{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T15:51:25Z","timestamp":1776181885908,"version":"3.50.1"},"reference-count":43,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61872131"],"award-info":[{"award-number":["61872131"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61472125"],"award-info":[{"award-number":["61472125"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Serv. Comput."],"published-print":{"date-parts":[[2022,1,1]]},"DOI":"10.1109\/tsc.2019.2920643","type":"journal-article","created":{"date-parts":[[2019,6,6]],"date-time":"2019-06-06T19:52:01Z","timestamp":1559850721000},"page":"45-58","source":"Crossref","is-referenced-by-count":83,"title":["Differential Privacy-Based Location Protection in Spatial Crowdsourcing"],"prefix":"10.1109","volume":"15","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6883-0471","authenticated-orcid":false,"given":"Jianhao","family":"Wei","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9052-9789","authenticated-orcid":false,"given":"Yaping","family":"Lin","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7165-937X","authenticated-orcid":false,"given":"Xin","family":"Yao","sequence":"additional","affiliation":[]},{"given":"Jin","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2017.2771259"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2815982"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2014.2345067"},{"key":"ref4","article-title":"Uber"},{"key":"ref5","article-title":"Didi"},{"key":"ref6","article-title":"Waze"},{"key":"ref7","article-title":"Grubhub"},{"key":"ref8","article-title":"Business insider","author":"Hartmans","year":"2016"},{"key":"ref9","article-title":"Time-weekly","year":"2018"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2016.7509395"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2842470"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2020408.2020579"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382261"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23241"},{"issue":"99","key":"ref15","first-page":"1","article-title":"Privacy-preserving location based services scheme against quantum attacks","volume":"PP","author":"Hu","year":"2018","journal-title":"IEEE Trans. Depend. Secure Comput."},{"key":"ref16","article-title":"Stalkers exploit cellphone GPS","author":"Scheck","year":"2010"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2906388.2906420"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2018.2791601"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2016.7842248"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2830784"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536466"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.14778\/2732951.2732966"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2015.2512282"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2018.2855740"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2016.2586058"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2015.2490021"},{"key":"ref27","article-title":"Gowalla","year":"2014"},{"key":"ref28","article-title":"Yelp","year":"2018"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48683-2_14"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/262116.262132"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2013.SUP.0513025"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2805700"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557090"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2012.16"},{"key":"ref35","first-page":"757","article-title":"Differentially private grids for geospatial data","volume-title":"Proc. IEEE Int. Conf. Data Eng.","author":"Li"},{"key":"ref36","first-page":"361","article-title":"Differentially private M-estimators","volume-title":"Proc. 24th Int. Conf. Neural Inf. Process. Syst.","author":"Jing"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/1882261.1866193"},{"key":"ref38","first-page":"763","article-title":"The new casper:query processing for location services without compromising privacy","volume-title":"Proc. 32nd Int. Conf. Very Large Data Bases","author":"Mokbel"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2470745"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-018-1289-9"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2009.2038222"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052696"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2018.2861393"}],"container-title":["IEEE Transactions on Services Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4629386\/9702709\/08732376.pdf?arnumber=8732376","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,9]],"date-time":"2024-01-09T22:39:44Z","timestamp":1704839984000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8732376\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,1]]},"references-count":43,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tsc.2019.2920643","relation":{},"ISSN":["1939-1374","2372-0204"],"issn-type":[{"value":"1939-1374","type":"electronic"},{"value":"2372-0204","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,1,1]]}}}