{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T01:37:21Z","timestamp":1768527441503,"version":"3.49.0"},"reference-count":63,"publisher":"MDPI AG","issue":"1","license":[{"start":{"date-parts":[[2024,1,4]],"date-time":"2024-01-04T00:00:00Z","timestamp":1704326400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"National Natural Science Foundation of China","award":["61373126"],"award-info":[{"award-number":["61373126"]}]},{"name":"National Natural Science Foundation of China","award":["2022YFG0161"],"award-info":[{"award-number":["2022YFG0161"]}]},{"name":"National Natural Science Foundation of China","award":["2023YFG0295"],"award-info":[{"award-number":["2023YFG0295"]}]},{"name":"Sichuan Provincial Science and Technology Department Project","award":["61373126"],"award-info":[{"award-number":["61373126"]}]},{"name":"Sichuan Provincial Science and Technology Department Project","award":["2022YFG0161"],"award-info":[{"award-number":["2022YFG0161"]}]},{"name":"Sichuan Provincial Science and Technology Department Project","award":["2023YFG0295"],"award-info":[{"award-number":["2023YFG0295"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Symmetry"],"abstract":"<jats:p>An intelligent logistics system is a production system based on the Internet of Things (IoT), and the logistics information of humans has a high degree of privacy. However, the current intelligent logistics system only protects the privacy of shippers and consignees, without any privacy protection for carriers, which will not only cause carriers\u2019 privacy leakage but also indirectly or directly affect the logistics efficiency. It is particularly worth noting that solving this problem requires one to consider the balance between privacy protection and operational visibility. So, the local privacy protection algorithm \u03f5-L_LDP for carriers\u2019 multidimensional numerical sensitive data and \u03f5-LT_LDP for carrier location sensitive data are proposed. For \u03f5-L_LDP, firstly, a personalized and locally differentiated privacy budgeting approach is used. Then, the multidimensional data personalization perturbation mechanism algorithm L-PM is designed. Finally, the multidimensional data are perturbed using L-PM. For \u03f5-LT_LDP, firstly, the location area is matrix-partitioned and quadtree indexed, and the location data are indexed according to the quadtree to obtain the geographic location code in which it is located. Secondly, the personalized random response perturbation algorithm L-RR for location trajectory data is also designed. Finally, the L-RR algorithm is used to implement the perturbation of geolocation-encoded data. Experiments are conducted using real and simulated datasets, the results show that the \u03f5-L_LDP algorithm and \u03f5-LT_LDP algorithm can better protect the privacy information of carriers and ensure the availability of carrier data during the logistics process. This effectively meets the balance between the privacy protection and operational visibility of the intelligent logistics system.<\/jats:p>","DOI":"10.3390\/sym16010068","type":"journal-article","created":{"date-parts":[[2024,1,4]],"date-time":"2024-01-04T05:23:30Z","timestamp":1704345810000},"page":"68","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Sensitive Data Privacy Protection of Carrier in Intelligent Logistics System"],"prefix":"10.3390","volume":"16","author":[{"given":"Zhengyi","family":"Yao","sequence":"first","affiliation":[{"name":"College of Computer Science, Sichuan Normal University, Chengdu 610066, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7363-6697","authenticated-orcid":false,"given":"Liang","family":"Tan","sequence":"additional","affiliation":[{"name":"College of Computer Science, Sichuan Normal University, Chengdu 610066, China"},{"name":"Institute of Computing Technology, Chinese Academy of Sciences, Beijing 100864, China"},{"name":"Institute of Cyberspace Security, University of Electronic Science and Technology of China, Chengdu 610054, China"}]},{"given":"Junhao","family":"Yi","sequence":"additional","affiliation":[{"name":"Software Engineering Department, Chengdu Jincheng College, Chengdu 611731, China"}]},{"given":"Luxia","family":"Fu","sequence":"additional","affiliation":[{"name":"College of Computer Science, Sichuan Normal University, Chengdu 610066, China"}]},{"given":"Zhuang","family":"Zhang","sequence":"additional","affiliation":[{"name":"College of Computer Science, Sichuan Normal University, Chengdu 610066, China"}]},{"given":"Xinghong","family":"Tan","sequence":"additional","affiliation":[{"name":"College of Computer