{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T05:54:37Z","timestamp":1761630877736,"version":"3.40.3"},"publisher-location":"Cham","reference-count":45,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030299583"},{"type":"electronic","value":"9783030299590"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-29959-0_7","type":"book-chapter","created":{"date-parts":[[2019,9,14]],"date-time":"2019-09-14T23:04:10Z","timestamp":1568502250000},"page":"128-148","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["Local Obfuscation Mechanisms for Hiding Probability Distributions"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2151-9560","authenticated-orcid":false,"given":"Yusuke","family":"Kawamoto","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5110-1261","authenticated-orcid":false,"given":"Takao","family":"Murakami","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,9,15]]},"reference":[{"key":"7_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11787006_1","volume-title":"Automata, Languages and Programming","author":"C Dwork","year":"2006","unstructured":"Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1\u201312. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11787006_1"},{"key":"7_CR2","doi-asserted-by":"crossref","unstructured":"Duchi, J.C., Jordan, M.I., Wainwright, M.J.: Local privacy and statistical minimax rates. In: Proceedings of FOCS, pp. 429\u2013438 (2013)","DOI":"10.1109\/FOCS.2013.53"},{"key":"7_CR3","doi-asserted-by":"crossref","unstructured":"Andr\u00e9s, M.E., Bordenabe, N.E., Chatzikokolakis, K., Palamidessi, C.: Geo-indistinguishability: differential privacy for location-based systems. In: Proceedings of CCS, pp. 901\u2013914. ACM (2013)","DOI":"10.1145\/2508859.2516735"},{"key":"7_CR4","doi-asserted-by":"crossref","unstructured":"Erlingsson, \u00da., Pihur, V., Korolova, A.: RAPPOR: randomized aggregatable privacy-preserving ordinal response. In: Proceedings of CCS, pp. 1054\u20131067 (2014)","DOI":"10.1145\/2660267.2660348"},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"Bordenabe, N.E., Chatzikokolakis, K., Palamidessi, C.: Optimal geo-indistinguishable mechanisms for location privacy. In: Proceedings of CCS, pp. 251\u2013262 (2014)","DOI":"10.1145\/2660267.2660345"},{"issue":"26","key":"7_CR6","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1177\/0278364907073775","volume":"1","author":"L Liao","year":"2007","unstructured":"Liao, L., Fox, D., Kautz, H.: Extracting places and activities from GPS traces using hierarchical conditional random fields. Int. J. Robot. Res. 1(26), 119\u2013134 (2007)","journal-title":"Int. J. Robot. Res."},{"key":"7_CR7","doi-asserted-by":"crossref","unstructured":"Zheng, V.W., Zheng, Y., Yang, Q.: Joint learning user\u2019s activities and profiles from GPS data. In: Proceedings of LBSN, pp. 17\u201320 (2009)","DOI":"10.1145\/1629890.1629894"},{"key":"7_CR8","unstructured":"Matsuo, Y., Okazaki, N., Izumi, K., Nakamura, Y., Nishimura, T., Hasida, K.: Inferring long-term user properties based on users\u2019 location history. In: Proceedings of IJCAI, pp. 2159\u20132165 (2007)"},{"issue":"3","key":"7_CR9","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1109\/TKDE.2018.2840974","volume":"31","author":"D Yang","year":"2019","unstructured":"Yang, D., Qu, B., Cudr\u00e9-Mauroux, P.: Privacy-preserving social media data publishing for personalized ranking-based recommendation. IEEE Trans. Knowl. Data Eng. 31(3), 507\u2013520 (2019)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"Otterbacher, J.: Inferring gender of movie reviewers: exploiting writing style, content and metadata. In: Proceedings of CIKM, pp. 369\u2013378 (2010)","DOI":"10.1145\/1871437.1871487"},{"key":"7_CR11","doi-asserted-by":"crossref","unstructured":"Weinsberg, U., Bhagat, S., Ioannidis, S., Taft, N.: BlurMe: inferring and obfuscating user gender based on ratings. In: Proceedings of RecSys, pp. 195\u2013202 (2012)","DOI":"10.1145\/2365952.2365989"},{"issue":"1","key":"7_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3154793","volume":"21","author":"Neil Zhenqiang Gong","year":"2018","unstructured":"Gong, N.Z., Liu, B.: Attribute inference attacks in online social networks. ACM Trans. Priv. Secur. 