{"id":"https://openalex.org/W3034245034","doi":"https://doi.org/10.1109/tmc.2020.3000730","title":"Eclipse: Preserving Differential Location Privacy Against Long-Term Observation Attacks","display_name":"Eclipse: Preserving Differential Location Privacy Against Long-Term Observation Attacks","publication_year":2020,"publication_date":"2020-01-01","ids":{"openalex":"https://openalex.org/W3034245034","doi":"https://doi.org/10.1109/tmc.2020.3000730","mag":"3034245034"},"language":"en","primary_location":{"id":"doi:10.1109/tmc.2020.3000730","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tmc.2020.3000730","pdf_url":null,"source":{"id":"https://openalex.org/S69141925","display_name":"IEEE Transactions on Mobile Computing","issn_l":"1536-1233","issn":["1536-1233","1558-0660","2161-9875"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Mobile Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5024053576","display_name":"Ben Niu","orcid":"https://orcid.org/0000-0001-5822-8743"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"BEN NIU","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, Beijing, P.R. China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, P.R. China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5112893853","display_name":"Yahong Chen","orcid":null},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yahong Chen","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, Beijing, P.R. China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, P.R. China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, P.R. China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, P.R. China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100422345","display_name":"Zhibo Wang","orcid":"https://orcid.org/0000-0002-5804-3279"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhibo Wang","raw_affiliation_strings":["Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, Hubei, P.R. China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, Hubei, P.R. China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100325259","display_name":"Fenghua Li","orcid":"https://orcid.org/0000-0003-0638-5610"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"fenghua li","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences, Beijing, P.R. China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing, P.R. China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, P.R. China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, P.R. China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100725035","display_name":"Boyang Wang","orcid":"https://orcid.org/0000-0001-8973-2328"},"institutions":[{"id":"https://openalex.org/I63135867","display_name":"University of Cincinnati","ror":"https://ror.org/01e3m7079","country_code":"US","type":"education","lineage":["https://openalex.org/I63135867"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Boyang Wang","raw_affiliation_strings":["Department of Electrical Engineering and Computer Science, University of Cincinnati, Cincinnati, OH, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering and Computer Science, University of Cincinnati, Cincinnati, OH, USA","institution_ids":["https://openalex.org/I63135867"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100423964","display_name":"Hui Li","orcid":"https://orcid.org/0000-0003-2382-6289"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hui Li","raw_affiliation_strings":["Cyber Engineering, Xidian University, Xi'an, Shaanxi, P.R. China"],"affiliations":[{"raw_affiliation_string":"Cyber Engineering, Xidian University, Xi'an, Shaanxi, P.R. China","institution_ids":["https://openalex.org/I149594827"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5024053576"],"corresponding_institution_ids":["https://openalex.org/I19820366","https://openalex.org/I4210156404"],"apc_list":null,"apc_paid":null,"fwci":4.507,"has_fulltext":false,"cited_by_count":56,"citation_normalized_percentile":{"value":0.95472644,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"1"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11704","display_name":"Mobile Crowdsensing and Crowdsourcing","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/1706","display_name":"Computer Science Applications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7733270525932312},{"id":"https://openalex.org/keywords/term","display_name":"Term (time)","score":0.6960406303405762},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6255437731742859},{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.5473747253417969},{"id":"https://openalex.org/keywords/privacy-protection","display_name":"Privacy protection","score":0.48831483721733093},{"id":"https://openalex.org/keywords/eclipse","display_name":"Eclipse","score":0.46939462423324585},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3576045632362366},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.1213366687297821}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7733270525932312},{"id":"https://openalex.org/C61797465","wikidata":"https://www.wikidata.org/wiki/Q1188986","display_name":"Term (time)","level":2,"score":0.6960406303405762},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6255437731742859},{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.5473747253417969},{"id":"https://openalex.org/C3017597292","wikidata":"https://www.wikidata.org/wiki/Q25052250","display_name":"Privacy