Science, Sichuan Normal University, Chengdu 610066, China"}]},{"given":"Jingxue","family":"Xie","sequence":"additional","affiliation":[{"name":"College of Computer Science, Sichuan Normal University, Chengdu 610066, China"}]},{"given":"Kun","family":"She","sequence":"additional","affiliation":[{"name":"College of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu 610054, China"}]},{"given":"Peng","family":"Yang","sequence":"additional","affiliation":[{"name":"College of Computer Science, Sichuan Normal University, Chengdu 610066, China"}]},{"given":"Wanjing","family":"Wu","sequence":"additional","affiliation":[{"name":"College of Computer Science, Sichuan Normal University, Chengdu 610066, China"}]},{"given":"Danlian","family":"Ye","sequence":"additional","affiliation":[{"name":"College of Computer Science, Sichuan Normal University, Chengdu 610066, China"}]},{"given":"Ziyuan","family":"Yu","sequence":"additional","affiliation":[{"name":"College of Computer Science, Sichuan Normal University, Chengdu 610066, China"}]}],"member":"1968","published-online":{"date-parts":[[2024,1,4]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1109\/IOTM.0001.1900097","article-title":"Emerging smart logistics and transportation using IoT and blockchain","volume":"3","author":"Humayun","year":"2020","journal-title":"IEEE Internet Things Mag."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"323","DOI":"10.1080\/13675567.2020.1757053","article-title":"Smart logistics based on the internet of things technology: An overview","volume":"24","author":"Ding","year":"2021","journal-title":"Int. J. Logist. Res. Appl."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"4250","DOI":"10.1109\/JIOT.2020.3034385","article-title":"Applications of the Internet of Things (IoT) in smart logistics: A comprehensive survey","volume":"8","author":"Song","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"830","DOI":"10.1016\/j.ejor.2016.08.032","article-title":"Trends in transportation and logistics","volume":"264","author":"Speranza","year":"2018","journal-title":"Eur. J. Oper. Res."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"1039","DOI":"10.3390\/smartcities3030052","article-title":"IoT-enabled smart sustainable cities: Challenges and approaches","volume":"3","author":"Belli","year":"2020","journal-title":"Smart Cities"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"893","DOI":"10.1007\/s10479-021-04063-7","article-title":"The influence of leadership and smart level on the strategy choice of the smart logistics platform: A perspective of collaborative innovation participation","volume":"324","author":"Liu","year":"2021","journal-title":"Ann. Oper. Res."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"180","DOI":"10.1109\/CC.2017.8107642","article-title":"Design and implementation of cloud platform for intelligent logistics in the trend of intellectualization","volume":"14","author":"Yang","year":"2017","journal-title":"China Commun."},{"key":"ref_8","unstructured":"Mathew, E. (2020). Swarm Intelligence for Resource Management in Internet of Things, Elsevier."},{"key":"ref_9","unstructured":"Liu, S., and Wang, J. (2016, January 25\u201328). A security-enhanced express delivery system based on NFC. Proceedings of the 2016 13th IEEE International Conference on Solid-State and Integrated Circuit Technology (ICSICT), Hangzhou, China."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Lin, X., Jing, P., Yu, C., and Feng, X. (November, January 29). TPLI: A traceable privacy-preserving logistics information scheme via blockchain. Proceedings of the 2021 International Conference on Networking and Network Applications (NaNA), Lijiang, China.","DOI":"10.1109\/NaNA53684.2021.00066"},{"key":"ref_11","unstructured":"Waters, D. (2011). Supply Chain Risk Management: Vulnerability and Resilience in Logistics, Kogan Page Publishers."},{"key":"ref_12","unstructured":"Sativell, T., and Sabar, R. (2012, January 11\u201312). The threat of high value cargo faced by logistics companies. Proceedings of the Simposium Pengurusan Teknologi, Operasi & Logistik (SIPTIK III), Changlun, Malaysia."},{"key":"ref_13","unstructured":"NBC (2021, December 29). UPS Driver Kidnapped, Packages Stolen in Brazen Atlanta Heist. Available online: https:\/\/www.nbcnews.com."