{"id":"https://openalex.org/W4255627235","doi":"https://doi.org/10.1109/wcncw.2016.7552744","title":"Time obfuscation-based privacy-preserving scheme for Location-Based Services","display_name":"Time obfuscation-based privacy-preserving scheme for Location-Based Services","publication_year":2016,"publication_date":"2016-04-01","ids":{"openalex":"https://openalex.org/W4255627235","doi":"https://doi.org/10.1109/wcncw.2016.7552744"},"language":"en","primary_location":{"id":"doi:10.1109/wcncw.2016.7552744","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wcncw.2016.7552744","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 IEEE Wireless Communications and Networking Conference Workshops (WCNCW)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100325259","display_name":"Fenghua Li","orcid":"https://orcid.org/0000-0003-0638-5610"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Fenghua Li","raw_affiliation_strings":["Institute of Information Engineering Chinese Academy of Sciences, Beijing, Beijing, CN"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering Chinese Academy of Sciences, Beijing, Beijing, CN","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101525398","display_name":"Sheng Wan","orcid":"https://orcid.org/0000-0003-0228-3449"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Sheng Wan","raw_affiliation_strings":["National Key Laboratory of Integrated Networks Services, Xidian University, China"],"affiliations":[{"raw_affiliation_string":"National Key Laboratory of Integrated Networks Services, Xidian University, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024053576","display_name":"Ben Niu","orcid":"https://orcid.org/0000-0001-5822-8743"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ben Niu","raw_affiliation_strings":["State Key Laboratory of Information Security, Chinese Academy of Sciences, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Information Security, Chinese Academy of Sciences, China","institution_ids":["https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100423964","display_name":"Hui Li","orcid":"https://orcid.org/0000-0003-2382-6289"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hui Li","raw_affiliation_strings":["National Key Laboratory of Integrated Networks Services, Xidian University, China"],"affiliations":[{"raw_affiliation_string":"National Key Laboratory of Integrated Networks Services, Xidian University, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100568958","display_name":"Yuanyuan He","orcid":"https://orcid.org/0009-0007-7793-5153"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuanyuan He","raw_affiliation_strings":["State Key Laboratory of Information Security, Chinese Academy of Sciences, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Information Security, Chinese Academy of Sciences, China","institution_ids":["https://openalex.org/I19820366"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100325259"],"corresponding_institution_ids":["https://openalex.org/I19820366","https://openalex.org/I4210156404"],"apc_list":null,"apc_paid":null,"fwci":0.4285,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.8244089,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"465","last_page":"470"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9950000047683716,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11704","display_name":"Mobile Crowdsensing and Crowdsourcing","score":0.9908000230789185,"subfield":{"id":"https://openalex.org/subfields/1706","display_name":"Computer Science Applications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.9017349481582642},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8554784059524536},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.7173950672149658},{"id":"https://openalex.org/keywords/location-based-service","display_name":"Location-based service","score":0.7141993641853333},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5885066986083984},{"id":"https://openalex.org/keywords/point-of-interest","display_name":"Point of interest","score":0.4701393246650696},{"id":"https://openalex.org/keywords/point","display_name":"Point (geometry)","score":0.4633714556694031},{"id":"https://openalex.org/keywords/similarity","display_name":"Similarity (geometry)","score":0.4519217014312744},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4476800560951233},{"id":"https://openalex.org/keywords/construct","display_name":"Construct (python library)","score":0.44487351179122925},{"id":"https://openalex.org/keywords/dual","display_name":"Dual (grammatical number)","score":0.4330029785633087},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.4184662103652954},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3816353976726532},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.23265016078948975},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.10029467940330505}],"concepts":[{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.9017349481582642},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8554784059524536},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.7173950672149658},{"id":"https://openalex.org/C155292070","wikidata":"https://www.wikidata.org/wiki/Q1198122","display_name":"Location-based