{"id":"https://openalex.org/W7106251719","doi":"https://doi.org/10.1109/tsc.2025.3635240","title":"Location Privacy Protection Method Based on Local Differential Privacy in Crowdsensing With Approximately Accurate Task Allocation","display_name":"Location Privacy Protection Method Based on Local Differential Privacy in Crowdsensing With Approximately Accurate Task Allocation","publication_year":2025,"publication_date":"2025-11-21","ids":{"openalex":"https://openalex.org/W7106251719","doi":"https://doi.org/10.1109/tsc.2025.3635240"},"language":null,"primary_location":{"id":"doi:10.1109/tsc.2025.3635240","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tsc.2025.3635240","pdf_url":null,"source":{"id":"https://openalex.org/S204223317","display_name":"IEEE Transactions on Services Computing","issn_l":"1939-1374","issn":["1939-1374","2372-0204"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Services Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Yutao Huang","orcid":"https://orcid.org/0009-0002-7491-8458"},"institutions":[{"id":"https://openalex.org/I4472751","display_name":"Anhui Normal University","ror":"https://ror.org/05fsfvw79","country_code":"CN","type":"education","lineage":["https://openalex.org/I4472751"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yutao Huang","raw_affiliation_strings":["School of Computer and Information, Anhui Provincial Key Laboratory of Industrial Intelligence Data Security, Anhui Normal University, Wuhu, China"],"raw_orcid":"https://orcid.org/0009-0002-7491-8458","affiliations":[{"raw_affiliation_string":"School of Computer and Information, Anhui Provincial Key Laboratory of Industrial Intelligence Data Security, Anhui Normal University, Wuhu, China","institution_ids":["https://openalex.org/I4472751"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Tianjiao Ni","orcid":"https://orcid.org/0000-0001-9705-0888"},"institutions":[{"id":"https://openalex.org/I4472751","display_name":"Anhui Normal University","ror":"https://ror.org/05fsfvw79","country_code":"CN","type":"education","lineage":["https://openalex.org/I4472751"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tianjiao Ni","raw_affiliation_strings":["School of Computer and Information, Anhui Provincial Key Laboratory of Industrial Intelligence Data Security, Anhui Normal University, Wuhu, China"],"raw_orcid":"https://orcid.org/0000-0001-9705-0888","affiliations":[{"raw_affiliation_string":"School of Computer and Information, Anhui Provincial Key Laboratory of Industrial Intelligence Data Security, Anhui Normal University, Wuhu, China","institution_ids":["https://openalex.org/I4472751"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Ying Liu","orcid":null},"institutions":[{"id":"https://openalex.org/I4472751","display_name":"Anhui Normal University","ror":"https://ror.org/05fsfvw79","country_code":"CN","type":"education","lineage":["https://openalex.org/I4472751"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ying Liu","raw_affiliation_strings":["School of Computer and Information, Anhui Provincial Key Laboratory of Industrial Intelligence Data Security, Anhui Normal University, Wuhu, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Computer and Information, Anhui Provincial Key Laboratory of Industrial Intelligence Data Security, Anhui Normal University, Wuhu, China","institution_ids":["https://openalex.org/I4472751"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Peng Hu","orcid":"https://orcid.org/0000-0003-4439-4534"},"institutions":[{"id":"https://openalex.org/I4472751","display_name":"Anhui Normal University","ror":"https://ror.org/05fsfvw79","country_code":"CN","type":"education","lineage":["https://openalex.org/I4472751"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Peng Hu","raw_affiliation_strings":["School of Computer and Information, Anhui Provincial Key Laboratory of Industrial Intelligence Data Security, Anhui Normal University, Wuhu, China"],"raw_orcid":"https://orcid.org/0000-0003-4439-4534","affiliations":[{"raw_affiliation_string":"School of Computer and Information, Anhui Provincial Key Laboratory of Industrial Intelligence Data Security, Anhui Normal University, Wuhu, China","institution_ids":["https://openalex.org/I4472751"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Qingying Yu","orcid":"https://orcid.org/0000-0002-5816-3190"},"institutions":[{"id":"https://openalex.org/I4472751","display_name":"Anhui Normal University","ror":"https://ror.org/05fsfvw79","country_code":"CN","type":"education","lineage":["https://openalex.org/I4472751"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qingying Yu","raw_affiliation_strings":["School of Computer and Information, Anhui Provincial Key Laboratory of Industrial Intelligence Data Security, Anhui Normal University, Wuhu, China"],"raw_orcid":"https://orcid.org/0000-0002-5816-3190","affiliations":[{"raw_affiliation_string":"School of Computer and Information, Anhui Provincial Key Laboratory of Industrial Intelligence Data Security, Anhui Normal University, Wuhu, China","institution_ids":["https://openalex.org/I4472751"]}]},{"author_position":"last","author":{"id":null,"display_name":"Yonglong Luo","orcid":"https://orcid.org/0000-0003-4987-0376"},"institutions":[{"id":"https://openalex.org/I4472751","display_name":"Anhui