{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T02:25:15Z","timestamp":1742955915155,"version":"3.40.3"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030050894"},{"type":"electronic","value":"9783030050900"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-05090-0_19","type":"book-chapter","created":{"date-parts":[[2018,12,28]],"date-time":"2018-12-28T13:24:32Z","timestamp":1546003472000},"page":"211-223","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A More Secure Spatial Decompositions Algorithm via Indefeasible Laplace Noise in Differential Privacy"],"prefix":"10.1007","author":[{"given":"Xiaocui","family":"Li","sequence":"first","affiliation":[]},{"given":"Yangtao","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Xinyu","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Ke","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Chunhua","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,29]]},"reference":[{"key":"19_CR1","doi-asserted-by":"crossref","unstructured":"Yin, H., Chen, H., Sun, X., et al.: SPTF: a scalable probabilistic tensor factorization model for semantic-aware behavior prediction. In: IEEE International Conference on Data Mining, pp. 585\u2013594. IEEE Press, New Orleans (2017)","DOI":"10.1109\/ICDM.2017.68"},{"key":"19_CR2","doi-asserted-by":"crossref","unstructured":"Chen, H., Yin, H., Wang, W., et al.: PME: projected metric embedding on heterogeneous networks for link prediction. In: 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, pp. 1177\u20131186. ACM Press, London (2018)","DOI":"10.1145\/3219819.3219986"},{"key":"19_CR3","doi-asserted-by":"crossref","unstructured":"Chen, T., Yin, H., Chen, H., et al.: TADA: trend alignment with dual-attention multi-task recurrent neural networks for sales prediction. In: IEEE International Conference on Data Mining. IEEE Press, Singapore (2018)","DOI":"10.1109\/ICDM.2018.00020"},{"issue":"11","key":"19_CR4","doi-asserted-by":"publisher","first-page":"2537","DOI":"10.1109\/TKDE.2017.2741484","volume":"29","author":"H Yin","year":"2017","unstructured":"Yin, H., Wang, W., Wang, H., et al.: Spatial-aware hierarchical collaborative deep learning for POI recommendation. IEEE Trans. Knowl. Data Eng. 29(11), 2537\u20132551 (2017)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"19_CR5","doi-asserted-by":"crossref","unstructured":"Yin, H., Sun, Y., Cui, B., et al.: LCARS: a location-content-aware recommender system. In: 19th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, pp. 221\u2013229. IEEE Press, Chicago (2013)","DOI":"10.1145\/2487575.2487608"},{"key":"19_CR6","doi-asserted-by":"crossref","unstructured":"Friedman, A., Schuster, A.: Data mining with differential privacy. In: 16th International Conference on Knowledge Discovery and Data Mining, pp. 493\u2013502. ACM Press, Washington (2010)","DOI":"10.1145\/1835804.1835868"},{"issue":"4","key":"19_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1749603.1749605","volume":"42","author":"BCM Fung","year":"2010","unstructured":"Fung, B.C.M.: Privacy-preserving data publishing. ACM Comput. Surv. 42(4), 1\u201353 (2010)","journal-title":"ACM Comput. Surv."},{"key":"19_CR8","unstructured":"Hardt, M., Ligett, K., Mcsherry, F.: A simple and practical algorithm for differentially private data release. In: Advances in Neural Information Processing Systems, pp. 2339\u20132347 (2010)"},{"key":"19_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11787006_1","volume-title":"Automata, Languages and Programming","author":"C Dwork","year":"2006","unstructured":"Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1\u201312. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11787006_1"},{"key":"19_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-79228-4_1","volume-title":"Theory and Applications of Models of Computation","author":"C Dwork","year":"2008","unstructured":"Dwork, C.: Differential privacy: a survey of results. In: Agrawal, M., Du, D., Duan, Z., Li, A. (eds.) TAMC 2008. LNCS, vol. 4978, pp. 1\u201319. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-79228-4_1"},{"issue":"1","key":"19_CR11","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1145\/1866739.1866758","volume":"54","author":"C Dwork","year":"2011","unstructured":"Dwork, C.: A firm foundation for private data analysis. Commun. ACM 54(1), 86\u201395 (2011)","journal-title":"Commun. ACM"},{"issue":"3\u20134","key":"19_CR12","first-page":"211","volume":"9","author":"C Dwork","year":"2014","unstructured":"Dwork, C., Roth, A.: The algorithmic foundations of differential privacy. Found. Trends Theor. Comput. Sci. 9(3\u20134), 211\u2013407 (2014)","journal-title":"Found. Trends Theor. Comput. Sci."},{"key":"19_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/11681878_14","volume-title":"Theory of Cryptography","author":"C Dwork","year":"2006","unstructured":"Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 265\u2013284. