{"id":"https://openalex.org/W2769903624","doi":"https://doi.org/10.1109/tii.2017.2773646","title":"Location Privacy Protection Based on Differential Privacy Strategy for Big Data in Industrial Internet of Things","display_name":"Location Privacy Protection Based on Differential Privacy Strategy for Big Data in Industrial Internet of Things","publication_year":2017,"publication_date":"2017-11-15","ids":{"openalex":"https://openalex.org/W2769903624","doi":"https://doi.org/10.1109/tii.2017.2773646","mag":"2769903624"},"language":"en","primary_location":{"id":"doi:10.1109/tii.2017.2773646","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tii.2017.2773646","pdf_url":null,"source":{"id":"https://openalex.org/S184777250","display_name":"IEEE Transactions on Industrial Informatics","issn_l":"1551-3203","issn":["1551-3203","1941-0050"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Industrial Informatics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101592087","display_name":"Chunyong Yin","orcid":"https://orcid.org/0000-0003-3340-0695"},"institutions":[{"id":"https://openalex.org/I200845125","display_name":"Nanjing University of Information Science and Technology","ror":"https://ror.org/02y0rxk19","country_code":"CN","type":"education","lineage":["https://openalex.org/I200845125"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Chunyong Yin","raw_affiliation_strings":["School of Computer and Software, Nanjing University of Information Science & Technology, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Software, Nanjing University of Information Science & Technology, Nanjing, China","institution_ids":["https://openalex.org/I200845125"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102830221","display_name":"Jinwen Xi","orcid":"https://orcid.org/0000-0002-0397-3241"},"institutions":[{"id":"https://openalex.org/I200845125","display_name":"Nanjing University of Information Science and Technology","ror":"https://ror.org/02y0rxk19","country_code":"CN","type":"education","lineage":["https://openalex.org/I200845125"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jinwen Xi","raw_affiliation_strings":["School of Computer and Software, Nanjing University of Information Science & Technology, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Software, Nanjing University of Information Science & Technology, Nanjing, China","institution_ids":["https://openalex.org/I200845125"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101634930","display_name":"Ruxia Sun","orcid":"https://orcid.org/0000-0001-8892-4424"},"institutions":[{"id":"https://openalex.org/I200845125","display_name":"Nanjing University of Information Science and Technology","ror":"https://ror.org/02y0rxk19","country_code":"CN","type":"education","lineage":["https://openalex.org/I200845125"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ruxia Sun","raw_affiliation_strings":["School of Computer and Software, Nanjing University of Information Science & Technology, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Software, Nanjing University of Information Science & Technology, Nanjing, China","institution_ids":["https://openalex.org/I200845125"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5109791237","display_name":"Jin Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I78978612","display_name":"Yangzhou University","ror":"https://ror.org/03tqb8s11","country_code":"CN","type":"education","lineage":["https://openalex.org/I78978612"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jin Wang","raw_affiliation_strings":["College of Information Engineering, Yangzhou University, Yangzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Information Engineering, Yangzhou University, Yangzhou, China","institution_ids":["https://openalex.org/I78978612"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5101592087"],"corresponding_institution_ids":["https://openalex.org/I200845125"],"apc_list":null,"apc_paid":null,"fwci":24.2723,"has_fulltext":false,"cited_by_count":329,"citation_normalized_percentile":{"value":0.99575183,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"14","issue":"8","first_page":"3628","last_page":"3636"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9854000210762024,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.96670001745224,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.8211420178413391},{"id":"https://openalex.org/keywords/privacy-software","display_name":"Privacy software","score":0.7149410843849182},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.6830500364303589},{"id":"https://openalex.org/keywords/privacy-protection","display_name":"Privacy protection","score":0.6581161022186279},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.6309372186660767},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5629692673683167},{"id":"https://openalex.org/keywords/big-data","display_name":"Big data","score":0.562917172908783},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5358352065086365},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.49919581413269043},{"id":"https://openalex.org/keywords/privacy-by-design","display_name":"Privacy by Design","score":0.49424222111701965},{"id":"https://openalex.org/keywords/data-protection-act-1998","display_name":"Data Protection Act 1998","score":0.44912174344062805},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.3251868784427643},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.20525714755058289},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.14364248514175415}],"concepts":[{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.8211420178413391},{"id":"https://openalex.org/C509729295","wikidata":"https://www.wikidata.org/wiki/Q7246032","display_name":"Privacy software","level":3,"score":0.7149410843849182},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.6830500364303589},{"id":"https://openalex.org/C3017597292","wikidata":"https://www.wikidata.org/wiki/Q25052250","display_name":"Privacy