{"id":"https://openalex.org/W4402130297","doi":"https://doi.org/10.1186/s13635-024-00177-0","title":"Trajectory-aware privacy-preserving method with local differential privacy in crowdsourcing","display_name":"Trajectory-aware privacy-preserving method with local differential privacy in crowdsourcing","publication_year":2024,"publication_date":"2024-09-02","ids":{"openalex":"https://openalex.org/W4402130297","doi":"https://doi.org/10.1186/s13635-024-00177-0"},"language":"en","primary_location":{"id":"doi:10.1186/s13635-024-00177-0","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13635-024-00177-0","pdf_url":"https://jis-eurasipjournals.springeropen.com/counter/pdf/10.1186/s13635-024-00177-0","source":{"id":"https://openalex.org/S4210195102","display_name":"EURASIP Journal on Information Security","issn_l":"2510-523X","issn":["2510-523X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"EURASIP Journal on Information Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://jis-eurasipjournals.springeropen.com/counter/pdf/10.1186/s13635-024-00177-0","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5106945846","display_name":"Yingcong Hong","orcid":null},"institutions":[{"id":"https://openalex.org/I16609230","display_name":"Hunan University","ror":"https://ror.org/05htk5m33","country_code":"CN","type":"education","lineage":["https://openalex.org/I16609230"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yingcong Hong","raw_affiliation_strings":["College of Computer Science and Electronic Engineering, Hunan University, Changsha, 410012, China","Hunan Provincial Key Laboratory of Blockchain Infrastructure and Application, Hunan University, Changsha, 410012, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Electronic Engineering, Hunan University, Changsha, 410012, China","institution_ids":["https://openalex.org/I16609230"]},{"raw_affiliation_string":"Hunan Provincial Key Laboratory of Blockchain Infrastructure and Application, Hunan University, Changsha, 410012, China","institution_ids":["https://openalex.org/I16609230"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100363213","display_name":"Junyi Li","orcid":"https://orcid.org/0000-0003-1543-3311"},"institutions":[{"id":"https://openalex.org/I16609230","display_name":"Hunan University","ror":"https://ror.org/05htk5m33","country_code":"CN","type":"education","lineage":["https://openalex.org/I16609230"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Junyi Li","raw_affiliation_strings":["College of Computer Science and Electronic Engineering, Hunan University, Changsha, 410012, China","Hunan Provincial Key Laboratory of Blockchain Infrastructure and Application, Hunan University, Changsha, 410012, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Electronic Engineering, Hunan University, Changsha, 410012, China","institution_ids":["https://openalex.org/I16609230"]},{"raw_affiliation_string":"Hunan Provincial Key Laboratory of Blockchain Infrastructure and Application, Hunan University, Changsha, 410012, China","institution_ids":["https://openalex.org/I16609230"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110015973","display_name":"Yaping Lin","orcid":null},"institutions":[{"id":"https://openalex.org/I16609230","display_name":"Hunan University","ror":"https://ror.org/05htk5m33","country_code":"CN","type":"education","lineage":["https://openalex.org/I16609230"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yaping Lin","raw_affiliation_strings":["College of Computer Science and Electronic Engineering, Hunan University, Changsha, 410012, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Electronic Engineering, Hunan University, Changsha, 410012, China","institution_ids":["https://openalex.org/I16609230"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101697274","display_name":"Hu Qiao","orcid":"https://orcid.org/0000-0001-6233-4653"},"institutions":[{"id":"https://openalex.org/I16609230","display_name":"Hunan University","ror":"https://ror.org/05htk5m33","country_code":"CN","type":"education","lineage":["https://openalex.org/I16609230"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qiao Hu","raw_affiliation_strings":["College of Computer Science and Electronic Engineering, Hunan University, Changsha, 410012, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Electronic Engineering, Hunan University, Changsha, 410012, China","institution_ids":["https://openalex.org/I16609230"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5009985494","display_name":"Xiehua Li","orcid":"https://orcid.org/0000-0002-3958-9866"},"institutions":[{"id":"https://openalex.org/I16609230","display_name":"Hunan