{"id":"https://openalex.org/W4387869889","doi":"https://doi.org/10.1109/icc45041.2023.10278670","title":"Efficient and Privacy-Preserving Geo-Social-Based POI Recommendation Over Encrypted Data","display_name":"Efficient and Privacy-Preserving Geo-Social-Based POI Recommendation Over Encrypted Data","publication_year":2023,"publication_date":"2023-05-28","ids":{"openalex":"https://openalex.org/W4387869889","doi":"https://doi.org/10.1109/icc45041.2023.10278670"},"language":"en","primary_location":{"id":"doi:10.1109/icc45041.2023.10278670","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc45041.2023.10278670","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2023 - IEEE International Conference on Communications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5018963732","display_name":"Qi Xu","orcid":"https://orcid.org/0000-0003-3742-9698"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Qi Xu","raw_affiliation_strings":["School of Cyber Engineering, Xidian University,Xi&#x0027;an,China,710126"],"affiliations":[{"raw_affiliation_string":"School of Cyber Engineering, Xidian University,Xi&#x0027;an,China,710126","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021292791","display_name":"Hui Zhu","orcid":"https://orcid.org/0000-0002-5853-633X"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hui Zhu","raw_affiliation_strings":["School of Cyber Engineering, Xidian University,Xi&#x0027;an,China,710126"],"affiliations":[{"raw_affiliation_string":"School of Cyber Engineering, Xidian University,Xi&#x0027;an,China,710126","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091898557","display_name":"Yandong Zheng","orcid":"https://orcid.org/0000-0003-4534-5670"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yandong Zheng","raw_affiliation_strings":["School of Cyber Engineering, Xidian University,Xi&#x0027;an,China,710126"],"affiliations":[{"raw_affiliation_string":"School of Cyber Engineering, Xidian University,Xi&#x0027;an,China,710126","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101864760","display_name":"Fengwei Wang","orcid":"https://orcid.org/0000-0002-6886-8258"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fengwei Wang","raw_affiliation_strings":["School of Cyber Engineering, Xidian University,Xi&#x0027;an,China,710126"],"affiliations":[{"raw_affiliation_string":"School of Cyber Engineering, Xidian University,Xi&#x0027;an,China,710126","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070447777","display_name":"Rongxing Lu","orcid":"https://orcid.org/0000-0001-5720-0941"},"institutions":[{"id":"https://openalex.org/I106938459","display_name":"University of New Brunswick","ror":"https://ror.org/05nkf0n29","country_code":"CA","type":"education","lineage":["https://openalex.org/I106938459"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Rongxing Lu","raw_affiliation_strings":["University of New Brunswick,Faculty of Computer Science,Fredericton,Canada","Faculty of Computer Science, University of New Brunswick, Fredericton, Canada"],"affiliations":[{"raw_affiliation_string":"University of New Brunswick,Faculty of Computer Science,Fredericton,Canada","institution_ids":["https://openalex.org/I106938459"]},{"raw_affiliation_string":"Faculty of Computer Science, University of New Brunswick, Fredericton, Canada","institution_ids":["https://openalex.org/I106938459"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5002106068","display_name":"Le Gao","orcid":"https://orcid.org/0000-0003-3410-2307"},"institutions":[{"id":"https://openalex.org/I4210151615","display_name":"Wuyi University","ror":"https://ror.org/0488wz367","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210151615"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Le Gao","raw_affiliation_strings":["Wuyi University,Faculty of Intelligent Manufacturing,Jiangmen,China,529020"],"affiliations":[{"raw_affiliation_string":"Wuyi University,Faculty of Intelligent Manufacturing,Jiangmen,China,529020","institution_ids":["https://openalex.org/I4210151615"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5018963732"],"corresponding_institution_ids":["https://openalex.org/I149594827"],"apc_list":null,"apc_paid":null,"fwci":0.1748,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.56943423,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1603","last_page":"1608"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9921000003814697,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8084763288497925},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.5842306613922119},{"id":"https://openalex.org/keywords/quadtree","display_name":"Quadtree","score":0.5685529112815857},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.48684996366500854},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.4851594567298889},{"id":"https://openalex.org/keywords/collaborative-filtering","display_name":"Collaborative filtering","score":0.4450386166572571},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.41249826550483704},{"id":"https://openalex.org/keywords/popularity","display_name":"Popularity","score":0.41022688150405884},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4047990143299103},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.3497454822063446},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.34667325019836426},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3218514323234558},{"id":"https://openalex.org/keywords/recommender-system","display_name":"Recommender