protection","level":2,"score":0.48831483721733093},{"id":"https://openalex.org/C2778505590","wikidata":"https://www.wikidata.org/wiki/Q141022","display_name":"Eclipse","level":2,"score":0.46939462423324585},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3576045632362366},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.1213366687297821},{"id":"https://openalex.org/C1276947","wikidata":"https://www.wikidata.org/wiki/Q333","display_name":"Astronomy","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tmc.2020.3000730","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tmc.2020.3000730","pdf_url":null,"source":{"id":"https://openalex.org/S69141925","display_name":"IEEE Transactions on Mobile Computing","issn_l":"1536-1233","issn":["1536-1233","1558-0660","2161-9875"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Mobile Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.5600000023841858,"display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G1383010817","display_name":null,"funder_award_id":"2017YFB0802200","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G1399298930","display_name":null,"funder_award_id":"61672515","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7934681919","display_name":null,"funder_award_id":"61872441","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":46,"referenced_works":["https://openalex.org/W1574220596","https://openalex.org/W1689932539","https://openalex.org/W1711940457","https://openalex.org/W1873763122","https://openalex.org/W1966517804","https://openalex.org/W1994952354","https://openalex.org/W2001347093","https://openalex.org/W2056773559","https://openalex.org/W2060871119","https://openalex.org/W2076675165","https://openalex.org/W2082894754","https://openalex.org/W2116347193","https://openalex.org/W2120911939","https://openalex.org/W2123820077","https://openalex.org/W2125613938","https://openalex.org/W2128870831","https://openalex.org/W2140251882","https://openalex.org/W2151254335","https://openalex.org/W2159772324","https://openalex.org/W2214098444","https://openalex.org/W2463730913","https://openalex.org/W2513202551","https://openalex.org/W2533200335","https://openalex.org/W2583454074","https://openalex.org/W2604253054","https://openalex.org/W2612729617","https://openalex.org/W2746057509","https://openalex.org/W2758068229","https://openalex.org/W2762786854","https://openalex.org/W2775133720","https://openalex.org/W2786134370","https://openalex.org/W2790168780","https://openalex.org/W2799067592","https://openalex.org/W2808853068","https://openalex.org/W2890836728","https://openalex.org/W2900934586","https://openalex.org/W2911978475","https://openalex.org/W2939009167","https://openalex.org/W2972112224","https://openalex.org/W2975069432","https://openalex.org/W3101704102","https://openalex.org/W3105636147","https://openalex.org/W3106047101","https://openalex.org/W3106284904","https://openalex.org/W4255574744","https://openalex.org/W6681663346"],"related_works":["https://openalex.org/W3010781909","https://openalex.org/W4200233390","https://openalex.org/W4315705624","https://openalex.org/W3116386889","https://openalex.org/W2605443953","https://openalex.org/W4313218046","https://openalex.org/W2943138144","https://openalex.org/W1604340626","https://openalex.org/W3127289135","https://openalex.org/W2953707841"],"abstract_inverted_index":{"Mechanisms":[0],"built":[1],"upon":[2],"geo-indistinguishability":[3,114],"render":[4],"location":[5,67,105,125],"privacy,":[6],"where":[7],"a":[8,39,93,132,189],"user":[9],"can":[10,45],"submit":[11],"obfuscated":[12,41],"locations":[13,48,121,141],"to":[14,22,57,97,119,157,161,196],"Location-Based":[15],"Service":[16],"providers":[17],"but":[18],"still":[19],"be":[20],"able":[21],"correctly":[23],"utilize":[24],"services.":[25,110],"However,":[26],"these":[27,89],"mechanisms":[28,81],"are":[29],"vulnerable":[30],"under":[31,82,145],"inference":[32],"attacks.":[33,54,85,148],"Particularly,":[34],"with":[35],"background":[36],"knowledge":[37],"of":[38,65,79,88,109,140,152,173,191],"user\u2019s":[40],"locations,":[42],"an":[43,128],"attacker":[44],"infer":[46],"actual":[47],"by":[49,177],"carrying":[50],"out":[51],"long-term":[52,59,83,146],"observation":[53,60,84,147],"Unfortunately,":[55],"how":[56],"defend":[58],"attacks":[61],"in":[62],"the":[63,77,102,138,150,159,171,174,184],"field":[64],"differential":[66,179],"privacy":[68],"remains":[69],"open.":[70],"In":[71,86],"this":[72],"paper,":[73],"we":[74,91,112,182],"first":[75],"demonstrate":[76,197],"vulnerabilities":[78],"existing":[80],"light":[87],"vulnerabilities,":[90],"devise":[92],"novel":[94],"mechanism,":[95],"referred":[96],"as":[98],"Eclipse,":[99],"which":[100],"bridges":[101],"gap":[103],"between":[104],"protection":[106],"and":[107,115,122,142,163,168,187,200],"usability":[108,162],"Specifically,":[111],"harness":[113],"<inline-formula><tex-math":[116],"notation=\"LaTeX\">$k$</tex-math></inline-formula>":[117],"-anonymity":[118],"obfuscate":[120],"hide":[123],"each":[124],"based":[126],"on":[127,193],"anonymity":[129],"set.":[130],"As":[131],"result,":[133],"our":[134],"mechanism":[135,176,186],"effectively":[136],"perturbs":[137],"distribution":[139],"suppresses":[143],"leakage":[144],"Moreover,":[149,181],"set":[151],"possible":[153],"outputs":[154],"is":[155],"utilized":[156],"minimize":[158],"impacts":[160],"correctness.":[164],"We":[165],"formally":[166],"define":[167],"rigorously":[169],"prove":[170],"security":[172],"proposed":[175,185],"leveraging":[178],"privacy.":[180],"implement":[183],"conduct":[188],"series":[190],"experiments":[192],"real-world":[194],"datasets":[195],"its":[198],"efficacy":[199],"efficiency.":[201]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":11},{"year":2024,"cited_by_count":10},{"year":2023,"cited_by_count":14},{"year":2022,"cited_by_count":9},{"year":2021,"cited_by_count":10},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