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Feng, C., Tan, L., Xiao, H., Yu, K., Qi, X., Wen, Z., and Jiang, Y. (2020, January 28\u201330). PDKSAP: Perfected double-key stealth address protocol without temporary key leakage in blockchain. Proceedings of the 2020 IEEE\/CIC International Conference on Communications in China (ICCC Workshops), Xiamen, China.","DOI":"10.1109\/ICCCWorkshops49972.2020.9209929"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"70604","DOI":"10.1109\/ACCESS.2020.2985762","article-title":"AuthPrivacyChain: A blockchain-based access control framework with privacy protection in cloud","volume":"8","author":"Yang","year":"2020","journal-title":"IEEE Access"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"77215","DOI":"10.1109\/ACCESS.2020.2988951","article-title":"A blockchain-based access control framework for cyber-physical-social system big data","volume":"8","author":"Tan","year":"2020","journal-title":"IEEE Access"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3433542","article-title":"A blockchain-empowered access control framework for smart devices in green internet of things","volume":"21","author":"Tan","year":"2021","journal-title":"ACM Trans. Internet Technol. (TOIT)"},{"key":"ref_18","unstructured":"Liu, X., Hu, B., Zhou, Q., and Liu, J. (2018). Frontier Computing: Theory, Technologies and Applications FC 2016 5, Springer."},{"key":"ref_19","unstructured":"L\u00e9aut\u00e9, T., and Faltings, B. (2011, January 16\u201322). Coordinating logistics operations with privacy guarantees. Proceedings of the Twenty-Second International Joint Conference on Artificial Intelligence (IJCAI\u201911), Barcelona, Spain."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Xu, F.J., Tong, F.C., and Tan, C.J. (2011, January 15\u201316). Auto-ID enabled tracking and tracing data sharing over dynamic B2B and B2G relationships. Proceedings of the 2011 IEEE International Conference on RFID-Technologies and Applications, Sitges, Spain.","DOI":"10.1109\/RFID-TA.2011.6068668"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"9436120","DOI":"10.1155\/2018\/9436120","article-title":"LIP-PA: A logistics information privacy protection scheme with position and attribute-based access control on mobile devices","volume":"2018","author":"Gao","year":"2018","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"ref_22","first-page":"555","article-title":"Express information protection application based on K-anonymity","volume":"31","author":"Qian","year":"2014","journal-title":"Appl. Res. Comput.\/Jisuanji Yingyong Yanjiu"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Qi, H., Chenjie, D., Yingbiao, Y., and Lei, L. (2015, January 14\u201315). A new express management system based on encrypted QR code. Proceedings of the 2015 8th International Conference on Intelligent Computation Technology and Automation (ICICTA), Nanchang, China.","DOI":"10.1109\/ICICTA.2015.22"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Zhang, X., Li, H., Yang, Y., Sun, G., and Chen, G. (2016, January 23\u201326). LIPPS: Logistics information privacy protection system based on encrypted QR code. Proceedings of the 2016 IEEE Trustcom\/BigDataSE\/ISPA, Tianjin, China.","DOI":"10.1109\/TrustCom.2016.0167"},{"key":"ref_25","first-page":"22","article-title":"Privacy-preserving scheme for logistics systems based on 2D code and information hiding","volume":"3","author":"Yan","year":"2017","journal-title":"Chin. J. Netw. Inf. Secur."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"2063","DOI":"10.1080\/00207543.2019.1650976","article-title":"Blockchain applications in supply chains, transport and logistics: A systematic review of the literature","volume":"58","author":"Pournader","year":"2020","journal-title":"Int. J. Prod. Res."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Tijan, E., Aksentijevi\u0107, S., Ivani\u0107, K., and Jardas, M. (2019). Blockchain technology implementation in logistics. Sustainability, 11.","DOI":"10.3390\/su11041185"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"826","DOI":"10.1016\/j.procir.2019.03.207","article-title":"Distributed logistics platform based on Blockchain and IoT","volume":"81","author":"Corn","year":"2019","journal-title":"Procedia CIRP"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"1002","DOI":"10.1080\/17517575.2019.1696988","article-title":"A secure logistics model based on blockchain","volume":"15","author":"Yi","year":"2021","journal-title":"Enterp. Inf. Syst."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"1","DOI":"10.4018\/JCIT.295249","article-title":"A Blockchain-Based Privacy Protection Application for Logistics Big Data","volume":"24","author":"Duan","year":"2022","journal-title":"J. Cases Inf. Technol. (JCIT)"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"4704","DOI":"10.1109\/JIOT.2021.3107846","article-title":"A privacy-preserving storage scheme for logistics data with assistance of blockchain","volume":"9","author":"Li","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"847","DOI":"10.3724\/SP.J.1016.2009.00847","article-title":"Privacy preservation in database applications: A survey","volume":"32","author":"Zhou","year":"2009","journal-title":"Chin. J. Comput."