{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,17]],"date-time":"2023-09-17T08:15:42Z","timestamp":1694938542045},"reference-count":31,"publisher":"IGI Global","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,7]]},"abstract":"<jats:p>Mobility patterns mined from released trajectories can help to allocate resources and provide personalized services, although these also pose a threat to personal location privacy. As the existing sanitization methods cannot deal with the problems of location privacy inference attacks based on privacy-sensitive sequence pattern networks, the authors proposed a method of sanitizing the privacy-sensitive sequence pattern networks mined from trajectories released by identifying and removing influential nodes from the networks. The authors conducted extensive experiments and the results were shown that by adjusting the parameter of the proportional factors, the proposed method can thoroughly sanitize privacy-sensitive sequence pattern networks and achieve the optimal values for security degree and connectivity degree measurements. In addition, the performance of the proposed method was shown to be stable for multiple networks with basically the same privacy-sensitive node ratio and be scalable for batches of networks with different sensitive nodes ratios.<\/jats:p>","DOI":"10.4018\/ijdwm.2019070104","type":"journal-article","created":{"date-parts":[[2019,5,14]],"date-time":"2019-05-14T17:27:03Z","timestamp":1557854823000},"page":"63-89","source":"Crossref","is-referenced-by-count":0,"title":["A Method of Sanitizing Privacy-Sensitive Sequence Pattern Networks Mined From Trajectories Released"],"prefix":"10.4018","volume":"15","author":[{"given":"Haitao","family":"Zhang","sequence":"first","affiliation":[{"name":"Nanjing University of Posts and Telecommunications, Nanjing, China"}]},{"given":"Yunhong","family":"Zhu","sequence":"additional","affiliation":[{"name":"Nanjing University of Posts and Telecommunications, Nanjing, China"}]}],"member":"2432","reference":[{"key":"IJDWM.2019070104-0","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-70992-5_2"},{"key":"IJDWM.2019070104-1","doi-asserted-by":"publisher","DOI":"10.1038\/35019019"},{"key":"IJDWM.2019070104-2","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0016591"},{"key":"IJDWM.2019070104-3","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0906910106"},{"key":"IJDWM.2019070104-4","doi-asserted-by":"publisher","DOI":"10.1140\/epjds\/s13688-015-0046-0"},{"key":"IJDWM.2019070104-5","doi-asserted-by":"publisher","DOI":"10.1201\/b10373"},{"key":"IJDWM.2019070104-6","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1145\/2076623.2076627","article-title":"Trajectory data analysis using complex networks.","author":"I. R.Brilhante","year":"2011","journal-title":"Symposium on International Database Engineering & Applications"},{"key":"IJDWM.2019070104-7","doi-asserted-by":"publisher","DOI":"10.1126\/science.1245200"},{"key":"IJDWM.2019070104-8","doi-asserted-by":"crossref","unstructured":"Cho, E., Myers, S. A., & Leskovec, J. (2011). Friendship and mobility:user movement in location-based social networks. In Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, San Diego, CA (pp.1082-1090). DBLP.","DOI":"10.1145\/2020408.2020579"},{"key":"IJDWM.2019070104-9","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.86.3682"},{"key":"IJDWM.2019070104-10","doi-asserted-by":"publisher","DOI":"10.1038\/srep01376"},{"key":"IJDWM.2019070104-11","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0120449"},{"key":"IJDWM.2019070104-12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-73198-8_27"},{"key":"IJDWM.2019070104-13","first-page":"496","article-title":"Robustness analysis of interdependent networks under multiple-attacking strategies.","author":"Y. L.Gao","year":"2017","journal-title":"Physica A"},{"key":"IJDWM.2019070104-14","doi-asserted-by":"publisher","DOI":"10.1109\/MDM.2011.103"},{"key":"IJDWM.2019070104-15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-75177-9"},{"key":"IJDWM.2019070104-16","doi-asserted-by":"publisher","DOI":"10.1140\/epjds\/s13688-016-0067-3"},{"key":"IJDWM.2019070104-17","doi-asserted-by":"publisher","DOI":"10.1109\/TMECH.2015.2493980"},{"issue":"3","key":"IJDWM.2019070104-18","first-page":"1","article-title":"Efficient task assignment in spatial crowdsourcing with worker and task privacy protection.","author":"A.Liu","year":"2017","journal-title":"GeoInformatica"},{"key":"IJDWM.2019070104-19","doi-asserted-by":"publisher","DOI":"10.1038\/ncomms7007"},{"issue":"2973","key":"IJDWM.2019070104-20","doi-asserted-by":"crossref","first-page":"5276","DOI":"10.1038\/srep05276","article-title":"From mobile phone data to the spatial structure of cities.","volume":"4","author":"T.Louail","year":"2014","journal-title":"Scientific Reports"},{"key":"IJDWM.2019070104-21","doi-asserted-by":"publisher","DOI":"10.1140\/epjds\/s13688-014-0010-4"},{"key":"IJDWM.2019070104-22","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2012.210"},{"key":"IJDWM.2019070104-23","first-page":"1","article-title":"The DAEDALUS framework:progressive querying and mining of movement data.","author":"R.Ortale","year":"2008","journal-title":"Proceedings of the 16th ACM SIGSPATIAL international conference on Advances in geographic information systems"},{"key":"IJDWM.2019070104-24","first-page":"13","article-title":"MHHUSP: An integrated algorithm for mining and Hiding High Utility Sequential Patterns.","author":"M. N.Quang","year":"2016","journal-title":"Eighth International Conference on Knowledge and Systems Engineering"},{"issue":"7","key":"IJDWM.2019070104-25","doi-asserted-by":"crossref","first-page":"30","DOI":"10.5120\/ijca2016907917","article-title":"Survey on Privacy Preserving Data Mining Techniques using Recent Algorithms.","volume":"133","author":"N.Rajesh","year":"2016","journal-title":"International Journal of Computers and Applications"},{"key":"IJDWM.2019070104-26","doi-asserted-by":"publisher","DOI":"10.1145\/2955129.2955169"},{"key":"IJDWM.2019070104-27","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0133630"},{"key":"IJDWM.2019070104-28","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0182232"},{"key":"IJDWM.2019070104-29","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2018.2825158"},{"key":"IJDWM.2019070104-30","doi-asserted-by":"crossref","unstructured":"Y. Zhu, G. Zheng., & K. K. Wong. (2019). Blockchain Empowered Decentralized Storage in Air-to-Ground Industrial Networks. IEEE Transactions on Industrial Informatics.","DOI":"10.1109\/TII.2019.2903559"}],"container-title":["International Journal of Data Warehousing and Mining"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=228938","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,16]],"date-time":"2023-09-16T15:32:31Z","timestamp":1694878351000},"score":1,"resource":{"primary":{"URL":"http:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJDWM.2019070104"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2019,7]]},"references-count":31,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.4018\/ijdwm.2019070104","relation":{},"ISSN":["1548-3924","1548-3932"],"issn-type":[{"value":"1548-3924","type":"print"},{"value":"1548-3932","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,7]]}}}