{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,10]],"date-time":"2025-04-10T04:17:13Z","timestamp":1744258633061,"version":"3.40.4"},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2022,3,18]],"date-time":"2022-03-18T00:00:00Z","timestamp":1647561600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,3,18]],"date-time":"2022-03-18T00:00:00Z","timestamp":1647561600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100004735","name":"Natural Science Foundation of Hunan Province","doi-asserted-by":"crossref","award":["2020JJ4434"],"id":[{"id":"10.13039\/501100004735","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100004735","name":"Natural Science Foundation of Hunan Province","doi-asserted-by":"crossref","award":["2020JJ5368"],"id":[{"id":"10.13039\/501100004735","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Key Scientific Research Projects of Department of Education of Hunan Province","award":["19A312"]},{"name":"Key Research Project on Degree and Graduate Education Reform of Hunan Province","award":["2020JGZD025"]},{"DOI":"10.13039\/501100012456","name":"National Social Science Foundation of China","doi-asserted-by":"crossref","award":["AEA200013"],"id":[{"id":"10.13039\/501100012456","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Industry-Academic Cooperation Foundation of the Ministry of Education of China","award":["HKEDU-CK-20200413-129"]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Mobile Netw Appl"],"published-print":{"date-parts":[[2022,6]]},"DOI":"10.1007\/s11036-022-01950-6","type":"journal-article","created":{"date-parts":[[2022,3,18]],"date-time":"2022-03-18T05:02:33Z","timestamp":1647579753000},"page":"1162-1173","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Intelligent Privacy Protection of End User in Long Distance Education"],"prefix":"10.1007","volume":"27","author":[{"given":"Yating","family":"Li","sequence":"first","affiliation":[]},{"given":"Jiawen","family":"Zhu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4302-6505","authenticated-orcid":false,"given":"Weina","family":"Fu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,3,18]]},"reference":[{"issue":"3","key":"1950_CR1","doi-asserted-by":"publisher","first-page":"551","DOI":"10.1007\/s12528-021-09291-1","volume":"33","author":"KV Anil","year":"2021","unstructured":"Anil KV, Aman S, Edwin L et al (2021) Multilayered-quality education ecosystem (MQEE): an intelligent education modal for sustainable quality education. Journal of Computing High Education 33(3):551\u2013579","journal-title":"Journal of Computing High Education"},{"issue":"3","key":"1950_CR2","first-page":"106713","volume":"119","author":"IP Santiago","year":"2021","unstructured":"Santiago IP, Ngel HG, Juli\u00e1n CP et al (2021) Emergency remote teaching and students\u2019 academic performance in higher education during the covid-19 pandemic: a case study. Computers in Human Behavior 119(3):106713","journal-title":"Computers in Human Behavior"},{"issue":"10","key":"1950_CR3","doi-asserted-by":"publisher","first-page":"5480","DOI":"10.3390\/su13105480","volume":"13","author":"H Choi","year":"2021","unstructured":"Choi H, Chung SY, Ko J (2021) Rethinking teacher education policy in ict: lessons from emergency remote teaching (ERT) during the covid-19 pandemic period in Korea. Sustainability 13(10):5480","journal-title":"Sustainability"},{"key":"1950_CR4","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3092275","author":"D Youcef","year":"2022","unstructured":"Youcef D, Asma B, Gautam S et al (2022) Fast and Accurate Deep Learning Framework for Secure Fault Diagnosis in the Industrial Internet of Things. IEEE Internet of Things Journal, online first,. https:\/\/doi.org\/10.1109\/JIOT.2021.3092275","journal-title":"IEEE Internet of Things Journal, online first,"},{"issue":"1","key":"1950_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11036-018-1136-6","volume":"24","author":"L Shuai","year":"2019","unstructured":"Shuai L (2019) Introduction of Key Problems in Long-Distance Learning and Training. Mobile Networks and Applications 24(1):1\u20134","journal-title":"Mobile Networks and Applications"},{"issue":"5","key":"1950_CR6","doi-asserted-by":"publisher","first-page":"2123","DOI":"10.1007\/s11036-021-01777-7","volume":"26","author":"P Gao","year":"2021","unstructured":"Gao P, Li J, Liu S (2021) An Introduction to Key Technology in Artificial Intelligence and big Data Driven e-Learning and e-Education. Mobile Networks & Applications 26(5):2123\u20132126","journal-title":"Mobile Networks & Applications"},{"issue":"10","key":"1950_CR7","doi-asserted-by":"publisher","first-page":"3872","DOI":"10.1021\/acs.jchemed.0c00579","volume":"97","author":"K Seshadri","year":"2020","unstructured":"Seshadri K, Liu P, Koes DR (2020) The 3dmol.js learning environment: a classroom response system for 3d chemical structures. Journal of Chemical Education 97(10):3872\u20133876","journal-title":"Journal of Chemical Education"},{"issue":"2","key":"1950_CR8","doi-asserted-by":"publisher","first-page":"2034","DOI":"10.1109\/TVT.2019.2957744","volume":"69","author":"B Luo","year":"2020","unstructured":"Luo B, Li X, Weng J et al (2020) Blockchain enabled trust-based location privacy protection scheme in VANET. IEEE Trans Veh Technol 69(2):2034\u20132048","journal-title":"IEEE Trans Veh Technol"},{"issue":"6","key":"1950_CR9","doi-asserted-by":"publisher","first-page":"5917","DOI":"10.1109\/TVT.2019.2909505","volume":"68","author":"H Wang","year":"2019","unstructured":"Wang H, Han G, Zhang W et al (2019) A probabilistic source location privacy protection