Normal University","ror":"https://ror.org/05fsfvw79","country_code":"CN","type":"education","lineage":["https://openalex.org/I4472751"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yonglong Luo","raw_affiliation_strings":["School of Computer and Information, Anhui Provincial Key Laboratory of Industrial Intelligence Data Security, Anhui Normal University, Wuhu, China"],"raw_orcid":"https://orcid.org/0000-0003-4987-0376","affiliations":[{"raw_affiliation_string":"School of Computer and Information, Anhui Provincial Key Laboratory of Industrial Intelligence Data Security, Anhui Normal University, Wuhu, China","institution_ids":["https://openalex.org/I4472751"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I4472751"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.62369913,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"19","issue":"1","first_page":"463","last_page":"476"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11704","display_name":"Mobile Crowdsensing and Crowdsourcing","score":0.9686999917030334,"subfield":{"id":"https://openalex.org/subfields/1706","display_name":"Computer Science Applications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11704","display_name":"Mobile Crowdsensing and Crowdsourcing","score":0.9686999917030334,"subfield":{"id":"https://openalex.org/subfields/1706","display_name":"Computer Science Applications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.016499999910593033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11980","display_name":"Human Mobility and Location-Based Analysis","score":0.0017999999690800905,"subfield":{"id":"https://openalex.org/subfields/3313","display_name":"Transportation"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.7720999717712402},{"id":"https://openalex.org/keywords/privacy-protection","display_name":"Privacy protection","score":0.505299985408783},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.5044000148773193},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.444599986076355},{"id":"https://openalex.org/keywords/merge","display_name":"Merge (version control)","score":0.4287000000476837},{"id":"https://openalex.org/keywords/crowdsensing","display_name":"Crowdsensing","score":0.40639999508857727},{"id":"https://openalex.org/keywords/mobile-computing","display_name":"Mobile computing","score":0.38929998874664307},{"id":"https://openalex.org/keywords/mobile-telephony","display_name":"Mobile telephony","score":0.33329999446868896},{"id":"https://openalex.org/keywords/differential","display_name":"Differential (mechanical device)","score":0.3237000107765198}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8815000057220459},{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.7720999717712402},{"id":"https://openalex.org/C3017597292","wikidata":"https://www.wikidata.org/wiki/Q25052250","display_name":"Privacy protection","level":2,"score":0.505299985408783},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.5044000148773193},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.444599986076355},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.43220001459121704},{"id":"https://openalex.org/C197129107","wikidata":"https://www.wikidata.org/wiki/Q1921621","display_name":"Merge (version control)","level":2,"score":0.4287000000476837},{"id":"https://openalex.org/C2780821482","wikidata":"https://www.wikidata.org/wiki/Q25381721","display_name":"Crowdsensing","level":2,"score":0.40639999508857727},{"id":"https://openalex.org/C144543869","wikidata":"https://www.wikidata.org/wiki/Q2738570","display_name":"Mobile computing","level":2,"score":0.38929998874664307},{"id":"https://openalex.org/C95491727","wikidata":"https://www.wikidata.org/wiki/Q992968","display_name":"Mobile telephony","level":3,"score":0.33329999446868896},{"id":"https://openalex.org/C93226319","wikidata":"https://www.wikidata.org/wiki/Q193137","display_name":"Differential (mechanical device)","level":2,"score":0.3237000107765198},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.32260000705718994},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.322299987077713},{"id":"https://openalex.org/C175154964","wikidata":"https://www.wikidata.org/wiki/Q380077","display_name":"Task analysis","level":3,"score":0.3131999969482422},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.31029999256134033},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.3050000071525574},{"id":"https://openalex.org/C62230096","wikidata":"https://www.wikidata.org/wiki/Q275969","display_name":"Crowdsourcing","level":2,"score":0.3018999993801117},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.29429998993873596},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.2870999872684479},{"id":"https://openalex.org/C165064840","wikidata":"https://www.wikidata.org/wiki/Q1321061","display_name":"Matching (statistics)","level":2,"score":0.2791000008583069},{"id":"https://openalex.org/C155292070","wikidata":"https://www.wikidata.org/wiki/Q1198122","display_name":"Location-based