{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,31]],"date-time":"2024-10-31T03:20:05Z","timestamp":1730344805953,"version":"3.28.0"},"reference-count":32,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,5]]},"DOI":"10.23919\/wiopt.2018.8362850","type":"proceedings-article","created":{"date-parts":[[2018,5,24]],"date-time":"2018-05-24T22:47:53Z","timestamp":1527202073000},"page":"1-8","source":"Crossref","is-referenced-by-count":5,"title":["Privacy-preserving ride clustering for customized-bus sharing: A fog-assisted approach"],"prefix":"10.23919","author":[{"given":"Yuanyuan","family":"He","sequence":"first","affiliation":[]},{"given":"Jianbing","family":"Ni","sequence":"additional","affiliation":[]},{"given":"Ben","family":"Niu","sequence":"additional","affiliation":[]},{"given":"Fenghua","family":"Li","sequence":"additional","affiliation":[]},{"given":"Xuemin","family":"Shen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2015.7218391"},{"journal-title":"Import public nyc taxi and uber trip data into postgresql \/ postgis database","year":"0","key":"ref31"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2016.2609423"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2695487"},{"key":"ref11","first-page":"80","article-title":"Privacy-preserving and outsourced multi-user k-means clustering","author":"rao","year":"2016","journal-title":"Proc of Collaboration and Interenet Computing"},{"key":"ref12","first-page":"289","article-title":"Privacy-preserving data clustering in cloud computing based on fully homomorphic encryption","author":"alabdulatif","year":"2017","journal-title":"Proc of PACIS"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-09688-9_3"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2762345"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1700322"},{"journal-title":"Computer Science","article-title":"Fog computing: Focusing on mobile users at the edge","year":"2015","author":"luan","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/INNOVATIONS.2008.4781665"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"37","DOI":"10.5120\/ijca2016910381","article-title":"Privacy-preserving distributed data mining techniques: A survey","volume":"143","author":"baby","year":"2016","journal-title":"International Journal of Computer Applications"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/772862.772865"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2288131"},{"journal-title":"Privacy commissioner opens formal investigation into uber data breach","year":"2017","author":"news","key":"ref4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2012.05.028"},{"journal-title":"Uber releases a staggering 2 billion trips-worth of traffic data","year":"2017","key":"ref3"},{"journal-title":"Cheating frenchman sues uber for tipping off wife about affair","year":"0","author":"news","key":"ref6"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48910-X_16"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"1376","DOI":"10.1038\/srep01376","article-title":"Unique in the crowd: The privacy bounds of human mobility","volume":"3","author":"montjoye","year":"2013","journal-title":"Scientific Reports"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2007.03.015"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/335191.335438"},{"journal-title":"To appear in IEEE Transaction on Dependable and Secure Computing","article-title":"Providing task allocation and secure deduplication for mobile crowdsensing via fog computing","year":"0","author":"ni","key":"ref2"},{"key":"ref9","first-page":"37","article-title":"Privacy preserving clustering by data transformation","volume":"1","author":"oliveira","year":"2010","journal-title":"Journal of Information and Data Management"},{"journal-title":"Far from the madding crowd Cui rui's chinese bus-sharing app offers beijing commuters stress-free travel","year":"0","author":"post","key":"ref1"},{"key":"ref20","first-page":"486","article-title":"Secure two-party k-means clustering","author":"bunn","year":"2007","journal-title":"Proc of ACM CCS"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2886779"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2016.09.057"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1247480.1247546"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1126\/science.1242072"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.trc.2017.10.020"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2011.5767890"}],"event":{"name":"2018 16th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt)","start":{"date-parts":[[2018,5,7]]},"location":"Shanghai","end":{"date-parts":[[2018,5,11]]}},"container-title":["2018 16th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8360204\/8362805\/08362850.pdf?arnumber=8362850","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T04:13:28Z","timestamp":1643170408000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8362850\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5]]},"references-count":32,"URL":"http:\/\/dx.doi.org\/10.23919\/wiopt.2018.8362850","relation":{},"subject":[],"published":{"date-parts":[[2018,5]]}}}