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1142\/S0218488502001648","article-title":"k-anonymity: A model for protecting privacy","volume":"10","author":"Sweeney","year":"2002","journal-title":"Int. J. Uncertain. Fuzziness Knowl.-Based Syst."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"3-es","DOI":"10.1145\/1217299.1217302","article-title":"l-diversity: Privacy beyond k-anonymity","volume":"1","author":"Machanavajjhala","year":"2007","journal-title":"ACM Trans. Knowl. Discov. Data (TKDD)"},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Li, N., Li, T., and Venkatasubramanian, S. (2007, January 17\u201320). t-closeness: Privacy beyond k-anonymity and l-diversity. Proceedings of the IEEE 23rd International Conference on Data Engineering, Istanbul, Turkey.","DOI":"10.1109\/ICDE.2007.367856"},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Wong, R.C.W., Li, J., Fu, A.W.C., and Wang, K. (2006, January 20\u201323). (\u03b1, k)-anonymity: An enhanced k-anonymity model for privacy preserving data publishing. Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Philadelphia, PA, USA.","DOI":"10.1145\/1150402.1150499"},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Ganta, S.R., Kasiviswanathan, S.P., and Smith, A. (2008, January 24\u201327). Composition attacks and auxiliary information in data privacy. Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Las Vegas, NV, USA.","DOI":"10.1145\/1401890.1401926"},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1993077.1993080","article-title":"Can the utility of anonymized data be used for privacy breaches?","volume":"5","author":"Wong","year":"2011","journal-title":"ACM Trans. Knowl. Discov. Data (TKDD)"},{"key":"ref_39","unstructured":"Dwork, C. (2008, January 25\u201329). Differential privacy: A survey of results. Proceedings of the International Conference on Theory and Applications of Models of Computation, Xi\u2019an, China."},{"key":"ref_40","unstructured":"Dwork, C., and Lei, J. (June, January 31). Differential privacy and robust statistics. Proceedings of the Forty-First Annual ACM Symposium on Theory of Computing, Bethesda, MD, USA."},{"key":"ref_41","unstructured":"Dwork, C., McSherry, F., Nissim, K., and Smith, A. (2006). Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, 4\u20137 March 2006, Springer. Proceedings 3."},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"McSherry, F., and Talwar, K. (2007, January 20\u201323). Mechanism design via differential privacy. Proceedings of the 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS\u201907), Providence, RI, USA.","DOI":"10.1109\/FOCS.2007.66"},{"key":"ref_43","unstructured":"Dwork, C., Naor, M., Pitassi, T., Rothblum, G.N., and Yekhanin, S. (2010, January 5\u20137). Pan-Private Streaming Algorithms. Proceedings of the Innovations in Computer Science\u2014ICS 2010, Beijing, China."},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"Duchi, J.C., Jordan, M.I., and Wainwright, M.J. (2013, January 26\u201329). Local privacy and statistical minimax rates. Proceedings of the 2013 IEEE 54th Annual Symposium on Foundations of Computer Science, Berkeley, CA, USA.","DOI":"10.1109\/FOCS.2013.53"},{"key":"ref_45","first-page":"1981","article-title":"Survey on local differential privacy","volume":"29","author":"Ye","year":"2018","journal-title":"J. Softw."},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Chen, R., Li, H., Qin, A.K., Kasiviswanathan, S.P., and Jin, H. (2016, January 16\u201320). Private spatial data aggregation in the local setting. Proceedings of the 2016 IEEE 32nd International Conference on Data Engineering (ICDE), Helsinki, Finland.","DOI":"10.1109\/ICDE.2016.7498248"},{"key":"ref_47","doi-asserted-by":"crossref","unstructured":"McSherry, F.D. (July, January 29). Privacy integrated queries: An extensible platform for privacy-preserving data analysis. Proceedings of the 2009 ACM SIGMOD International Conference on Management of Data, Providence, RI, USA.","DOI":"10.1145\/1559845.1559850"},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1080\/01621459.1965.10480775","article-title":"Randomized response: A survey technique for eliminating evasive answer bias","volume":"60","author":"Warner","year":"1965","journal-title":"J. Am. Stat. Assoc."