University","ror":"https://ror.org/05htk5m33","country_code":"CN","type":"education","lineage":["https://openalex.org/I16609230"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiehua Li","raw_affiliation_strings":["College of Computer Science and Electronic Engineering, Hunan University, Changsha, 410012, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Electronic Engineering, Hunan University, Changsha, 410012, China","institution_ids":["https://openalex.org/I16609230"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5106945846"],"corresponding_institution_ids":["https://openalex.org/I16609230"],"apc_list":{"value":660,"currency":"GBP","value_usd":809},"apc_paid":{"value":660,"currency":"GBP","value_usd":809},"fwci":1.3571,"has_fulltext":true,"cited_by_count":4,"citation_normalized_percentile":{"value":0.84062007,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"2024","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11704","display_name":"Mobile Crowdsensing and Crowdsourcing","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1706","display_name":"Computer Science Applications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/crowdsourcing","display_name":"Crowdsourcing","score":0.8566765189170837},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8347193598747253},{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.804905116558075},{"id":"https://openalex.org/keywords/privacy-protection","display_name":"Privacy protection","score":0.5935326814651489},{"id":"https://openalex.org/keywords/trajectory","display_name":"Trajectory","score":0.5276989936828613},{"id":"https://openalex.org/keywords/privacy-software","display_name":"Privacy software","score":0.5031501650810242},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.4546710252761841},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.44858360290527344},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.41726988554000854},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.26387476921081543},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.19794303178787231}],"concepts":[{"id":"https://openalex.org/C62230096","wikidata":"https://www.wikidata.org/wiki/Q275969","display_name":"Crowdsourcing","level":2,"score":0.8566765189170837},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8347193598747253},{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.804905116558075},{"id":"https://openalex.org/C3017597292","wikidata":"https://www.wikidata.org/wiki/Q25052250","display_name":"Privacy protection","level":2,"score":0.5935326814651489},{"id":"https://openalex.org/C13662910","wikidata":"https://www.wikidata.org/wiki/Q193139","display_name":"Trajectory","level":2,"score":0.5276989936828613},{"id":"https://openalex.org/C509729295","wikidata":"https://www.wikidata.org/wiki/Q7246032","display_name":"Privacy software","level":3,"score":0.5031501650810242},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.4546710252761841},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.44858360290527344},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.41726988554000854},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.26387476921081543},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.19794303178787231},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C1276947","wikidata":"https://www.wikidata.org/wiki/Q333","display_name":"Astronomy","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s13635-024-00177-0","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13635-024-00177-0","pdf_url":"https://jis-eurasipjournals.springeropen.com/counter/pdf/10.1186/s13635-024-00177-0","source":{"id":"https://openalex.org/S4210195102","display_name":"EURASIP Journal on Information Security","issn_l":"2510-523X","issn":["2510-523X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"EURASIP Journal on Information Security","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:58c735a68111413ca2643ad140fd2029","is_oa":true,"landing_page_url":"https://doaj.org/article/58c735a68111413ca2643ad140fd2029","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"EURASIP Journal on Information Security, Vol 2024, Iss 1, Pp 1-14 (2024)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s13635-024-00177-0","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13635-024-00177-0","pdf_url":"https://jis-eurasipjournals.springeropen.com/counter/pdf/10.1186/s13635-024-00177-0","source":{"id":"https://openalex.org/S4210195102","display_name":"EURASIP Journal on Information