21(1), 3:1\u20133:30 (2018)","journal-title":"ACM Transactions on Privacy and Security"},{"key":"7_CR13","doi-asserted-by":"crossref","unstructured":"Mislove, A., Viswanath, B., Gummadi, P.K., Druschel, P.: You are who you know: inferring user profiles in online social networks. In: Proceedings of WSDM, pp. 251\u2013260 (2010)","DOI":"10.1145\/1718487.1718519"},{"key":"7_CR14","unstructured":"Kairouz, P., Bonawitz, K., Ramage, D.: Discrete distribution estimation under local privacy. In: Proceedings of ICML, pp. 2436\u20132444 (2016)"},{"key":"7_CR15","unstructured":"Kawamoto, Y., Murakami, T.: Local obfuscation mechanisms for hiding probability distributions, CoRR, vol. abs\/1812.00939 (2018). arXiv:1812.00939"},{"key":"7_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1007\/978-3-642-39077-7_5","volume-title":"Privacy Enhancing Technologies","author":"K Chatzikokolakis","year":"2013","unstructured":"Chatzikokolakis, K., Andr\u00e9s, M.E., Bordenabe, N.E., Palamidessi, C.: Broadening the scope of differential privacy using metrics. In: De Cristofaro, E., Wright, M. (eds.) PETS 2013. LNCS, vol. 7981, pp. 82\u2013102. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-39077-7_5"},{"issue":"3","key":"7_CR17","first-page":"64","volume":"5","author":"L Vaserstein","year":"1969","unstructured":"Vaserstein, L.: Markovian processes on countable space product describing large systems of automata. Probl. Peredachi Inf. 5(3), 64\u201372 (1969)","journal-title":"Probl. Peredachi Inf."},{"key":"7_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/11681878_14","volume-title":"Theory of Cryptography","author":"C Dwork","year":"2006","unstructured":"Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 265\u2013284. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11681878_14"},{"key":"7_CR19","doi-asserted-by":"crossref","unstructured":"Kifer, D., Machanavajjhala, A.: No free lunch in data privacy. In: Proceedings of SIGMOD, pp. 193\u2013204 (2011)","DOI":"10.1145\/1989323.1989345"},{"key":"7_CR20","doi-asserted-by":"crossref","unstructured":"Kifer, D., Machanavajjhala, A.: A rigorous and customizable framework for privacy. In: Proceedings of PODS, pp. 77\u201388 (2012)","DOI":"10.1145\/2213556.2213571"},{"key":"7_CR21","doi-asserted-by":"crossref","unstructured":"Song, S., Wang, Y., Chaudhuri, K.: Pufferfish privacy mechanisms for correlated data. In: Proceedings of SIGMOD, pp. 1291\u20131306 (2017)","DOI":"10.1145\/3035918.3064025"},{"issue":"6","key":"7_CR22","doi-asserted-by":"publisher","first-page":"797","DOI":"10.1007\/s00778-013-0309-y","volume":"22","author":"J Xu","year":"2013","unstructured":"Xu, J., Zhang, Z., Xiao, X., Yang, Y., Yu, G., Winslett, M.: Differentially private histogram publication. VLDB J. 22(6), 797\u2013822 (2013)","journal-title":"VLDB J."},{"key":"7_CR23","unstructured":"Kawamoto, Y., Chatzikokolakis, K., Palamidessi, C.: On the compositionality of quantitative information flow. Log. Methods Comput. Sci. 13(3) (2017)"},{"key":"7_CR24","doi-asserted-by":"crossref","unstructured":"Alvim, M.S., Chatzikokolakis, K., Palamidessi, C., Pazii, A.: Invited paper: local differential privacy on metric spaces: optimizing the trade-off with utility. In: Proceedings of CSF, pp. 262\u2013267 (2018)","DOI":"10.1109\/CSF.2018.00026"},{"issue":"3","key":"7_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2814575","volume":"7","author":"Dingqi Yang","year":"2016","unstructured":"Yang, D., Zhang, D., Qu, B.: Participatory cultural mapping based on collective behavior data in location based social networks. ACM Trans. Intell. Syst. Technol. 