{"id":"https://openalex.org/W3015750984","doi":"https://doi.org/10.1002/cpe.5766","title":"A k\u2010nearest neighbor query method based on trust and location privacy protection","display_name":"A k\u2010nearest neighbor query method based on trust and location privacy protection","publication_year":2020,"publication_date":"2020-04-06","ids":{"openalex":"https://openalex.org/W3015750984","doi":"https://doi.org/10.1002/cpe.5766","mag":"3015750984"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1002/cpe.5766","pdf_url":null,"source":{"id":"https://openalex.org/S11065456","display_name":"Concurrency and Computation: Practice and Experience","issn_l":"1532-0626","issn":["1532-0634","1532-0626"],"is_oa":false,"is_in_doaj":false,"host_organization":"https://openalex.org/P4310320503","host_organization_name":"Wiley-Blackwell","host_organization_lineage":["https://openalex.org/P4310320503","https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley-Blackwell","Wiley"],"type":"journal"},"license":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5003748150","display_name":"Lei Guo","orcid":"https://orcid.org/0000-0002-2447-2905"},"institutions":[{"id":"https://openalex.org/I4472751","display_name":"Anhui Normal University","ror":"https://ror.org/05fsfvw79","country_code":"CN","type":"education","lineage":["https://openalex.org/I4472751"]},{"id":"https://openalex.org/I4210145049","display_name":"Anhui Institute of Information Technology","ror":"https://ror.org/04mw2ty13","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210145049"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Liangmin Guo","raw_affiliation_string":"Anhui Provincial Key Laboratory of Network and Information Security, Wuhu, China; School of Computer and Information, Anhui Normal University, Wuhu, China","raw_affiliation_strings":["Anhui Provincial Key Laboratory of Network and Information Security, Wuhu, China","School of Computer and Information, Anhui Normal University, Wuhu, China"]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003813344","display_name":"Ying Zhu","orcid":"https://orcid.org/0000-0002-3430-3929"},"institutions":[{"id":"https://openalex.org/I4210145049","display_name":"Anhui Institute of Information Technology","ror":"https://ror.org/04mw2ty13","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210145049"]},{"id":"https://openalex.org/I4472751","display_name":"Anhui Normal University","ror":"https://ror.org/05fsfvw79","country_code":"CN","type":"education","lineage":["https://openalex.org/I4472751"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ying Zhu","raw_affiliation_string":"Anhui Provincial Key Laboratory of Network and Information Security, Wuhu, China; School of Computer and Information, Anhui Normal University, Wuhu, China","raw_affiliation_strings":["Anhui Provincial Key Laboratory of Network and Information Security, Wuhu, China","School of Computer and Information, Anhui Normal University, Wuhu, China"]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009583749","display_name":"Hao Yang","orcid":"https://orcid.org/0000-0001-7229-0957"},"institutions":[{"id":"https://openalex.org/I4472751","display_name":"Anhui Normal University","ror":"https://ror.org/05fsfvw79","country_code":"CN","type":"education","lineage":["https://openalex.org/I4472751"]},{"id":"https://openalex.org/I4210145049","display_name":"Anhui Institute of Information Technology","ror":"https://ror.org/04mw2ty13","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210145049"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hao Yang","raw_affiliation_string":"Anhui Provincial Key Laboratory of Network and Information Security, Wuhu, China; School of Computer and Information, Anhui Normal University, Wuhu, China","raw_affiliation_strings":["Anhui Provincial Key Laboratory of Network and Information Security, Wuhu, China","School of Computer and Information, Anhui Normal University, Wuhu, China"]},{"author_position":"middle","author":{"id":"https://openalex.org/A5050720898","display_name":"Yonglong Luo","orcid":"https://orcid.org/0000-0003-4987-0376"},"institutions":[{"id":"https://openalex.org/I4472751","display_name":"Anhui Normal University","ror":"https://ror.org/05fsfvw79","country_code":"CN","type":"education","lineage":["https://openalex.org/I4472751"]},{"id":"https://openalex.org/I4210145049","display_name":"Anhui Institute of Information Technology","ror":"https://ror.org/04mw2ty13","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210145049"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yonglong Luo","raw_affiliation_string":"Anhui Provincial Key Laboratory of Network and Information Security, Wuhu, China; School of Computer and Information, Anhui Normal University, Wuhu, China","raw_affiliation_strings":["Anhui Provincial Key Laboratory