},{"key":"ref_49","doi-asserted-by":"crossref","unstructured":"Fanti, G., Pihur, V., and Erlingsson, \u00da. (2015). Building a RAPPOR with the unknown: Privacy-preserving learning of associations and data dictionaries. arXiv.","DOI":"10.1515\/popets-2016-0015"},{"key":"ref_50","doi-asserted-by":"crossref","unstructured":"Erlingsson, \u00da., Pihur, V., and Korolova, A. (2014, January 3\u20137). Rappor: Randomized aggregatable privacy-preserving ordinal response. Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, AZ, USA.","DOI":"10.1145\/2660267.2660348"},{"key":"ref_51","doi-asserted-by":"crossref","unstructured":"Bassily, R., and Smith, A. (2015, January 14\u201317). Local, private, efficient protocols for succinct histogram. Proceedings of the Forty-Seventh Annual ACM Symposium on Theory of Computing, Portland, OR, USA.","DOI":"10.1145\/2746539.2746632"},{"key":"ref_52","unstructured":"Kairouz, P., Oh, S., and Viswanath, P. (2014, January 8\u201313). Extremal mechanisms for local differential privacy. Proceedings of the Advances in Neural Information Processing Systems, Montreal, QC, Canada."},{"key":"ref_53","doi-asserted-by":"crossref","unstructured":"Duchi, J.C., Jordan, M.I., and Wainwright, M.J. (2013). Local privacy, data processing inequalities, and statistical minimax rates. arXiv.","DOI":"10.1109\/FOCS.2013.53"},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2666468","article-title":"Privacy aware learning","volume":"61","author":"Duchi","year":"2014","journal-title":"J. ACM (JACM)"},{"key":"ref_55","unstructured":"Nguy\u00ean, T.T., Xiao, X., Yang, Y., Hui, S.C., Shin, H., and Shin, J. (2016). Collecting and analyzing data from smart device users with local differential privacy. arXiv."},{"key":"ref_56","doi-asserted-by":"crossref","unstructured":"Andr\u00e9s, M.E., Bordenabe, N.E., Chatzikokolakis, K., and Palamidessi, C. (201, January 4\u20138). Geo-indistinguishability: Differential privacy for location-based systems. Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, Berlin, Germany.","DOI":"10.1145\/2508859.2516735"},{"key":"ref_57","doi-asserted-by":"crossref","first-page":"182","DOI":"10.1080\/01621459.2017.1389735","article-title":"Minimax optimal procedures for locally private estimation","volume":"113","author":"Duchi","year":"2018","journal-title":"J. Am. Stat. Assoc."},{"key":"ref_58","doi-asserted-by":"crossref","unstructured":"Wang, N., Xiao, X., Yang, Y., Zhao, J., Hui, S.C., Shin, H., Shin, J., and Yu, G. (2019, January 8\u201311). Collecting and analyzing multidimensional data with local differential privacy. Proceedings of the 2019 IEEE 35th International Conference on Data Engineering (ICDE), Macao.","DOI":"10.1109\/ICDE.2019.00063"},{"key":"ref_59","doi-asserted-by":"crossref","unstructured":"Qardaji, W., Yang, W., and Li, N. (2013, January 8\u201312). Differentially private grids for geospatial data. Proceedings of the 2013 IEEE 29th International Conference on Data Engineering (ICDE), Brisbane, QLD, Australia.","DOI":"10.1109\/ICDE.2013.6544872"},{"key":"ref_60","doi-asserted-by":"crossref","first-page":"509","DOI":"10.1145\/361002.361007","article-title":"Multidimensional binary search trees used for associative searching","volume":"18","author":"Bentley","year":"1975","journal-title":"Commun. ACM"},{"key":"ref_61","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1145\/356924.356930","article-title":"The quadtree and related hierarchical data structure","volume":"16","author":"Samet","year":"1984","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"ref_62","doi-asserted-by":"crossref","first-page":"2868","DOI":"10.1109\/TII.2021.3116529","article-title":"Local trajectory privacy protection in 5G enabled industrial intelligent logistics","volume":"18","author":"Yang","year":"2021","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_63","unstructured":"Integrated Public Use Micro-Samples, \u201cIPUMS\u201d (2021, October 10). UPS Driver Kidnapped, Packages Stolen in Brazen Atlanta Heist. Available online: https:\/\/www.ipums.org."}],"container-title":["Symmetry"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-8994\/16\/1\/68\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T13:39:53Z","timestamp":1760103593000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-8994\/16\/1\/68"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,4]]},"references-count":63,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024,1]]}},"alternative-id":["sym16010068"],"URL":"https:\/\/doi.org\/10.3390\/sym16010068","relation":{},"ISSN":["2073-8994"],"issn-type":[{"value":"2073-8994","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,1,4]]}}}