{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T07:12:23Z","timestamp":1726038743788},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030269685"},{"type":"electronic","value":"9783030269692"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-26969-2_73","type":"book-chapter","created":{"date-parts":[[2019,7,30]],"date-time":"2019-07-30T23:09:48Z","timestamp":1564528188000},"page":"770-781","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["IDP - OPTICS: Improvement of Differential Privacy Algorithm in Data Histogram Publishing Based on Density Clustering"],"prefix":"10.1007","author":[{"given":"Lina","family":"Ge","sequence":"first","affiliation":[]},{"given":"Yugu","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Hong","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Zhonghua","family":"He","sequence":"additional","affiliation":[]},{"given":"Huazhi","family":"Meng","sequence":"additional","affiliation":[]},{"given":"Xiong","family":"Tang","sequence":"additional","affiliation":[]},{"given":"Liyan","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,24]]},"reference":[{"key":"73_CR1","first-page":"1","volume-title":"Automata, Languages and Programming","author":"Cynthia Dwork","year":"2006","unstructured":"Dwork, C.: Differential privacy. In: Proceedings of the 33rd International colloquium on Automata, Languages and Programming, pp. 1\u201312 (2006)"},{"key":"73_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/11681878_14","volume-title":"Theory of Cryptography","author":"C Dwork","year":"2006","unstructured":"Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 265\u2013284. Springer, Heidelberg (2006). \n                    https:\/\/doi.org\/10.1007\/11681878_14"},{"key":"73_CR3","doi-asserted-by":"crossref","unstructured":"Mcsherry, F., Talwar, K.: Mechanism design via differential privacy. In: IEEE Symposium on Foundations of Computer Science, Providence, RI, USA, pp. 94\u2013103 (2007)","DOI":"10.1109\/FOCS.2007.4389483"},{"issue":"1\u20132","key":"73_CR4","doi-asserted-by":"publisher","first-page":"1021","DOI":"10.14778\/1920841.1920970","volume":"3","author":"M Hay","year":"2010","unstructured":"Hay, M., Rastogi, V., Miklau, G., et al.: Boosting the accuracy of differentially private histograms through consistency. Proc. VLDB Endow. 3(1\u20132), 1021\u20131032 (2010)","journal-title":"Proc. VLDB Endow."},{"key":"73_CR5","doi-asserted-by":"crossref","unstructured":"Peng, S., Yang, Y., Zhang, Z., et al.: DP-tree: indexing multi-dimensional data under differential privacy (abstract only), pp. 864\u2013864. ACM (2012)","DOI":"10.1145\/2213836.2213972"},{"key":"73_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1007\/978-3-642-15546-8_11","volume-title":"Secure Data Management","author":"Y Xiao","year":"2010","unstructured":"Xiao, Y., Xiong, L., Yuan, C.: Differentially private data release through multidimensional partitioning. In: Jonker, W., Petkovi\u0107, M. (eds.) SDM 2010. LNCS, vol. 6358, pp. 150\u2013168. Springer, Heidelberg (2010). \n                    https:\/\/doi.org\/10.1007\/978-3-642-15546-8_11"},{"issue":"8","key":"73_CR7","doi-asserted-by":"publisher","first-page":"1200","DOI":"10.1109\/TKDE.2010.247","volume":"23","author":"X Xiao","year":"2010","unstructured":"Xiao, X., Wang, G., Gehrke, J.: Differential privacy via wavelet transforms. IEEE Trans. Knowl. Data Eng. 23(8), 1200\u20131214 (2010)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"73_CR8","unstructured":"Xiong, P., Zhu, T.Q., Jin, D.W., et al.: A differential privacy protection algorithm for decision tree construction. 