{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T02:25:45Z","timestamp":1740104745894,"version":"3.37.3"},"reference-count":48,"publisher":"Wiley","issue":"12","license":[{"start":{"date-parts":[[2022,11,27]],"date-time":"2022-11-27T00:00:00Z","timestamp":1669507200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"},{"start":{"date-parts":[[2022,11,27]],"date-time":"2022-11-27T00:00:00Z","timestamp":1669507200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Int J of Intelligent Sys"],"published-print":{"date-parts":[[2022,12]]},"DOI":"10.1002\/int.23095","type":"journal-article","created":{"date-parts":[[2022,11,27]],"date-time":"2022-11-27T20:32:37Z","timestamp":1669581157000},"page":"12490-12510","update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Secure storage scheme of trajectory data for digital tracking mechanism"],"prefix":"10.1155","volume":"37","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8723-2389","authenticated-orcid":false,"given":"Junhua","family":"Wu","sequence":"first","affiliation":[{"name":"School of Computer Science Qufu Normal University Rizhao China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1173-9543","authenticated-orcid":false,"given":"Tiantian","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Computer Science Qufu Normal University Rizhao China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8036-5493","authenticated-orcid":false,"given":"Guangshun","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computer Science Qufu Normal University Rizhao China"}]},{"given":"Kan","family":"Yu","sequence":"additional","affiliation":[{"name":"School of Computer Science Qufu Normal University Rizhao China"}]},{"given":"Chuanwen","family":"Luo","sequence":"additional","affiliation":[{"name":"School of Information Science and Technology Beijing Forestry University Beijing China"}]}],"member":"311","published-online":{"date-parts":[[2022,11,27]]},"reference":[{"key":"e_1_2_11_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2021.3058783"},{"key":"e_1_2_11_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2020.3026060"},{"key":"e_1_2_11_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2021.3055675"},{"key":"e_1_2_11_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2019.00014"},{"key":"e_1_2_11_6_1","doi-asserted-by":"publisher","DOI":"10.1002\/int.22365"},{"key":"e_1_2_11_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-37352-8_11"},{"key":"e_1_2_11_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2020.3015835"},{"key":"e_1_2_11_9_1","doi-asserted-by":"publisher","DOI":"10.1002\/int.22428"},{"key":"e_1_2_11_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.09.064"},{"key":"e_1_2_11_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2911697"},{"key":"e_1_2_11_12_1","first-page":"1","article-title":"IIDQN: an incentive improved DQN algorithm in EBSN recommender system","author":"Guo J","year":"2022","journal-title":"Secur Commun Networks"},{"key":"e_1_2_11_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2553182"},{"key":"e_1_2_11_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2950057"},{"key":"e_1_2_11_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2787987"},{"key":"e_1_2_11_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/NaNA.2017.47"},{"key":"e_1_2_11_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2015.2469649"},{"key":"e_1_2_11_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2021.01.050"},{"issue":"6","key":"e_1_2_11_19_1","first-page":"2969","article-title":"NPMML: a framework for non\u2010interactive privacy\u2010preserving multi\u2010party machine learning","volume":"18","author":"Li T","year":"2021","journal-title":"IEEE Trans Dependable Secur Comput"},{"key":"e_1_2_11_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2020.106782"},{"key":"e_1_2_11_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2021.3106264"},{"key":"e_1_2_11_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.3015886"},{"key":"e_1_2_11_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2021.3108463"},{"key":"e_1_2_11_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2894411"},{"key":"e_1_2_11_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2022.04.008"},{"key":"e_1_2_11_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2022.3196840"},{"key":"e_1_2_11_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.05.054"},{"key":"e_1_2_11_28_1","doi-asserted-by":"publisher","DOI":"10.23919\/APNOMS.2019.8893014"},{"key":"e_1_2_11_29_1","doi-asserted-by":"publisher","DOI":"10.3390\/ijgi6060163"},{"key":"e_1_2_11_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2019.07.002"},{"key":"e_1_2_11_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2018.2877790"},{"key":"e_1_2_11_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.2981633"},{"key":"e_1_2_11_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2018.2874008"},{"key":"e_1_2_11_34_1","first-page":"231","article-title":"Differentially private subspace clustering","volume":"28","author":"Wang Y","year":"2015","journal-title":"Adv Neural Inf Process Syst"},{"key":"e_1_2_11_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2018.8647918"},{"key":"e_1_2_11_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.trc.2020.102634"},{"key":"e_1_2_11_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2020.105940"},{"key":"e_1_2_11_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.115215"},{"key":"e_1_2_11_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.07.007"},{"key":"e_1_2_11_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2773646"},{"key":"e_1_2_11_41_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2018.06.005"},{"key":"e_1_2_11_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2022.3174044"},{"key":"e_1_2_11_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2948068"},{"key":"e_1_2_11_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2924679"},{"key":"e_1_2_11_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2017.2768360"},{"key":"e_1_2_11_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2853105"},{"key":"e_1_2_11_47_1","first-page":"3341","volume-title":"IEEE Congress on Evolutionary Computation (CEC)","author":"Wubin M","year":"2019"},{"key":"e_1_2_11_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataSecurity-HPSC-IDS.2019.00021"},{"key":"e_1_2_11_49_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.113241"}],"container-title":["International Journal of Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/int.23095","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1002\/int.23095","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/int.23095","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,9]],"date-time":"2023-02-09T15:33:33Z","timestamp":1675956813000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/int.23095"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,27]]},"references-count":48,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2022,12]]}},"alternative-id":["10.1002\/int.23095"],"URL":"https:\/\/doi.org\/10.1002\/int.23095","archive":["Portico"],"relation":{},"ISSN":["0884-8173","1098-111X"],"issn-type":[{"type":"print","value":"0884-8173"},{"type":"electronic","value":"1098-111X"}],"subject":[],"published":{"date-parts":[[2022,11,27]]},"assertion":[{"value":"2022-07-31","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-08-23","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-11-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}