{"id":"https://openalex.org/W2080201182","doi":"https://doi.org/10.1109/isi.2012.6284198","title":"Preserving privacy for moving objects data mining","display_name":"Preserving privacy for moving objects data mining","publication_year":2012,"publication_date":"2012-06-01","ids":{"openalex":"https://openalex.org/W2080201182","doi":"https://doi.org/10.1109/isi.2012.6284198","mag":"2080201182"},"language":"en","primary_location":{"id":"doi:10.1109/isi.2012.6284198","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isi.2012.6284198","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 IEEE International Conference on Intelligence and Security Informatics","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5049730546","display_name":"Shen-Shyang Ho","orcid":"https://orcid.org/0000-0002-0353-7159"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":true,"raw_author_name":"Shen-Shyang Ho","raw_affiliation_strings":["Division of Software and Information Systems, School of Computer Engineering, Nanyang Technological University, Singapore","Division of Software and Information Systems, School of Computer Engineering, Nanyang Technological University, Singapore 639798"],"affiliations":[{"raw_affiliation_string":"Division of Software and Information Systems, School of Computer Engineering, Nanyang Technological University, Singapore","institution_ids":["https://openalex.org/I172675005"]},{"raw_affiliation_string":"Division of Software and Information Systems, School of Computer Engineering, Nanyang Technological University, Singapore 639798","institution_ids":["https://openalex.org/I172675005"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5049730546"],"corresponding_institution_ids":["https://openalex.org/I172675005"],"apc_list":null,"apc_paid":null,"fwci":1.2844,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.83532033,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"15","issue":null,"first_page":"135","last_page":"137"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9940000176429749,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.8261446356773376},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7977046966552734},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.735560417175293},{"id":"https://openalex.org/keywords/raw-data","display_name":"Raw data","score":0.6644939184188843},{"id":"https://openalex.org/keywords/mechanism","display_name":"Mechanism (biology)","score":0.6109658479690552},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5680288076400757},{"id":"https://openalex.org/keywords/trajectory","display_name":"Trajectory","score":0.5652753114700317},{"id":"https://openalex.org/keywords/object","display_name":"Object (grammar)","score":0.5177547335624695},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.47473177313804626},{"id":"https://openalex.org/keywords/differential","display_name":"Differential (mechanical device)","score":0.4572013318538666},{"id":"https://openalex.org/keywords/privacy-protection","display_name":"Privacy protection","score":0.44396883249282837},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3996278941631317},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.23179689049720764},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.08174493908882141}],"concepts":[{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.8261446356773376},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7977046966552734},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.735560417175293},{"id":"https://openalex.org/C132964779","wikidata":"https://www.wikidata.org/wiki/Q2110223","display_name":"Raw data","level":2,"score":0.6644939184188843},{"id":"https://openalex.org/C89611455","wikidata":"https://www.wikidata.org/wiki/Q6804646","display_name":"Mechanism (biology)","level":2,"score":0.6109658479690552},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5680288076400757},{"id":"https://openalex.org/C13662910","wikidata":"https://www.wikidata.org/wiki/Q193139","display_name":"Trajectory","level":2,"score":0.5652753114700317},{"id":"https://openalex.org/C2781238097","wikidata":"https://www.wikidata.org/wiki/Q175026","display_name":"Object (grammar)","level":2,"score":0.5177547335624695},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.47473177313804626},{"id":"https://openalex.org/C93226319","wikidata":"https://www.wikidata.org/wiki/Q193137","display_name":"Differential (mechanical device)","level":2,"score":0.4572013318538666},{"id":"https://openalex.org/C3017597292","wikidata":"https://www.wikidata.org/wiki/Q25052250","display_name":"Privacy