{"id":"https://openalex.org/W2111369614","doi":"https://doi.org/10.1007/978-3-319-21042-1_24","title":"Location Semantics Protection Based on Bayesian Inference","display_name":"Location Semantics Protection Based on Bayesian Inference","publication_year":2015,"publication_date":"2015-01-01","ids":{"openalex":"https://openalex.org/W2111369614","doi":"https://doi.org/10.1007/978-3-319-21042-1_24","mag":"2111369614"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-319-21042-1_24","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-21042-1_24","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5022729033","display_name":"Zhengang Wu","orcid":null},"institutions":[{"id":"https://openalex.org/I4210130112","display_name":"China Academy of Information and Communications Technology","ror":"https://ror.org/038dte259","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210130112","https://openalex.org/I890469752"]},{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]},{"id":"https://openalex.org/I4210128818","display_name":"Institute of Software","ror":"https://ror.org/033dfsn42","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210128818"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhengang Wu","raw_affiliation_strings":["China Academy of Information and Communications Technology, Beijing, China","Institute of Software, School of EECS, MoE Key Lab of High Confidence Software Technologies (PKU), MoE Key Lab of Network and Software Security Assurance (PKU), Peking University (PKU), Beijing, China"],"affiliations":[{"raw_affiliation_string":"China Academy of Information and Communications Technology, Beijing, China","institution_ids":["https://openalex.org/I4210130112"]},{"raw_affiliation_string":"Institute of Software, School of EECS, MoE Key Lab of High Confidence Software Technologies (PKU), MoE Key Lab of Network and Software Security Assurance (PKU), Peking University (PKU), Beijing, China","institution_ids":["https://openalex.org/I4210128818","https://openalex.org/I20231570"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100430415","display_name":"Zhong Chen","orcid":"https://orcid.org/0000-0002-7483-9699"},"institutions":[{"id":"https://openalex.org/I4210128818","display_name":"Institute of Software","ror":"https://ror.org/033dfsn42","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210128818"]},{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhong Chen","raw_affiliation_strings":["Institute of Software, School of EECS, MoE Key Lab of High Confidence Software Technologies (PKU), MoE Key Lab of Network and Software Security Assurance (PKU), Peking University (PKU), Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Software, School of EECS, MoE Key Lab of High Confidence Software Technologies (PKU), MoE Key Lab of Network and Software Security Assurance (PKU), Peking University (PKU), Beijing, China","institution_ids":["https://openalex.org/I4210128818","https://openalex.org/I20231570"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003813154","display_name":"Jiawei Zhu","orcid":"https://orcid.org/0000-0002-2961-1302"},"institutions":[{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]},{"id":"https://openalex.org/I4210128818","display_name":"Institute of Software","ror":"https://ror.org/033dfsn42","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210128818"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiawei Zhu","raw_affiliation_strings":["Institute of Software, School of EECS, MoE Key Lab of High Confidence Software Technologies (PKU), MoE Key Lab of Network and Software Security Assurance (PKU), Peking University (PKU), Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Software, School of EECS, MoE Key Lab of High Confidence Software Technologies (PKU), MoE Key Lab of Network and Software Security Assurance (PKU), Peking University (PKU), Beijing, China","institution_ids":["https://openalex.org/I4210128818","https://openalex.org/I20231570"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101070083","display_name":"Huiping Sun","orcid":null},"institutions":[{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]},{"id":"https://openalex.org/I4210128818","display_name":"Institute of Software","ror":"https://ror.org/033dfsn42","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210128818"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Huiping Sun","raw_affiliation_strings":["Institute of Software, School of EECS, MoE Key Lab of High Confidence Software Technologies (PKU), MoE Key Lab of Network and Software Security Assurance (PKU), Peking University (PKU), Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Software, School of EECS, MoE Key Lab of High Confidence Software Technologies (PKU), MoE Key Lab of Network and Software Security Assurance (PKU), Peking University (PKU), Beijing, China","institution_ids":["https://openalex.org/I4210128818","https://openalex.org/I20231570"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5005225068","display_name":"Zhi Guan","orcid":"https://orcid.org/0000-0002-6144-4815"},"institutions":[{"id":"https://openalex.org/I4210128818","display_name":"Institute of Software","ror":"https://ror.org/033dfsn42","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210128818"]},{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhi Guan","raw_affiliation_strings":["Institute of Software, School of EECS, MoE Key Lab of High Confidence Software Technologies (PKU), MoE Key Lab of Network and Software Security Assurance (PKU), Peking University (PKU), Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Software, School