of Network and Information Security, Wuhu, China","School of Computer and Information, Anhui Normal University, Wuhu, China"]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024375259","display_name":"Liping Sun","orcid":"https://orcid.org/0000-0002-2420-8936"},"institutions":[{"id":"https://openalex.org/I4472751","display_name":"Anhui Normal University","ror":"https://ror.org/05fsfvw79","country_code":"CN","type":"education","lineage":["https://openalex.org/I4472751"]},{"id":"https://openalex.org/I4210145049","display_name":"Anhui Institute of Information Technology","ror":"https://ror.org/04mw2ty13","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210145049"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Liping Sun","raw_affiliation_string":"Anhui Provincial Key Laboratory of Network and Information Security, Wuhu, China; School of Computer and Information, Anhui Normal University, Wuhu, China","raw_affiliation_strings":["Anhui Provincial Key Laboratory of Network and Information Security, Wuhu, China","School of Computer and Information, Anhui Normal University, Wuhu, China"]},{"author_position":"last","author":{"id":"https://openalex.org/A5070055083","display_name":"Xiaoyao Zheng","orcid":"https://orcid.org/0000-0001-7554-4211"},"institutions":[{"id":"https://openalex.org/I4472751","display_name":"Anhui Normal University","ror":"https://ror.org/05fsfvw79","country_code":"CN","type":"education","lineage":["https://openalex.org/I4472751"]},{"id":"https://openalex.org/I4210145049","display_name":"Anhui Institute of Information Technology","ror":"https://ror.org/04mw2ty13","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210145049"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaoyao Zheng","raw_affiliation_string":"Anhui Provincial Key Laboratory of Network and Information Security, Wuhu, China; School of Computer and Information, Anhui Normal University, Wuhu, China","raw_affiliation_strings":["Anhui Provincial Key Laboratory of Network and Information Security, Wuhu, China","School of Computer and Information, Anhui Normal University, Wuhu, China"]}],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5003748150"],"corresponding_institution_ids":["https://openalex.org/I4472751","https://openalex.org/I4210145049"],"apc_list":{"value":4740,"currency":"USD","value_usd":4740,"provenance":"doaj"},"apc_paid":{"value":4740,"currency":"USD","value_usd":4740,"provenance":"doaj"},"has_fulltext":false,"cited_by_count":2,"cited_by_percentile_year":{"min":75,"max":78},"biblio":{"volume":"34","issue":"16","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Techniques for Data Analysis and Machine Learning","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Techniques for Data Analysis and Machine Learning","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Advanced Cryptographic Schemes and Protocols","score":0.9996,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Internet Users' Information Privacy Concerns","score":0.9971,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"keyword":"privacy","score":0.4491},{"keyword":"location","score":0.2776}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.845742},{"id":"https://openalex.org/C118689300","wikidata":"https://www.wikidata.org/wiki/Q7978614","display_name":"Web query classification","level":4,"score":0.67424846},{"id":"https://openalex.org/C99016210","wikidata":"https://www.wikidata.org/wiki/Q5488129","display_name":"Query expansion","level":2,"score":0.62746626},{"id":"https://openalex.org/C164120249","wikidata":"https://www.wikidata.org/wiki/Q995982","display_name":"Web search query","level":3,"score":0.61623734},{"id":"https://openalex.org/C157692150","wikidata":"https://www.wikidata.org/wiki/Q2919848","display_name":"Query optimization","level":2,"score":0.5970037},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.51192844},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.5018339},{"id":"https://openalex.org/C155292070","wikidata":"https://www.wikidata.org/wiki/Q1198122","display_name":"Location-based service","level":2,"score":0.50067616},{"id":"https://openalex.org/C48798503","wikidata":"https://www.wikidata.org/wiki/Q877546","display_name":"Reputation","level":2,"score":0.48288608},{"id":"https://openalex.org/C192939062","wikidata":"https://www.wikidata.org/wiki/Q104840822","display_name":"Sargable","level":4,"score":0.47738189},{"id":"https://openalex.org/C24028149","wikidata":"https://www.wikidata.org/wiki/Q7094056","display_name":"Online aggregation","level":5,"score":0.47480312},{"id":"https://openalex.org/C172722865","wikidata":"https://www.wikidata.org/wiki/Q2302053","display_name":"Spatial query","level":5,"score":0.45159715},{"id":"https://openalex.org/C113238511","wikidata":"https://www.wikidata.org/wiki/Q1071612","display_name":"k-nearest