{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T14:05:57Z","timestamp":1730297157781,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1109\/smartworld.2018.00193","type":"proceedings-article","created":{"date-parts":[[2018,12,7]],"date-time":"2018-12-07T00:38:21Z","timestamp":1544143101000},"page":"1112-1117","source":"Crossref","is-referenced-by-count":0,"title":["An Approach to Reducing Implicit Privacy Disclosure in Spatial-Temporal Big Data Publishing"],"prefix":"10.1109","author":[{"given":"Yujia","family":"Zhu","sequence":"first","affiliation":[]},{"given":"Xuejin","family":"Yan","sequence":"additional","affiliation":[]},{"given":"Shuqi","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yuyou","family":"Fan","sequence":"additional","affiliation":[]},{"given":"Li","family":"Kuang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-012-0633-z"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"266","DOI":"10.1109\/TDSC.2013.57","article-title":"Hiding in the Mobile Crowd: LocationPrivacy through Collaboration [J]","volume":"11","author":"shokri","year":"2014","journal-title":"IEEE Trans Dependable and Secure Computing"},{"journal-title":"Computer Engineering & Applications","article-title":"Adaptive learning model based on k-anonymity location privacy protection [J]","year":"2017","author":"liang","key":"ref12"},{"journal-title":"International Journal of Computer Science and Information Technology","article-title":"PhishIdentifier: A Mozilla Firefox plugin to protect user against Phishing attacks [J]","year":"2014","author":"kalola","key":"ref13"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"262","DOI":"10.1109\/TRO.2011.2166436","article-title":"Control of Multiple-Wheeled Mobile Robots With Limited Information of a Desired Trajectory [J]","volume":"28","author":"tracking","year":"2012","journal-title":"IEEE Transactions on Robotics"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s00221-009-2099-4"},{"journal-title":"DR SGX Hardening SGX Enclaves against Cache Attacks with Data Location Randomization [J]","year":"2017","author":"brasser","key":"ref16"},{"key":"ref17","first-page":"163","article-title":"Optical system for gathering simultaneous time and spatial data from transient events [J]","volume":"174","author":"salmon","year":"2014","journal-title":"Botanical Journal of the Linnean Society"},{"key":"ref18","first-page":"578","article-title":"A Clustering Hybrid Based Algorithm for Privacy Preserving Trajectory Data Publishing [J]","volume":"50","author":"yinjie","year":"2013","journal-title":"Journal of Computer research and development"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.comcom.2016.03.002","article-title":"ABAKA: A novel attribute-based k-anonymous collaborative solution for LBSs [J]","volume":"85","author":"dargahi","year":"2016","journal-title":"Computer Communications"},{"key":"ref3","first-page":"2399","article-title":"Efficient algorithms for K-anonymous location privacy in participatory sensing [J]","author":"vu","year":"2012","journal-title":"Proceedings-IEEE INFOCOM"},{"journal-title":"Mass equal request-oriented k-anonymous location privacy protection method","year":"2016","author":"haiping","key":"ref6"},{"journal-title":"Journal of Beijing","article-title":"A k-anonymous algorithm in location privacy protection based on circular zoning [J]","year":"0","author":"zemao","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-1674-7_41"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2007.190662"},{"journal-title":"Ruan Jian Xue Bao\/Journal of Software","article-title":"Preservation of implicit privacy in spatio-temporal data publication","year":"2016","author":"wang","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1806907.1806910"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1145\/1456403.1456410","article-title":"A distributed k-anonymity protocol for location privacy [C]","author":"zhong","year":"2008","journal-title":"5th ACM workshop on Privacy in electronic society"}],"event":{"name":"2018 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld\/SCALCOM\/UIC\/ATC\/CBDCom\/IOP\/SCI)","start":{"date-parts":[[2018,10,8]]},"location":"Guangzhou, China","end":{"date-parts":[[2018,10,12]]}},"container-title":["2018 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld\/SCALCOM\/UIC\/ATC\/CBDCom\/IOP\/SCI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8533596\/8559978\/08560171.pdf?arnumber=8560171","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T15:59:47Z","timestamp":1643299187000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8560171\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/smartworld.2018.00193","relation":{},"subject":[],"published":{"date-parts":[[2018,10]]}}}