31(10), 3108\u20133112 (2014)"},{"key":"73_CR9","first-page":"258","volume-title":"Privacy Protection Data Release: Models and Algorithms","author":"YJ Wu","year":"2015","unstructured":"Wu, Y.J.: Privacy Protection Data Release: Models and Algorithms, pp. 258\u2013262. Tsinghua University Press, China (2015)"},{"issue":"6","key":"73_CR10","first-page":"1609","volume":"34","author":"H Wang","year":"2017","unstructured":"Wang, H., Ge, L.N., Wang, L.Y., et al.: Survey of differential privacy for data histogram publication. Appl. Res. Comput. 34(6), 1609\u20131612 (2017)","journal-title":"Appl. Res. Comput."},{"key":"73_CR11","doi-asserted-by":"crossref","unstructured":"Blum, A., Dwork, C., Mcsherry, F., et al.: Practical privacy: the SuLQ framework. In: Twenty-Fourth ACM Sigact-Sigmod-Sigart Symposium on Principles of Database Systems, DBLP, Baltimore, Maryland, USA, vol. 6, no. 13\u201315, pp. 128\u2013138 (2005)","DOI":"10.1145\/1065167.1065184"},{"issue":"1","key":"73_CR12","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1145\/1866739.1866758","volume":"54","author":"C Dwork","year":"2011","unstructured":"Dwork, C.: A firm foundation for private data analysis. Commun. ACM 54(1), 86\u201395 (2011)","journal-title":"Commun. ACM"},{"issue":"4","key":"73_CR13","first-page":"830","volume":"37","author":"WM Wu","year":"2015","unstructured":"Wu, W.M., Huang, H.K.: Research on DP-DBScan clustering algorithm based on differential privacy protection. Comput. Eng. Sci. 37(4), 830\u2013834 (2015)","journal-title":"Comput. Eng. Sci."},{"key":"73_CR14","unstructured":"Andr\u00e9, L.C.M., Brito, F.T., Linhares, L.S., et al.: DiPCoDing: a differentially private approach for correlated data with clustering. In: International Database Engineering & Applications Symposium. ACM (2017)"},{"key":"73_CR15","doi-asserted-by":"publisher","first-page":"21053","DOI":"10.1109\/ACCESS.2018.2824798","volume":"6","author":"L Ni","year":"2018","unstructured":"Ni, L., Li, C.: DP-MCDBSCAN: differential privacy preserving multi-core DBSCAN clustering for network user data. IEEE Access 6, 21053\u201321063 (2018)","journal-title":"IEEE Access"},{"key":"73_CR16","doi-asserted-by":"crossref","unstructured":"Nissim, K., Raskhodnikova, S., Smith, A.: Smooth sensitivity and sampling in private data analysis. In: Proceedings of the Thirty-Ninth Annual ACM Symposium on Theory of Computing, pp. 75\u201384. ACM (2007)","DOI":"10.1145\/1250790.1250803"},{"key":"73_CR17","unstructured":"Jagadish, H.V., Poosala, V., Koudas, N., et al.: Optimal histograms with quality guarantees. In: Gupta, A., Shmueli, O., Widom, J. (eds.) VLDB 1998, Proceedings of the 24th Internationa1 Conference on Very Large Data Bases, pp. 275\u2013286. Morgan Kaufmann, New York (1998)"},{"issue":"2","key":"73_CR18","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1145\/235968.233342","volume":"25","author":"V Poosala","year":"1999","unstructured":"Poosala, V., Haas, P.J., Ioannidis, Y.E., et al.: Improved histograms for selectivity estimation of range predicates. ACM Sigmod Rec. 25(2), 294\u2013305 (1999)","journal-title":"ACM Sigmod Rec."}],"container-title":["Lecture Notes in Computer Science","Intelligent Computing Theories and Application"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-26969-2_73","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,30]],"date-time":"2019-07-30T23:22:43Z","timestamp":1564528963000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-26969-2_73"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030269685","9783030269692"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-26969-2_73","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"24 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICIC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nanchang","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 August 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 August 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icic2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/ic-ic.tongji.edu.cn\/2019\/index.htm","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}