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11681878_14"},{"key":"19_CR14","unstructured":"Xu, J., Zhang, Z., Xiao, X., et al.: Differentially private histogram publication. In: 29th IEEE International Conference on Data Engineering, pp. 32\u201343. IEEE Press, Brisbane (2013)"},{"key":"19_CR15","doi-asserted-by":"crossref","unstructured":"Xiao, X., Wang, G., Gehrke, J.: Differential privacy via wavelet transforms. In: 26th IEEE International Conference on Data Engineering, pp. 225\u2013236. IEEE Press (2010)","DOI":"10.1109\/ICDE.2010.5447831"},{"key":"19_CR16","doi-asserted-by":"crossref","unstructured":"Mohammed, N., Chen, R., Fung, B.C.M., et al.: Differentially private data release for data mining. In: ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 493\u2013501. ACM press (2011)","DOI":"10.1145\/2020408.2020487"},{"key":"19_CR17","doi-asserted-by":"crossref","unstructured":"Cormode, G., Procopiuc, C., Srivastava, D., et al.: Differentially private spatial decompositions. In: 28th IEEE International Conference on Data Engineering, pp. 20\u201331. IEEE Press, Washington (2012)","DOI":"10.1109\/ICDE.2012.16"},{"key":"19_CR18","unstructured":"Li, N., Yang, W., Qardaji, W.: Differentially private grids for geospatial data. In: 28th IEEE International Conference on Data Engineering, pp. 757\u2013768. IEEE Press, Washington (2012)"},{"key":"19_CR19","doi-asserted-by":"crossref","unstructured":"Zhang, J., Xiao, X., Xie, X.: PrivTree: a differentially private algorithm for hierarchical decompositions. In: 35th ACM Conference on Management of Data, pp. 155\u2013170. ACM Press, San Franciso (2016)","DOI":"10.1145\/2882903.2882928"},{"key":"19_CR20","doi-asserted-by":"crossref","unstructured":"Zhang, J., Cormode, G., et al.: PrivBayes: private data release via Bayesian networks. In: 33th ACM Conference on Management of Data, pp. 1423\u20131434. ACM Press, Utah (2014)","DOI":"10.1145\/2588555.2588573"},{"key":"19_CR21","doi-asserted-by":"crossref","unstructured":"Zhang, J., Cormode, G., et al.: Private release of graph statistics using ladder functions. In: 34th ACM Conference on Management of Data, pp. 731\u2013745. ACM Press, Melbourne (2015)","DOI":"10.1145\/2723372.2737785"},{"key":"19_CR22","unstructured":"Miller, F.P., Vandome, A.F., Mcbrewster, J.: KD-tree (2009)"},{"key":"19_CR23","doi-asserted-by":"crossref","unstructured":"Guttman, A.: R-trees: a dynamic index structure for spatial searching. In: International Conference on Management of Data 1984, pp. 47\u201357. ACM Press, Massachusetts (1984)","DOI":"10.1145\/971697.602266"},{"key":"19_CR24","doi-asserted-by":"crossref","unstructured":"Bodlaender, H.L.: A linear-time algorithm for finding tree-decompositions of small treewidth. In: The 25th ACM Symposium on Theory of Computing, pp. 226\u2013234 (1993)","DOI":"10.1145\/167088.167161"},{"issue":"1","key":"19_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1644015.1644017","volume":"6","author":"ED Demaine","year":"2007","unstructured":"Demaine, E.D., Mozes, S., Rossman, B., et al.: An optimal decomposition algorithm for tree edit distance. ACM Trans. Algorithms 6(1), 1\u201319 (2007)","journal-title":"ACM Trans. Algorithms"},{"key":"19_CR26","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1007\/978-3-319-49586-6_18","volume-title":"Advanced Data Mining and Applications","author":"B Li","year":"2016","unstructured":"Li, B., et al.: Dynamic reverse furthest neighbor querying algorithm of moving objects. In: Li, J., Li, X., Wang, S., Li, J., Sheng, Q.Z. (eds.) ADMA 2016. LNCS (LNAI), vol. 10086, pp. 266\u2013279. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-49586-6_18"},{"issue":"8","key":"19_CR27","doi-asserted-by":"publisher","first-page":"1200","DOI":"10.1109\/TKDE.2010.247","volume":"23","author":"X Xiao","year":"2011","unstructured":"Xiao, X., Wang, G., Gehrke, J.: Differential privacy via wavelet transforms. IEEE Trans. Knowl. Data Eng. 23(8), 1200\u20131214 (2011)","journal-title":"IEEE Trans. Knowl. Data Eng."}],"container-title":["Lecture Notes in Computer Science","Advanced Data Mining and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-05090-0_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T14:43:51Z","timestamp":1709822631000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-05090-0_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030050894","9783030050900"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-05090-0_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"29 December 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ADMA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Data Mining and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nanjing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 November 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 November 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"adma2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/adma2018.nuaa.edu.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}