protection","level":2,"score":0.6581161022186279},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.6309372186660767},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5629692673683167},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.562917172908783},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5358352065086365},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.49919581413269043},{"id":"https://openalex.org/C193934123","wikidata":"https://www.wikidata.org/wiki/Q7246028","display_name":"Privacy by Design","level":3,"score":0.49424222111701965},{"id":"https://openalex.org/C69360830","wikidata":"https://www.wikidata.org/wiki/Q1172237","display_name":"Data Protection Act 1998","level":2,"score":0.44912174344062805},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.3251868784427643},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.20525714755058289},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.14364248514175415}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tii.2017.2773646","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tii.2017.2773646","pdf_url":null,"source":{"id":"https://openalex.org/S184777250","display_name":"IEEE Transactions on Industrial Informatics","issn_l":"1551-3203","issn":["1551-3203","1941-0050"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Industrial Informatics","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.49000000953674316,"display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G5136779775","display_name":null,"funder_award_id":"61402234","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5825953053","display_name":null,"funder_award_id":"61772282","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7170405673","display_name":null,"funder_award_id":"61772454","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G740455759","display_name":null,"funder_award_id":"61373134","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320327518","display_name":"Priority Academic Program Development of Jiangsu Higher Education Institutions","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W1544573083","https://openalex.org/W1976827307","https://openalex.org/W2009331946","https://openalex.org/W2019384076","https://openalex.org/W2042230250","https://openalex.org/W2047656932","https://openalex.org/W2053008565","https://openalex.org/W2061879449","https://openalex.org/W2068220504","https://openalex.org/W2093099348","https://openalex.org/W2109135024","https://openalex.org/W2121386703","https://openalex.org/W2129227919","https://openalex.org/W2136114025","https://openalex.org/W2144092819","https://openalex.org/W2150447982","https://openalex.org/W2168452204","https://openalex.org/W2170577408","https://openalex.org/W2338991442","https://openalex.org/W2472460237","https://openalex.org/W2588247877","https://openalex.org/W2592230399","https://openalex.org/W2605919752","https://openalex.org/W2755724311","https://openalex.org/W2756579916","https://openalex.org/W3008653445","https://openalex.org/W4249605624","https://openalex.org/W4299583294","https://openalex.org/W6644648254","https://openalex.org/W6679122307","https://openalex.org/W6681965783","https://openalex.org/W6744289447","https://openalex.org/W7007516683"],"related_works":["https://openalex.org/W3010781909","https://openalex.org/W4200233390","https://openalex.org/W4315705624","https://openalex.org/W2101582069","https://openalex.org/W2116878667","https://openalex.org/W2379795947","https://openalex.org/W2050200417","https://openalex.org/W4225340788","https://openalex.org/W2348741079","https://openalex.org/W2041722016"],"abstract_inverted_index":{"In":[0,85,116],"the":[1,7,14,25,31,77,107,119,130,133,144,157,163,175,182,186,189],"research":[2],"of":[3,52,61,71,109,118,125,147,174,198],"location":[4,91,102,126,139],"privacy":[5,78,83,92,98,104,134,149],"protection,":[6],"existing":[8],"methods":[9,75],"are":[10],"mostly":[11],"based":[12],"on":[13],"traditional":[15],"anonymization,":[16],"fuzzy":[17],"and":[18,21,50,57,63,105,111,122,135,185,201],"cryptography":[19],"technology,":[20],"little":[22],"success":[23],"in":[24,113,181,196],"big":[26],"data":[27,103,110,154],"environment,":[28],"for":[29],"example,":[30],"sensor":[32],"networks":[33],"contain":[34],"sensitive":[35],"information,":[36],"which":[37,66],"is":[38,150,166,179],"compulsory":[39],"to":[40,82,100,152,156,168,171],"be":[41],"appropriately":[42],"protected.":[43],"Current":[44],"trends,":[45],"such":[46],"as":[47],"\u201cIndustrie":[48],"4.0\u201d":[49],"Internet":[51],"Things":[53],"(IoT),":[54],"generate,":[55],"process,":[56],"exchange":[58],"vast":[59],"amounts":[60],"security-critical":[62],"privacy-sensitive":[64],"data,":[65,127],"makes":[67],"them":[68],"attractive":[69],"targets":[70],"attacks.":[72],"However,":[73],"previous":[74],"overlooked":[76],"protection":[79,93],"issue,":[80],"leading":[81],"violation.":[84],"this":[86],"paper,":[87],"we":[88,128],"propose":[89],"a":[90,137],"method":[94],"that":[95],"satisfies":[96],"differential":[97,148],"constraint":[99],"protect":[101],"maximizes":[106],"utility":[108,131],"algorithm":[112],"Industrial":[114],"IoT.":[115],"view":[117],"high":[120],"value":[121],"low":[123],"density":[124],"combine":[129],"with":[132],"build":[136],"multilevel":[138],"information":[140],"tree":[141,158],"model.":[142],"Furthermore,":[143],"index":[145],"mechanism":[146],"used":[151,167],"select":[153],"according":[155],"node":[159],"accessing":[160,172],"frequency.":[161],"Finally,":[162],"Laplace":[164],"scheme":[165],"add":[169],"noises":[170],"frequency":[173],"selecting":[176],"data.":[177],"As":[178],"shown":[180],"theoretical":[183],"analysis":[184],"experimental":[187],"results,":[188],"proposed":[190],"strategy":[191],"can":[192],"achieve":[193],"significant":[194],"improvements":[195],"terms":[197],"security,":[199],"privacy,":[200],"applicability.":[202]},"counts_by_year":[{"year":2026,"cited_by_count":6},{"year":2025,"cited_by_count":27},{"year":2024,"cited_by_count":39},{"year":2023,"cited_by_count":38},{"year":2022,"cited_by_count":50},{"year":2021,"cited_by_count":53},{"year":2020,"cited_by_count":60},{"year":2019,"cited_by_count":42},{"year":2018,"cited_by_count":14}],"updated_date":"2026-04-04T08:04:53.788161","created_date":"2025-10-10T00:00:00"}