of EECS, MoE Key Lab of High Confidence Software Technologies (PKU), MoE Key Lab of Network and Software Security Assurance (PKU), Peking University (PKU), Beijing, China","institution_ids":["https://openalex.org/I4210128818","https://openalex.org/I20231570"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5022729033"],"corresponding_institution_ids":["https://openalex.org/I20231570","https://openalex.org/I4210128818","https://openalex.org/I4210130112"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":0.3414,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.55523016,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"297","last_page":"308"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9919000267982483,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8887893557548523},{"id":"https://openalex.org/keywords/cloaking","display_name":"Cloaking","score":0.7114537954330444},{"id":"https://openalex.org/keywords/semantics","display_name":"Semantics (computer science)","score":0.6562920212745667},{"id":"https://openalex.org/keywords/location-based-service","display_name":"Location-based service","score":0.5742809772491455},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.5533522963523865},{"id":"https://openalex.org/keywords/point-of-interest","display_name":"Point of interest","score":0.46795690059661865},{"id":"https://openalex.org/keywords/bayesian-inference","display_name":"Bayesian inference","score":0.43696269392967224},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.43004170060157776},{"id":"https://openalex.org/keywords/bayesian-probability","display_name":"Bayesian probability","score":0.42489758133888245},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.4213339686393738},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.4120229482650757},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3839622735977173},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.36754292249679565},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.2954174876213074},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.23944693803787231},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.1648348569869995},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.11969992518424988}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8887893557548523},{"id":"https://openalex.org/C62973154","wikidata":"https://www.wikidata.org/wiki/Q868018","display_name":"Cloaking","level":3,"score":0.7114537954330444},{"id":"https://openalex.org/C184337299","wikidata":"https://www.wikidata.org/wiki/Q1437428","display_name":"Semantics (computer science)","level":2,"score":0.6562920212745667},{"id":"https://openalex.org/C155292070","wikidata":"https://www.wikidata.org/wiki/Q1198122","display_name":"Location-based service","level":2,"score":0.5742809772491455},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.5533522963523865},{"id":"https://openalex.org/C150140777","wikidata":"https://www.wikidata.org/wiki/Q960648","display_name":"Point of interest","level":2,"score":0.46795690059661865},{"id":"https://openalex.org/C160234255","wikidata":"https://www.wikidata.org/wiki/Q812535","display_name":"Bayesian inference","level":3,"score":0.43696269392967224},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.43004170060157776},{"id":"https://openalex.org/C107673813","wikidata":"https://www.wikidata.org/wiki/Q812534","display_name":"Bayesian probability","level":2,"score":0.42489758133888245},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.4213339686393738},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.4120229482650757},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3839622735977173},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.36754292249679565},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2954174876213074},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.23944693803787231},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.1648348569869995},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.11969992518424988},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C49040817","wikidata":"https://www.wikidata.org/wiki/Q193091","display_name":"Optoelectronics","level":1,"score":0.0},{"id":"https://openalex.org/C110367647","wikidata":"https://www.wikidata.org/wiki/Q497166","display_name":"Metamaterial","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-319-21042-1_24","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-21042-1_24","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.5299999713897705,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W93792061","https://openalex.org/W1994292329","https://openalex.org/W2004986927","https://openalex.org/W2028031999","https://openalex.org/W2056773559","https://openalex.org/W2067636847","https://openalex.org/W2089959302","https://openalex.org/W2096899416","https://openalex.org/W2101024939","https://openalex.org/W2119047901","https://openalex.org/W2120911939","https://openalex.org/W2134167315","https://openalex.org/W2134479759","https://openalex.org/W2136114025","https://openalex.org/W2148797863","https://openalex.org/W2159024459"],"related_works":["https://openalex.org/W1985243104","https://openalex.org/W2398731590","https://openalex.org/W2767840669","https://openalex.org/W2038036390","https://openalex.org/W3004592867","https://openalex.org/W1581319160","https://openalex.org/W2082105523","https://openalex.org/W2015850245","https://openalex.org/W1971465184","https://openalex.org/W1505898032"],"abstract_inverted_index":null,"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