system","score":0.25885239243507385},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.22198763489723206}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8084763288497925},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5842306613922119},{"id":"https://openalex.org/C151416825","wikidata":"https://www.wikidata.org/wiki/Q934791","display_name":"Quadtree","level":2,"score":0.5685529112815857},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.48684996366500854},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.4851594567298889},{"id":"https://openalex.org/C21569690","wikidata":"https://www.wikidata.org/wiki/Q94702","display_name":"Collaborative filtering","level":3,"score":0.4450386166572571},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.41249826550483704},{"id":"https://openalex.org/C2780586970","wikidata":"https://www.wikidata.org/wiki/Q1357284","display_name":"Popularity","level":2,"score":0.41022688150405884},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4047990143299103},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3497454822063446},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.34667325019836426},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3218514323234558},{"id":"https://openalex.org/C557471498","wikidata":"https://www.wikidata.org/wiki/Q554950","display_name":"Recommender system","level":2,"score":0.25885239243507385},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.22198763489723206},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icc45041.2023.10278670","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc45041.2023.10278670","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2023 - IEEE International Conference on Communications","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2560564000","display_name":null,"funder_award_id":"2021YFB3101303","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G6894247995","display_name":null,"funder_award_id":"2022M722498","funder_id":"https://openalex.org/F4320321543","funder_display_name":"China Postdoctoral Science Foundation"},{"id":"https://openalex.org/G8583308527","display_name":null,"funder_award_id":"U22B2030","funder_id":"https://openalex.org/F4320320997","funder_display_name":"Funda\u00e7\u00e3o de Amparo \u00e0 Pesquisa do Estado de S\u00e3o Paulo"}],"funders":[{"id":"https://openalex.org/F4320320997","display_name":"Funda\u00e7\u00e3o de Amparo \u00e0 Pesquisa do Estado de S\u00e3o Paulo","ror":"https://ror.org/02ddkpn78"},{"id":"https://openalex.org/F4320321543","display_name":"China Postdoctoral Science Foundation","ror":"https://ror.org/0426zh255"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W2073093414","https://openalex.org/W2132069633","https://openalex.org/W2177209050","https://openalex.org/W2341774241","https://openalex.org/W2554551189","https://openalex.org/W2804473994","https://openalex.org/W3045297481","https://openalex.org/W3191008542","https://openalex.org/W4206917699","https://openalex.org/W4285216180","https://openalex.org/W6679663036","https://openalex.org/W6807299768"],"related_works":["https://openalex.org/W2368605798","https://openalex.org/W2372141727","https://openalex.org/W2538163433","https://openalex.org/W2388177796","https://openalex.org/W2286458017","https://openalex.org/W2368170224","https://openalex.org/W2207790469","https://openalex.org/W2091889591","https://openalex.org/W2384182519","https://openalex.org/W2367540977"],"abstract_inverted_index":{"With":[0],"the":[1,24,37,42,48,51,60,74,113,117,121,126,159,165],"development":[2],"of":[3,13,31,40,63,167],"location":[4],"based":[5,177],"service":[6,46],"and":[7,26,97,120,137,172,188],"online":[8],"social":[9,27,127],"networking,":[10],"geo-social-based":[11,43,75,99],"points":[12],"interest":[14],"(POIs)":[15],"recommendation":[16,45,101,154],"has":[17],"received":[18],"wide":[19],"attention,":[20],"which":[21],"comprehensively":[22],"considers":[23],"geographic":[25,118],"factors.":[28],"The":[29],"popularity":[30],"cloud":[32,52],"computing":[33],"techniques":[34],"have":[35,70],"driven":[36],"emerging":[38],"trend":[39],"outsourcing":[41],"POI":[44,76,100,134,140,153,169],"to":[47,59,115,124,143,163],"cloud.":[49],"However,":[50],"server":[53],"is":[54,186,194],"not":[55,150],"fully":[56],"trusted,":[57],"leading":[58],"raising":[61],"concerns":[62],"data":[64,119],"privacy.":[65],"Although":[66],"many":[67],"privacy-preserving":[68,98],"schemes":[69],"been":[71],"proposed":[72],"for":[73],"recommendation,":[77],"they":[78],"can":[79],"only":[80],"return":[81],"approximate":[82],"query":[83,107],"results.":[84,108],"Aiming":[85],"at":[86],"addressing":[87],"this":[88,91],"issue,":[89],"in":[90],"paper,":[92],"we":[93,110,130,157],"propose":[94,173],"an":[95],"efficient":[96],"scheme,":[102],"called":[103],"TRIPE,":[104],"with":[105],"accurate":[106],"Specifically,":[109],"first":[111],"leverage":[112],"Quadtree":[114],"organize":[116],"MinHash":[122],"method":[123],"index":[125],"data.":[128],"Then,":[129],"design":[131],"a":[132,138],"Quadtree-based":[133],"filtering":[135,141,170],"algorithm":[136,142],"MinHash-based":[139],"filter":[144],"out":[145],"some":[146],"POIs":[147],"that":[148,184,192],"do":[149],"meet":[151],"geo-social":[152],"threshold.":[155],"Meanwhile,":[156],"employ":[158],"BGV":[160],"homomorphic":[161],"encryption":[162],"protect":[164],"privacy":[166],"Quadtree-based/MinHash-based":[168],"algorithms":[171],"our":[174],"TRIPE":[175,185,193],"scheme":[176],"on":[178],"these":[179],"algorithms.":[180],"Security":[181],"analysis":[182],"shows":[183],"privacy-preserving,":[187],"experimental":[189],"results":[190],"show":[191],"efficient.":[195]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