scheme in wireless sensor networks. IEEE Trans Veh Technol 68(6):5917\u20135927","journal-title":"IEEE Trans Veh Technol"},{"issue":"04","key":"1950_CR10","first-page":"107","volume":"36","author":"GF Wu","year":"2019","unstructured":"Wu GF, Tao RX, Yin YS (2019) Social Network Information Transmission Privacy Protection Simulation in the Era of Big Data. Computer Simulation 36(04):107-110+189","journal-title":"Computer Simulation"},{"issue":"7","key":"1950_CR11","doi-asserted-by":"publisher","first-page":"2069","DOI":"10.1007\/s10773-019-04062-2","volume":"58","author":"Y Chang","year":"2019","unstructured":"Chang Y, Zhang SB, Wan GG et al (2019) Practical two-way QKD-based quantum private query with better performance in user privacy. Int J Theor Phys 58(7):2069\u20132080","journal-title":"Int J Theor Phys"},{"key":"1950_CR12","doi-asserted-by":"publisher","first-page":"2188","DOI":"10.1109\/TMM.2021.3065580","volume":"23","author":"S Liu","year":"2021","unstructured":"Liu S, Wang S, Liu X, Gandomi AH, Daneshmand M, Muhammad K, Albuquerque VHC (2021) Human Memory Update Strategy: A Multi-Layer Template Update Mechanism for Remote Visual Monitoring. IEEE Trans Multimedia 23:2188\u20132198","journal-title":"IEEE Trans Multimedia"},{"issue":"7","key":"1950_CR13","doi-asserted-by":"publisher","first-page":"5340","DOI":"10.1109\/JIOT.2020.3032896","volume":"8","author":"J Chun-Wei","year":"2021","unstructured":"Chun-Wei J, Lin; Gautam Srivastava; Yuyu Zhang, et al (2021) Privacy-Preserving Multiobjective Sanitization Model in 6G IoT Environments. IEEE Internet Things J 8(7):5340\u20135349","journal-title":"IEEE Internet Things J"},{"key":"1950_CR14","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1016\/j.ins.2019.08.064","volume":"508","author":"W Youke","year":"2020","unstructured":"Youke W, Haiyang H, Ningyun W et al (2020) An incentive-based protection and recovery strategy for secure big data in social networks. Inf Sci 508:79\u201391","journal-title":"Inf Sci"},{"key":"1950_CR15","doi-asserted-by":"publisher","DOI":"10.1109\/TETCI.2020.3032701","author":"MTW Jimmy","year":"2021","unstructured":"Jimmy MTW, Gautam S, Alireza J et al (2021) Security and Privacy in Shared HitLCPS Using a GA-Based Multiple-Threshold Sanitization Model. IEEE Transactions on Emerging Topics in Computational Intelligence, online first,. https:\/\/doi.org\/10.1109\/TETCI.2020.3032701","journal-title":"IEEE Transactions on Emerging Topics in Computational Intelligence, online first,"},{"issue":"4","key":"1950_CR16","doi-asserted-by":"publisher","first-page":"1055","DOI":"10.1007\/s00521-020-05021-3","volume":"33","author":"S Liu","year":"2021","unstructured":"Liu S, Liu X, Wang S, Khan M (2021) Fuzzy-Aided Solution for Out-of-View Challenge in Visual Tracking under IoT Assisted Complex Environment. Neural Comput Appl 33(4):1055\u20131065","journal-title":"Neural Comput Appl"},{"issue":"10","key":"1950_CR17","doi-asserted-by":"publisher","first-page":"1024","DOI":"10.1001\/jamaophthalmol.2020.2766","volume":"138","author":"KK Benke","year":"2020","unstructured":"Benke KK, Arslan J (2020) Deep learning algorithms and the protection of data privacy. JAMA Ophthalmology 138(10):1024\u20131025","journal-title":"JAMA Ophthalmology"},{"issue":"7","key":"1950_CR18","doi-asserted-by":"publisher","first-page":"4496","DOI":"10.1109\/TITS.2020.3022612","volume":"22","author":"B Asma","year":"2021","unstructured":"Asma B, Youcef D, Gautam S et al (2021) A Two-Phase Anomaly Detection Model for Secure Intelligent Transportation Ride-Hailing Trajectories. IEEE Trans Intell Transp Syst 22(7):4496\u20134506","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"1950_CR19","first-page":"1","volume":"6","author":"A Akremi","year":"2021","unstructured":"Akremi A, Rouached M (2021) A comprehensive and holistic knowledge model for cloud privacy protection. J Supercomput 6:1\u201333","journal-title":"J Supercomput"},{"key":"1950_CR20","doi-asserted-by":"publisher","first-page":"1895","DOI":"10.1007\/s40747-020-00161-4","volume":"7","author":"L Shuai","year":"2021","unstructured":"Shuai L, Dongye L, Gautam S et al (2021) Overview and methods of correlation filter algorithms in object tracking. Complex & Intelligent Systems 7:1895\u20131917","journal-title":"Complex & Intelligent Systems"}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-022-01950-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11036-022-01950-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-022-01950-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T11:11:34Z","timestamp":1744197094000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11036-022-01950-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3,18]]},"references-count":20,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2022,6]]}},"alternative-id":["1950"],"URL":"https:\/\/doi.org\/10.1007\/s11036-022-01950-6","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"type":"print","value":"1383-469X"},{"type":"electronic","value":"1572-8153"}],"subject":[],"published":{"date-parts":[[2022,3,18]]},"assertion":[{"value":"9 February 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 March 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no relevant financial or non-financial interests to disclose. Yating Li and Jiawen Zhu provided the algorithm and experimental results, wrote the manuscript together; Weina Fu revised the paper, supervised and analyzed the experiment. We also declare that data availability and ethics approval is not applicable in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics declarations"}}]}}