service","level":2,"score":0.27810001373291016},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.27549999952316284},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.2727999985218048},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.272599995136261},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2648000121116638},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.2648000121116638},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.25119999051094055}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tsc.2025.3635240","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tsc.2025.3635240","pdf_url":null,"source":{"id":"https://openalex.org/S204223317","display_name":"IEEE Transactions on Services Computing","issn_l":"1939-1374","issn":["1939-1374","2372-0204"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Services Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5513392686843872,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G5497932038","display_name":null,"funder_award_id":"62472006","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G67807964","display_name":null,"funder_award_id":"62272006","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":43,"referenced_works":["https://openalex.org/W1655958391","https://openalex.org/W2073013176","https://openalex.org/W2110953678","https://openalex.org/W2964899773","https://openalex.org/W2969716496","https://openalex.org/W2977620944","https://openalex.org/W3012539654","https://openalex.org/W3021782190","https://openalex.org/W3082944180","https://openalex.org/W3092052081","https://openalex.org/W3095673477","https://openalex.org/W3129515304","https://openalex.org/W3138101739","https://openalex.org/W3158323884","https://openalex.org/W3167641868","https://openalex.org/W3181932504","https://openalex.org/W3182996661","https://openalex.org/W3192711727","https://openalex.org/W3208764342","https://openalex.org/W3209696639","https://openalex.org/W3211875619","https://openalex.org/W4206657864","https://openalex.org/W4210406404","https://openalex.org/W4226310479","https://openalex.org/W4283210954","https://openalex.org/W4283211270","https://openalex.org/W4285185553","https://openalex.org/W4285235214","https://openalex.org/W4286268436","https://openalex.org/W4293428522","https://openalex.org/W4296339010","https://openalex.org/W4301430327","https://openalex.org/W4302734258","https://openalex.org/W4313307842","https://openalex.org/W4315926882","https://openalex.org/W4366978217","https://openalex.org/W4380881428","https://openalex.org/W4385945597","https://openalex.org/W4387917756","https://openalex.org/W4390605239","https://openalex.org/W4392382293","https://openalex.org/W4396982325","https://openalex.org/W4400409839"],"related_works":[],"abstract_inverted_index":{"With":[0],"the":[1,19,23,31,36,40,56,77,94,119,123,129,144,151,158,164,169,207,212],"widespread":[2],"adoption":[3],"of":[4,22,42,58,80,122,128,209,214],"smartphones":[5],"and":[6,25,82,105,181,204,211],"other":[7],"mobile":[8],"intelligent":[9],"devices,":[10],"Mobile":[11],"Crowd":[12],"Sensing":[13],"(MCS)":[14],"is":[15,147],"widely":[16],"used.":[17],"Typically,":[18],"real":[20],"locations":[21],"workers":[24,81,161],"tasks":[26,83],"must":[27],"be":[28],"submitted":[29],"to":[30,34,112,133,149,167,193],"service":[32],"platform":[33,159],"complete":[35,168],"task":[37,88,170,186],"allocation.":[38,171,187],"Therefore,":[39],"protection":[41,67,213],"location":[43,59,65,78,138,153,166,215],"information":[44,60,66],"has":[45],"become":[46],"a":[47,64,109,135],"key":[48],"factor":[49],"in":[50],"influencing":[51],"user":[52],"participation.":[53],"To":[54],"address":[55],"issue":[57],"leakage,":[61],"we":[62,92],"propose":[63],"method":[68,197],"based":[69,162],"on":[70,163],"local":[71],"differential":[72,179],"privacy,":[73],"which":[74],"can":[75],"protect":[76],"privacy":[79,180],"while":[84],"generating":[85],"approximately":[86,184],"accurate":[87,185],"allocation":[89],"results.":[90],"Firstly,":[91],"divide":[93],"region":[95],"into":[96],"<inline-formula":[97],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[98,101],"xmlns:xlink=\"http://www.w3.org/1999/xlink\"><tex-math":[99,102],"notation=\"LaTeX\">$k$</tex-math></inline-formula>*<inline-formula":[100],"notation=\"LaTeX\">$k$</tex-math></inline-formula>":[103],"grids":[104],"merge":[106],"girds":[107],"with":[108],"similar":[110],"dispersion":[111],"form":[113],"clusters.":[114],"Then,":[115],"this":[116,196],"paper":[117],"utilizes":[118],"inverse":[120],"sampling":[121],"cumulative":[124],"distribution":[125,132],"function":[126],"(CDF)":[127],"flipped":[130],"Huber":[131],"generate":[134],"personalized":[136],"noise":[137],"set":[139],"for":[140,154],"each":[141,155],"cluster.":[142],"Furthermore,":[143],"exponential":[145],"mechanism":[146,177],"used":[148],"select":[150],"obfuscated":[152],"user.":[156],"Finally,":[157],"selects":[160],"perturbed":[165],"Theoretical":[172],"analysis":[173],"shows":[174],"that":[175],"our":[176],"satisfies":[178],"achieves":[182],"an":[183],"Experimental":[188],"results":[189],"demonstrate":[190],"that,":[191],"compared":[192],"existing":[194],"methods,":[195],"exhibits":[198],"superior":[199],"performance":[200],"across":[201],"different":[202],"datasets":[203],"effectively":[205],"balances":[206],"utility":[208],"data":[210],"privacy.":[216]},"counts_by_year":[],"updated_date":"2026-02-09T05:59:30.833894","created_date":"2025-11-23T00:00:00"}