service","level":2,"score":0.7141993641853333},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5885066986083984},{"id":"https://openalex.org/C150140777","wikidata":"https://www.wikidata.org/wiki/Q960648","display_name":"Point of interest","level":2,"score":0.4701393246650696},{"id":"https://openalex.org/C28719098","wikidata":"https://www.wikidata.org/wiki/Q44946","display_name":"Point (geometry)","level":2,"score":0.4633714556694031},{"id":"https://openalex.org/C103278499","wikidata":"https://www.wikidata.org/wiki/Q254465","display_name":"Similarity (geometry)","level":3,"score":0.4519217014312744},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4476800560951233},{"id":"https://openalex.org/C2780801425","wikidata":"https://www.wikidata.org/wiki/Q5164392","display_name":"Construct (python library)","level":2,"score":0.44487351179122925},{"id":"https://openalex.org/C2780980858","wikidata":"https://www.wikidata.org/wiki/Q110022","display_name":"Dual (grammatical number)","level":2,"score":0.4330029785633087},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.4184662103652954},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3816353976726532},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.23265016078948975},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.10029467940330505},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C124952713","wikidata":"https://www.wikidata.org/wiki/Q8242","display_name":"Literature","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/wcncw.2016.7552744","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wcncw.2016.7552744","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 IEEE Wireless Communications and Networking Conference Workshops (WCNCW)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6100000143051147,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W8114543","https://openalex.org/W1532761024","https://openalex.org/W1557395669","https://openalex.org/W1581319160","https://openalex.org/W1819617256","https://openalex.org/W1914411570","https://openalex.org/W1966517804","https://openalex.org/W1982590063","https://openalex.org/W2002757416","https://openalex.org/W2040953572","https://openalex.org/W2070974188","https://openalex.org/W2074149673","https://openalex.org/W2089959302","https://openalex.org/W2108836391","https://openalex.org/W2125184115","https://openalex.org/W2134479759","https://openalex.org/W2138677604","https://openalex.org/W2145914657","https://openalex.org/W2149826777","https://openalex.org/W2151254335","https://openalex.org/W2153248811","https://openalex.org/W2154851771","https://openalex.org/W2159024459","https://openalex.org/W2538070801","https://openalex.org/W2622005089","https://openalex.org/W6660731454","https://openalex.org/W6673414462","https://openalex.org/W6681663346"],"related_works":["https://openalex.org/W584207424","https://openalex.org/W2757006211","https://openalex.org/W1446677704","https://openalex.org/W4311991908","https://openalex.org/W3022375131","https://openalex.org/W4255627235","https://openalex.org/W2026857761","https://openalex.org/W2981007352","https://openalex.org/W4309651438","https://openalex.org/W4246681749"],"abstract_inverted_index":{"Privacy":[0],"issues":[1],"in":[2,10],"Location-Based":[3],"Services":[4],"(LBSs)":[5],"have":[6],"gained":[7],"tremendous":[8],"attentions":[9],"literature":[11],"over":[12],"recent":[13],"years.":[14],"Existing":[15],"approaches":[16],"always":[17],"fail":[18],"to":[19,67,115,124],"provide":[20],"dual":[21],"privacy":[22],"protection":[23],"on":[24,121],"both":[25],"user's":[26,126],"location":[27,85,99,103],"and":[28,37,59,88,109,131,137],"point":[29],"of":[30,41],"interest":[31],"(POI),":[32],"incur":[33],"endurable":[34],"system":[35],"overhead,":[36],"produce":[38],"high":[39],"quality":[40],"services,":[42],"simultaneously.":[43],"To":[44],"address":[45],"these":[46],"problems,":[47],"we":[48],"propose":[49],"a":[50,76,83,89],"time":[51,66],"obfuscation-based":[52],"scheme,":[53],"termed":[54],"TOP-privacy,":[55],"which":[56,81],"carefully":[57],"generates":[58],"sends":[60],"some":[61,71,98],"dummy":[62,77,84,118],"queries":[63],"at":[64],"leisure":[65],"confuse":[68],"adversaries":[69],"with":[70,101,105],"background":[72],"information.":[73],"TOP-privacy":[74],"employs":[75],"query":[78,119],"generation":[79],"algorithm,":[80],"includes":[82],"selection":[86],"module":[87],"classified":[90],"POI":[91,114],"pool":[92],"construction":[93],"module.":[94],"It":[95],"first":[96],"selects":[97],"candidates":[100],"similar":[102],"distribution":[104],"the":[106,112,117,122,125],"real":[107,127],"user's,":[108],"then":[110],"determines":[111],"optimal":[113],"construct":[116],"based":[120],"similarity":[123],"POI.":[128],"Security":[129],"analysis":[130],"evaluation":[132],"results":[133],"indicate":[134],"its":[135],"effectiveness":[136],"efficiency.":[138]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2018,"cited_by_count":1}],"updated_date":"2026-01-04T23:08:39.989793","created_date":"2025-10-10T00:00:00"}