Security","issn_l":"2510-523X","issn":["2510-523X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"EURASIP Journal on Information Security","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2087396116","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4335622648","display_name":null,"funder_award_id":"6227215","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5994120800","display_name":null,"funder_award_id":"Natural","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7263766692","display_name":null,"funder_award_id":"62272158","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4402130297.pdf"},"referenced_works_count":32,"referenced_works":["https://openalex.org/W1981029888","https://openalex.org/W2076675165","https://openalex.org/W2082894754","https://openalex.org/W2115240023","https://openalex.org/W2119067110","https://openalex.org/W2138865266","https://openalex.org/W2140251882","https://openalex.org/W2159024459","https://openalex.org/W2245706161","https://openalex.org/W2275262393","https://openalex.org/W2440056311","https://openalex.org/W2497793992","https://openalex.org/W2738363847","https://openalex.org/W2786072337","https://openalex.org/W2797851444","https://openalex.org/W2890836728","https://openalex.org/W2911978475","https://openalex.org/W2919764095","https://openalex.org/W2922045985","https://openalex.org/W2924254303","https://openalex.org/W2939009167","https://openalex.org/W2952448326","https://openalex.org/W2975069432","https://openalex.org/W2994867511","https://openalex.org/W3046944446","https://openalex.org/W3082177935","https://openalex.org/W3096706494","https://openalex.org/W3212338335","https://openalex.org/W4308641900","https://openalex.org/W4311165744","https://openalex.org/W4385483392","https://openalex.org/W4386920512"],"related_works":["https://openalex.org/W3022534164","https://openalex.org/W2116878667","https://openalex.org/W4396832952","https://openalex.org/W3013058036","https://openalex.org/W3015944045","https://openalex.org/W4225340788","https://openalex.org/W1591172238","https://openalex.org/W2951971312","https://openalex.org/W2972172135","https://openalex.org/W4300474583"],"abstract_inverted_index":{"In":[0,70,161],"spatial":[1],"crowdsourcing":[2],"services,":[3],"the":[4,7,22,37,45,75,103,128,138,142,156,159,170,194,205],"trajectories":[5],"of":[6,32,36,54,106,158],"workers":[8],"are":[9],"sent":[10],"to":[11,15,48,64,73,108,122,136,146,151,168],"a":[12,28,81],"central":[13],"server":[14],"provide":[16,203],"more":[17],"personalized":[18],"services.":[19],"However,":[20,52],"for":[21,155],"honest-but-curious":[23],"servers,":[24],"it":[25],"also":[26],"poses":[27],"challenge":[29],"in":[30,59,67],"terms":[31],"potential":[33],"privacy":[34,41,76,84,93,115,120,148,177,206],"leakage":[35],"workers.":[38],"Local":[39],"differential":[40,92],"(LDP)":[42],"is":[43,98],"currently":[44],"latest":[46],"technique":[47],"protect":[49],"data":[50],"privacy.":[51],"most":[53],"LDP-based":[55],"schemes":[56],"have":[57],"limitations":[58],"providing":[60],"good":[61,204],"utility":[62,195],"due":[63],"extensive":[65,181],"noise":[66],"perturbing":[68,144],"trajectories.":[69,160],"this":[71],"work,":[72],"balance":[74],"and":[77,131,174],"utility,":[78],"we":[79,112,140,163],"propose":[80],"novel":[82],"pattern-aware":[83],"protection":[85],"method":[86,167],"called":[87],"trajectory-aware":[88],"privacy-preserving":[89],"with":[90],"local":[91],"(TALDP).":[94],"The":[95,187],"key":[96],"idea":[97],"that,":[99],"rather":[100],"than":[101],"applying":[102],"same":[104],"degree":[105,154],"perturbation":[107],"all":[109],"location":[110,124,172],"points,":[111,125],"employ":[113],"adaptive":[114],"budget":[116],"allocation,":[117],"assigning":[118],"varied":[119],"budgets":[121,149],"individual":[123],"thereby":[126],"mitigating":[127],"perturbation\u2019s":[129],"impact":[130],"enhancing":[132],"overall":[133],"utility.":[134],"Meanwhile,":[135],"ensure":[137],"privacy,":[139],"give":[141],"different":[143,147],"points":[145,173],"according":[150],"their":[152,176],"important":[153,171],"patterns":[157],"particular,":[162],"use":[164],"Karman":[165],"filter":[166],"select":[169],"decide":[175],"budgets.":[178],"We":[179],"conduct":[180],"experiments":[182],"on":[183],"three":[184],"real":[185],"datasets.":[186],"results":[188],"show":[189],"that":[190],"our":[191],"approach":[192],"improves":[193],"over":[196],"many":[197],"other":[198],"current":[199],"methods":[200],"while":[201],"still":[202],"protection.":[207]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1}],"updated_date":"2026-04-13T07:58:08.660418","created_date":"2025-10-10T00:00:00"}