neighbors algorithm","level":2,"score":0.4214158},{"id":"https://openalex.org/C192028432","wikidata":"https://www.wikidata.org/wiki/Q845739","display_name":"Query language","level":2,"score":0.41426465},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3335774},{"id":"https://openalex.org/C97854310","wikidata":"https://www.wikidata.org/wiki/Q19541","display_name":"Search engine","level":2,"score":0.30490828},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.26077777},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.17952651},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1002/cpe.5766","pdf_url":null,"source":{"id":"https://openalex.org/S11065456","display_name":"Concurrency and Computation: Practice and Experience","issn_l":"1532-0626","issn":["1532-0634","1532-0626"],"is_oa":false,"is_in_doaj":false,"host_organization":"https://openalex.org/P4310320503","host_organization_name":"Wiley-Blackwell","host_organization_lineage":["https://openalex.org/P4310320503","https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley-Blackwell","Wiley"],"type":"journal"},"license":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"referenced_works_count":25,"referenced_works":["https://openalex.org/W1967880185","https://openalex.org/W2010870805","https://openalex.org/W2028282576","https://openalex.org/W2068632940","https://openalex.org/W2086863233","https://openalex.org/W2097726984","https://openalex.org/W2128800833","https://openalex.org/W2268181947","https://openalex.org/W2301322491","https://openalex.org/W2315350756","https://openalex.org/W2324656523","https://openalex.org/W2329695226","https://openalex.org/W2342159830","https://openalex.org/W2343414189","https://openalex.org/W2490096848","https://openalex.org/W2557431337","https://openalex.org/W2558325443","https://openalex.org/W2562792870","https://openalex.org/W2576936530","https://openalex.org/W2766896817","https://openalex.org/W2800300971","https://openalex.org/W2809448464","https://openalex.org/W2886835905","https://openalex.org/W2889349423","https://openalex.org/W2894027578"],"related_works":["https://openalex.org/W3125756434","https://openalex.org/W2096359267","https://openalex.org/W906795786","https://openalex.org/W2110065340","https://openalex.org/W1973282744","https://openalex.org/W1590029787","https://openalex.org/W2491796624","https://openalex.org/W2006459955","https://openalex.org/W203907944","https://openalex.org/W1560919561"],"ngrams_url":"https://api.openalex.org/works/W3015750984/ngrams","abstract_inverted_index":{"Abstract":[0],"Spatial":[1],"query":[2,22,58,83,91,120,130,134,144,155,159,193,201],"is":[3,23,67],"an":[4,94],"important":[5],"supporting":[6],"technology":[7],"in":[8,36],"the":[9,37,48,90,110,114,119,133,139,143,147,154,158,162,189,192,197,200],"Internet":[10],"of":[11,50,113,191,199],"Things":[12],"(IoT)":[13],"and":[14,63,150,157,187],"location\u2010based":[15],"services":[16],"(LBS).":[17],"The":[18,171],"k":[19,55],"\u2010nearest":[20,56],"neighbor":[21,57],"widely":[24],"used":[25],"for":[26,132],"spatial":[27],"queries.":[28],"However,":[29],"user":[30,92,135,160],"location":[31,64,85],"privacy":[32,65,198],"may":[33],"be":[34],"leaked":[35],"query.":[38],"In":[39,87],"addition,":[40],"some":[41],"users":[42,123,141,180],"are":[43,136],"malicious":[44,185],"or":[45,167],"uncooperative.":[46],"With":[47],"objective":[49],"overcoming":[51],"these":[52],"problems,":[53],"a":[54,72,82,99],"method":[59,76,176],"based":[60,77],"on":[61,78],"trust":[62,100],"protection":[66],"proposed.":[68],"First,":[69],"we":[70],"employ":[71],"new":[73],"K":[74],"\u2010anonymity":[75],"cooperation":[79,104],"to":[80,102,109,153,165,181],"protect":[81],"user's":[84],"privacy.":[86],"this":[88],"method,":[89],"constructs":[93],"anonymous":[95],"group":[96],"by":[97,118],"introducing":[98],"mechanism":[101],"incentivize":[103],"among":[105],"users.":[106],"Then,":[107],"according":[108,164],"different":[111],"radii":[112],"selection":[115],"area":[116],"set":[117],"user,":[121,156],"agent":[122,140],"with":[124],"higher":[125],"reputation":[126],"values":[127],"who":[128],"send":[129],"requests":[131],"selected.":[137],"Finally,":[138],"obtain":[142],"results":[145,163,194],"from":[146],"LBS":[148],"server":[149],"forward":[151],"them":[152],"screens":[161],"his":[166],"her":[168],"real":[169],"location.":[170],"experiments":[172],"show":[173],"that":[174],"our":[175],"can":[177],"effectively":[178],"stimulate":[179],"cooperate,":[182],"better":[183],"exclude":[184],"users,":[186],"improve":[188],"accuracy":[190],"while":[195],"protecting":[196],"user.":[202]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W3015750984","counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1}],"updated_date":"2024-03-06T06:25:39.832567","created_date":"2020-04-17"}