{"id":"https://openalex.org/W4406267577","doi":"https://doi.org/10.1109/vtc2024-fall63153.2024.10757598","title":"Location Privacy Protection and 911 Task Allocation in Vehicle-Based via Differential Privacy","display_name":"Location Privacy Protection and 911 Task Allocation in Vehicle-Based via Differential Privacy","publication_year":2024,"publication_date":"2024-10-07","ids":{"openalex":"https://openalex.org/W4406267577","doi":"https://doi.org/10.1109/vtc2024-fall63153.2024.10757598"},"language":"en","primary_location":{"id":"doi:10.1109/vtc2024-fall63153.2024.10757598","is_oa":false,"landing_page_url":"https://doi.org/10.1109/vtc2024-fall63153.2024.10757598","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE 100th Vehicular Technology Conference (VTC2024-Fall)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5037581754","display_name":"Deyuan Qu","orcid":"https://orcid.org/0009-0002-5498-3172"},"institutions":[{"id":"https://openalex.org/I123534392","display_name":"University of North Texas","ror":"https://ror.org/00v97ad02","country_code":"US","type":"education","lineage":["https://openalex.org/I123534392"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Deyuan Qu","raw_affiliation_strings":["University of North Texas,Department of Computer Science and Engineering,Denton,TX,USA"],"affiliations":[{"raw_affiliation_string":"University of North Texas,Department of Computer Science and Engineering,Denton,TX,USA","institution_ids":["https://openalex.org/I123534392"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068013202","display_name":"Dominic Carrillo","orcid":"https://orcid.org/0000-0003-2613-5328"},"institutions":[{"id":"https://openalex.org/I123534392","display_name":"University of North Texas","ror":"https://ror.org/00v97ad02","country_code":"US","type":"education","lineage":["https://openalex.org/I123534392"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Dominic Carrillo","raw_affiliation_strings":["University of North Texas,Department of Computer Science and Engineering,Denton,TX,USA"],"affiliations":[{"raw_affiliation_string":"University of North Texas,Department of Computer Science and Engineering,Denton,TX,USA","institution_ids":["https://openalex.org/I123534392"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102919649","display_name":"Sudip Dhakal","orcid":"https://orcid.org/0009-0003-7685-6753"},"institutions":[{"id":"https://openalex.org/I123534392","display_name":"University of North Texas","ror":"https://ror.org/00v97ad02","country_code":"US","type":"education","lineage":["https://openalex.org/I123534392"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sudip Dhakal","raw_affiliation_strings":["University of North Texas,Department of Computer Science and Engineering,Denton,TX,USA"],"affiliations":[{"raw_affiliation_string":"University of North Texas,Department of Computer Science and Engineering,Denton,TX,USA","institution_ids":["https://openalex.org/I123534392"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5099054894","display_name":"Mohammad Dehghani Tezerjani","orcid":"https://orcid.org/0009-0003-0790-9831"},"institutions":[{"id":"https://openalex.org/I123534392","display_name":"University of North Texas","ror":"https://ror.org/00v97ad02","country_code":"US","type":"education","lineage":["https://openalex.org/I123534392"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mohammad Dehghani Tezerjani","raw_affiliation_strings":["University of North Texas,Department of Computer Science and Engineering,Denton,TX,USA"],"affiliations":[{"raw_affiliation_string":"University of North Texas,Department of Computer Science and Engineering,Denton,TX,USA","institution_ids":["https://openalex.org/I123534392"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103150339","display_name":"Chenxi Qiu","orcid":"https://orcid.org/0000-0002-3387-9758"},"institutions":[{"id":"https://openalex.org/I123534392","display_name":"University of North Texas","ror":"https://ror.org/00v97ad02","country_code":"US","type":"education","lineage":["https://openalex.org/I123534392"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Chenxi Qiu","raw_affiliation_strings":["University of North Texas,Department of Computer Science and Engineering,Denton,TX,USA"],"affiliations":[{"raw_affiliation_string":"University of North Texas,Department of Computer Science and Engineering,Denton,TX,USA","institution_ids":["https://openalex.org/I123534392"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102751945","display_name":"Qing Yang","orcid":"https://orcid.org/0000-0003-3495-370X"},"institutions":[{"id":"https://openalex.org/I123534392","display_name":"University of North Texas","ror":"https://ror.org/00v97ad02","country_code":"US","type":"education","lineage":["https://openalex.org/I123534392"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Qing Yang","raw_affiliation_strings":["University of