protection","level":2,"score":0.44396883249282837},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3996278941631317},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.23179689049720764},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.08174493908882141},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0},{"id":"https://openalex.org/C1276947","wikidata":"https://www.wikidata.org/wiki/Q333","display_name":"Astronomy","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/isi.2012.6284198","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isi.2012.6284198","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 IEEE International Conference on Intelligence and Security Informatics","raw_type":"proceedings-article"},{"id":"pmh:oai:dr.ntu.edu.sg:10356/103169","is_oa":false,"landing_page_url":"http://hdl.handle.net/10220/16905","pdf_url":null,"source":{"id":"https://openalex.org/S4306402609","display_name":"DR-NTU (Nanyang Technological University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I172675005","host_organization_name":"Nanyang Technological University","host_organization_lineage":["https://openalex.org/I172675005"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Conference Paper"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W173622546","https://openalex.org/W646920897","https://openalex.org/W1488678234","https://openalex.org/W1506285740","https://openalex.org/W1527151103","https://openalex.org/W1528076390","https://openalex.org/W1556875896","https://openalex.org/W1575207522","https://openalex.org/W1590790195","https://openalex.org/W1673310716","https://openalex.org/W1766171436","https://openalex.org/W1873763122","https://openalex.org/W1982397092","https://openalex.org/W2003489401","https://openalex.org/W2022097286","https://openalex.org/W2032521898","https://openalex.org/W2076675165","https://openalex.org/W2077217970","https://openalex.org/W2078101615","https://openalex.org/W2096870293","https://openalex.org/W2100921307","https://openalex.org/W2101024939","https://openalex.org/W2101771965","https://openalex.org/W2102611836","https://openalex.org/W2109135024","https://openalex.org/W2119874464","https://openalex.org/W2124612670","https://openalex.org/W2127256970","https://openalex.org/W2128906841","https://openalex.org/W2140251882","https://openalex.org/W2159024459","https://openalex.org/W2173102402","https://openalex.org/W2251664932","https://openalex.org/W2911978475","https://openalex.org/W6637131181"],"related_works":["https://openalex.org/W3010781909","https://openalex.org/W4200233390","https://openalex.org/W4315705624","https://openalex.org/W2605443953","https://openalex.org/W3116386889","https://openalex.org/W4313218046","https://openalex.org/W2943138144","https://openalex.org/W4388855833","https://openalex.org/W1604340626","https://openalex.org/W3127289135"],"abstract_inverted_index":{"The":[0],"prevalence":[1],"of":[2,17,48,73,109],"mobile":[3],"devices":[4],"with":[5,115],"geopositioning":[6],"capability":[7],"has":[8],"resulted":[9],"in":[10,14,84],"the":[11,15,46,54,90,99,107,110,116],"rapid":[12],"growth":[13],"amount":[16],"moving":[18,80],"object":[19],"trajectories.":[20],"These":[21],"data":[22,52,82],"have":[23],"been":[24],"collected":[25],"and":[26,34,38,53],"analyzed":[27],"for":[28,79],"both":[29],"commercial":[30],"(e.g.,":[31],"recommendation":[32],"system)":[33,40],"security":[35],"(e.g.":[36],"surveillance":[37],"monitoring":[39],"purposes.":[41],"One":[42],"needs":[43],"to":[44,63,89,105],"ensure":[45],"privacy":[47,113,119],"these":[49],"raw":[50],"trajectory":[51],"derived":[55],"knowledge":[56],"by":[57],"not":[58],"disclosing":[59],"or":[60],"releasing":[61],"them":[62],"adversary.":[64],"In":[65],"this":[66],"paper,":[67],"we":[68,86],"propose":[69],"a":[70,74],"practical":[71],"implementation":[72],"(\u03b5;":[75,111],"\u03b4)-differentially":[76],"private":[77],"mechanism":[78,114],"objects":[81],"mining;":[83],"particular,":[85],"apply":[87],"it":[88],"frequent":[91],"location":[92],"pattern":[93],"mining":[94],"algorithm.":[95],"Experimental":[96],"results":[97],"on":[98],"real-world":[100],"GeoLife":[101],"dataset":[102],"are":[103],"used":[104],"compare":[106],"performance":[108],"\u03b4)-differential":[112],"standard":[117],"\u03b5-differential":[118],"mechanism.":[120]},"counts_by_year":[{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":2},{"year":2015,"cited_by_count":1},{"year":2013,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
