{"id":"https://openalex.org/W2916753865","doi":"https://doi.org/10.1109/glocom.2018.8647719","title":"Achieving Personalized k-Anonymity against Long-Term Observation in Location-Based Services","display_name":"Achieving Personalized k-Anonymity against Long-Term Observation in Location-Based Services","publication_year":2018,"publication_date":"2018-12-01","ids":{"openalex":"https://openalex.org/W2916753865","doi":"https://doi.org/10.1109/glocom.2018.8647719","mag":"2916753865"},"language":"en","primary_location":{"id":"doi:10.1109/glocom.2018.8647719","is_oa":false,"landing_page_url":"https://doi.org/10.1109/glocom.2018.8647719","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE Global Communications Conference (GLOBECOM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100325259","display_name":"Fenghua Li","orcid":"https://orcid.org/0000-0003-0638-5610"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Fenghua Li","raw_affiliation_strings":["School of Cyber Security, University of Chinese Academy of Sciences, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5112893853","display_name":"Yahong Chen","orcid":null},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yahong Chen","raw_affiliation_strings":["School of Cyber Security, University of Chinese Academy of Sciences, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024053576","display_name":"Ben Niu","orcid":"https://orcid.org/0000-0001-5822-8743"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ben Niu","raw_affiliation_strings":["State Key Laboratory of Information Security, Chinese Academy of Sciences, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Information Security, Chinese Academy of Sciences, China","institution_ids":["https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100739224","display_name":"Yuanyuan He","orcid":"https://orcid.org/0000-0001-6706-4859"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuanyuan He","raw_affiliation_strings":["School of Cyber Security, University of Chinese Academy of Sciences, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027331734","display_name":"Kui Geng","orcid":null},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kui Geng","raw_affiliation_strings":["State Key Laboratory of Information Security, Chinese Academy of Sciences, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Information Security, Chinese Academy of Sciences, China","institution_ids":["https://openalex.org/I19820366"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101850333","display_name":"Jin Cao","orcid":"https://orcid.org/0000-0003-1372-7252"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jin Cao","raw_affiliation_strings":["National Key Laboratory of Integrated Networks Services, Xidian University, China"],"affiliations":[{"raw_affiliation_string":"National Key Laboratory of Integrated Networks Services, Xidian University, China","institution_ids":["https://openalex.org/I149594827"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5100325259"],"corresponding_institution_ids":["https://openalex.org/I4210165038"],"apc_list":null,"apc_paid":null,"fwci":1.1402,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.84408048,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"37","issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11704","display_name":"Mobile Crowdsensing and Crowdsourcing","score":0.9941999912261963,"subfield":{"id":"https://openalex.org/subfields/1706","display_name":"Computer Science Applications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7687841653823853},{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.7311166524887085},{"id":"https://openalex.org/keywords/location-based-service","display_name":"Location-based service","score":0.6232004165649414},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.6222100853919983},{"id":"https://openalex.org/keywords/k-anonymity","display_name":"k-anonymity","score":0.5448569655418396},{"id":"https://openalex.org/keywords/term","display_name":"Term (time)","score":0.5329512357711792},{"id":"https://openalex.org/keywords/quality-of-service","display_name":"Quality of service","score":0.5268199443817139},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.508655846118927},{"id":"https://openalex.org/keywords/entropy","display_name":"Entropy (arrow of time)","score":0.49223461747169495},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.46604955196380615},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.4116140604019165},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.32707297801971436},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.29950442910194397}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7687841653823853},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.7311166524887085},{"id":"https://openalex.org/C155292070","wikidata":"https://www.wikidata.org/wiki/Q1198122","display_name":"Location-based