North Texas,Department of Computer Science and Engineering,Denton,TX,USA"],"affiliations":[{"raw_affiliation_string":"University of North Texas,Department of Computer Science and Engineering,Denton,TX,USA","institution_ids":["https://openalex.org/I123534392"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5037581754"],"corresponding_institution_ids":["https://openalex.org/I123534392"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.23979037,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9739999771118164,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9739999771118164,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9599999785423279,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.8520935773849487},{"id":"https://openalex.org/keywords/privacy-protection","display_name":"Privacy protection","score":0.8176777362823486},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6570853590965271},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5902778506278992},{"id":"https://openalex.org/keywords/privacy-software","display_name":"Privacy software","score":0.5592992305755615},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.5587478876113892},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.4927509129047394},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.49005424976348877},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.09182336926460266}],"concepts":[{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.8520935773849487},{"id":"https://openalex.org/C3017597292","wikidata":"https://www.wikidata.org/wiki/Q25052250","display_name":"Privacy protection","level":2,"score":0.8176777362823486},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6570853590965271},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5902778506278992},{"id":"https://openalex.org/C509729295","wikidata":"https://www.wikidata.org/wiki/Q7246032","display_name":"Privacy software","level":3,"score":0.5592992305755615},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.5587478876113892},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.4927509129047394},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.49005424976348877},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.09182336926460266},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.0},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/vtc2024-fall63153.2024.10757598","is_oa":false,"landing_page_url":"https://doi.org/10.1109/vtc2024-fall63153.2024.10757598","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE 100th Vehicular Technology Conference (VTC2024-Fall)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W3022534164","https://openalex.org/W2116878667","https://openalex.org/W4396832952","https://openalex.org/W3015944045","https://openalex.org/W3013058036","https://openalex.org/W2769903624","https://openalex.org/W4225340788","https://openalex.org/W1591172238","https://openalex.org/W2951971312","https://openalex.org/W2972172135"],"abstract_inverted_index":{"The":[0],"allocation":[1,110,149],"of":[2,12,24,71,102,139,144],"tasks":[3],"in":[4,147],"emergency":[5],"response":[6],"services,":[7],"particularly":[8],"within":[9],"the":[10,22,31,87,99,103,137,142],"framework":[11,69],"911":[13,74],"operations,":[14],"presents":[15],"a":[16,40,67,79,92,134],"critical":[17],"challenge":[18],"especially":[19],"when":[20],"ensuring":[21],"confidentiality":[23],"workers\u2019":[25,88],"whereabouts.":[26],"This":[27],"issue":[28,64],"arises":[29],"from":[30],"necessity":[32],"for":[33,43,82],"responders":[34],"to":[35,39,55,76,78],"disclose":[36],"their":[37],"whereabouts":[38],"central":[41],"server":[42],"efficient":[44],"task":[45,109,148],"assignment,":[46],"raising":[47],"concerns":[48],"regarding":[49],"privacy":[50,90,105],"breaches":[51],"and":[52,108],"potential":[53],"risks":[54],"responders\u2019":[56],"safety.":[57],"In":[58],"this":[59,63],"paper,":[60],"we":[61,112,132],"address":[62],"by":[65,128],"introducing":[66],"novel":[68],"capable":[70],"assigning":[72],"two":[73,120],"workers":[75],"respond":[77],"patient\u2019s":[80],"request":[81],"help,":[83],"while":[84,150],"effectively":[85],"safeguarding":[86],"location":[89,94,104,152],"through":[91],"devised":[93],"obfuscation":[95],"strategy.":[96],"Based":[97],"on":[98],"constrained":[100],"optimization":[101],"protection":[106],"model":[107],"model,":[111],"find":[113],"that":[114,124],"it":[115],"can":[116,125],"be":[117,126],"approximated":[118],"as":[119],"linear":[121],"programming":[122],"problems":[123],"solved":[127],"mature":[129],"methods.":[130],"Finally,":[131],"conduct":[133],"simulation":[135],"experiments,":[136],"results":[138],"which":[140],"illustrate":[141],"effectiveness":[143],"our":[145],"approach":[146],"preserving":[151],"privacy.":[153]},"counts_by_year":[],"updated_date":"2025-12-22T23:10:17.713674","created_date":"2025-10-10T00:00:00"}
