng Rep"},{"key":"ref44","doi-asserted-by":"crossref","first-page":"5403","DOI":"10.1109\/TVT.2020.2977829","article-title":"Fbia: a fog-based identity authentication scheme for privacy preservation in internet of vehicles","volume":"69","author":"Song","year":"2020","journal-title":"IEEE Trans Veh Technol"},{"key":"ref45","series-title":"Proceedings of the 2017 14th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON)","article-title":"Beyond k-anonymity: protect your trajectory from semantic attack","author":"Tu","year":"2017 Jun 12\u201314"},{"key":"ref46","doi-asserted-by":"crossref","first-page":"5850","DOI":"10.1109\/TVT.2020.2972278","article-title":"BloCkEd: blockchain-based secure data processing framework in edge envisioned V2X environment","volume":"69","author":"Aujla","year":"2020","journal-title":"IEEE Trans Veh Technol"},{"key":"ref47","doi-asserted-by":"crossref","first-page":"154","DOI":"10.1007\/PL00010672","article-title":"Dynamic VP-Tree indexing for n-nearest neighbor search given pair-wise distances","volume":"9","author":"Fu","year":"2000","journal-title":"VLDB J"},{"key":"ref48","series-title":"Proceedings of the 2017 8th IEEE International Conference on Software Engineering and Service Science (ICSESS)","article-title":"The research on nearest neighbor search algorithm based on vantage point tree","author":"Jiang","year":"2017 Nov 24\u201326"},{"key":"ref49","series-title":"Proceedings of the Computer Vision\u2013ECCV 2008: 10th European Conference on Computer Vision","article-title":"What is a good nearest neighbors algorithm for finding similar patches in images?","author":"Kumar","year":"2008 Oct 12\u201318"},{"key":"ref50","series-title":"Proceedings of the eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","article-title":"Transforming data to satisfy privacy constraints","author":"Iyengar","year":"2002 Jul 23\u201326"},{"key":"ref51","series-title":"Proceedings of the 33rd International Conference on Very Large Data Bases","article-title":"Fast data anonymization with low information loss","author":"Ghinita","year":"2007 Sep 23\u201327"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-84-2\/TSP_CMC_63984\/TSP_CMC_63984.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:49:05Z","timestamp":1763344145000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v84n2\/62880"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":51,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.063984","relation":{},"ISSN":["1546-2226"],"issn-type":[{"type":"electronic","value":"1546-2226"}],"subject":[],"published":{"date-parts":[[2025]]}}}