service","level":2,"score":0.6232004165649414},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.6222100853919983},{"id":"https://openalex.org/C2777706471","wikidata":"https://www.wikidata.org/wiki/Q17061432","display_name":"k-anonymity","level":3,"score":0.5448569655418396},{"id":"https://openalex.org/C61797465","wikidata":"https://www.wikidata.org/wiki/Q1188986","display_name":"Term (time)","level":2,"score":0.5329512357711792},{"id":"https://openalex.org/C5119721","wikidata":"https://www.wikidata.org/wiki/Q220501","display_name":"Quality of service","level":2,"score":0.5268199443817139},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.508655846118927},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.49223461747169495},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.46604955196380615},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.4116140604019165},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.32707297801971436},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.29950442910194397},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C136264566","wikidata":"https://www.wikidata.org/wiki/Q159810","display_name":"Economy","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/glocom.2018.8647719","is_oa":false,"landing_page_url":"https://doi.org/10.1109/glocom.2018.8647719","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE Global Communications Conference (GLOBECOM)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.5699999928474426,"display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W1532761024","https://openalex.org/W1689932539","https://openalex.org/W1966406552","https://openalex.org/W1966517804","https://openalex.org/W1982590063","https://openalex.org/W2056773559","https://openalex.org/W2060871119","https://openalex.org/W2082894754","https://openalex.org/W2096899416","https://openalex.org/W2097751911","https://openalex.org/W2120911939","https://openalex.org/W2124377190","https://openalex.org/W2128870831","https://openalex.org/W2134167315","https://openalex.org/W2136114025","https://openalex.org/W2292295332","https://openalex.org/W2296615177","https://openalex.org/W2583454074","https://openalex.org/W2623821580","https://openalex.org/W2746057509","https://openalex.org/W2762786854","https://openalex.org/W2792872747","https://openalex.org/W2950591732","https://openalex.org/W2962747477","https://openalex.org/W4255574744","https://openalex.org/W7014761921"],"related_works":["https://openalex.org/W2381086482","https://openalex.org/W2355715322","https://openalex.org/W223766737","https://openalex.org/W2108805307","https://openalex.org/W2353100240","https://openalex.org/W1625052858","https://openalex.org/W3105058304","https://openalex.org/W2057844631","https://openalex.org/W2010323877","https://openalex.org/W2071358357"],"abstract_inverted_index":{"Location":[0,16],"privacy":[1,146],"continues":[2],"to":[3,58,107],"attract":[4],"significant":[5],"attentions":[6],"from":[7,66],"both":[8],"industry":[9],"and":[10,32,151],"academia":[11],"in":[12,35,63,105],"recent":[13],"years.":[14],"However,":[15],"Based":[17],"Service":[18,132],"(LBS)":[19],"servers":[20],"or":[21,90],"some":[22],"other":[23],"adversaries":[24],"who":[25],"can":[26,142],"monitor":[27],"a":[28,36,51],"particular":[29],"user's":[30,42,144,153],"historical":[31,73],"current":[33],"status":[34],"long-term":[37,149],"way":[38],"may":[39,81],"likely":[40],"infer":[41],"location":[43,145],"privacy.":[44],"To":[45],"solve":[46],"this":[47],"problem,":[48],"we":[49,123],"propose":[50],"Longterm":[52],"Observation-aware":[53],"Dummy":[54],"Selection":[55],"(LODS)":[56],"algorithm":[57,141],"achieve":[59,108],"k-anonymity":[60],"for":[61],"users":[62,80],"LBSs.":[64],"Different":[65],"existing":[67],"approaches,":[68],"the":[69,72,109,125,135,157],"LODS":[70,92,113],"takes":[71],"anonymity":[74,126],"sets":[75,95,118],"into":[76],"account,":[77],"since":[78],"mobile":[79],"query":[82],"LBSs":[83],"at":[84,156],"certain":[85],"places":[86],"such":[87],"as":[88,134],"home":[89],"office.":[91],"selects":[93],"candidate":[94,117],"containing":[96],"dummy":[97],"locations":[98],"with":[99,119,128],"less":[100],"number":[101],"of":[102,131],"occurrences":[103],"firstly,":[104],"order":[106],"preferred":[110],"distribution.":[111],"Then,":[112],"further":[114],"filters":[115],"out":[116],"smaller":[120],"entropy.":[121],"Finally,":[122],"choose":[124],"set":[127],"highest":[129],"Quality":[130],"(QoS)":[133],"result.":[136],"Extensive":[137],"experiment":[138],"indicates":[139],"our":[140],"protect":[143],"effectively":[147],"against":[148],"observation,":[150],"satisfy":[152],"QoS":[154],"requirement":[155],"same":[158],"time.":[159]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