7(3), 30:1\u201330:23 (2015)","journal-title":"ACM Transactions on Intelligent Systems and Technology"},{"key":"7_CR26","volume-title":"Pattern Classification","author":"RO Duda","year":"2000","unstructured":"Duda, R.O., Hart, P.E., Stork, D.G.: Pattern Classification. Wiley, Hoboken (2000)"},{"key":"7_CR27","doi-asserted-by":"crossref","unstructured":"Hsu, J., et al.: Differential privacy: an economic method for choosing epsilon. In: Proceedings of CSF, pp. 398\u2013410 (2014)","DOI":"10.1109\/CSF.2014.35"},{"key":"7_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1007\/978-3-642-39212-2_8","volume-title":"Automata, Languages, and Programming","author":"G Barthe","year":"2013","unstructured":"Barthe, G., Olmedo, F.: Beyond differential privacy: composition theorems and relational logic for f-divergences between probabilistic programs. In: Fomin, F.V., Freivalds, R., Kwiatkowska, M., Peleg, D. (eds.) ICALP 2013. LNCS, vol. 7966, pp. 49\u201360. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-39212-2_8"},{"key":"7_CR29","unstructured":"Murakami, T., Kawamoto, Y.: Utility-optimized local differential privacy mechanisms for distribution estimation. In: Proceedings of USENIX Security (2019, to appear)"},{"issue":"2","key":"7_CR30","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2450142.2450148","volume":"60","author":"Avrim Blum","year":"2013","unstructured":"Blum, A., Ligett, K., Roth, A.: A learning theory approach to noninteractive database privacy. J. ACM 60(2), 12:1\u201312:25 (2013)","journal-title":"Journal of the ACM"},{"key":"7_CR31","doi-asserted-by":"crossref","unstructured":"Jelasity, M., Birman, K.P.: Distributional differential privacy for large-scale smart metering. In: Proceedings of IH&MMSec, pp. 141\u2013146 (2014)","DOI":"10.1145\/2600918.2600919"},{"key":"7_CR32","doi-asserted-by":"crossref","unstructured":"Geumlek, J., Chaudhuri, K.: Profile-based privacy for locally private computations, CoRR, vol. abs\/1903.09084 (2019)","DOI":"10.1109\/ISIT.2019.8849549"},{"key":"7_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/978-3-030-17138-4_6","volume-title":"Principles of Security and Trust","author":"N Fernandes","year":"2019","unstructured":"Fernandes, N., Dras, M., McIver, A.: Generalised differential privacy for text document processing. In: Nielson, F., Sands, D. (eds.) POST 2019. LNCS, vol. 11426, pp. 123\u2013148. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-17138-4_6"},{"issue":"4","key":"7_CR34","doi-asserted-by":"publisher","first-page":"926","DOI":"10.1109\/TIFS.2016.2632069","volume":"12","author":"Y Sei","year":"2017","unstructured":"Sei, Y., Ohsuga, A.: Differential private data collection and analysis based on randomized multiple dummies for untrusted mobile crowdsensing. IEEE Trans. Inf. Forensics Secur. 12(4), 926\u2013939 (2017)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"4","key":"7_CR35","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1561\/3300000017","volume":"1","author":"Kostantinos Chatzikokolakis","year":"2017","unstructured":"Chatzikokolakis, K., ElSalamouny, E., Palamidessi, C., Anna, P.: Methods for location privacy: a comparative overview. Found. Trends$$\\textregistered $$ Priv. Secur. 1(4), 199\u2013257 (2017)","journal-title":"Foundations and Trends\u00ae in Privacy and Security"},{"key":"7_CR36","doi-asserted-by":"crossref","unstructured":"Shokri, R., Theodorakopoulos, G., Troncoso, C., Hubaux, J.-P., Boudec, J.-Y.L.: Protecting location privacy: optimal strategy against localization attacks. In: Proceedings of CCS, pp. 617\u2013627. ACM (2012)","DOI":"10.1145\/2382196.2382261"},{"key":"7_CR37","doi-asserted-by":"crossref","unstructured":"Shokri, R., Theodorakopoulos, G., Boudec, J.-Y.L., Hubaux, J.-P.: Quantifying location privacy. In: Proceedings of S&P, pp. 247\u2013262. IEEE (2011)","DOI":"10.1109\/SP.2011.18"},{"key":"7_CR38","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1007\/978-3-642-01721-6_5","volume-title":"Location and Context Awareness","author":"M Xue","year":"2009","unstructured":"Xue, M., Kalnis, P., Pung, H.K.: Location diversity: enhanced privacy protection in location based services. In: Choudhury, T., Quigley, A., Strang, T., Suginuma, K. (eds.) LoCA 2009. LNCS, vol. 5561, pp. 70\u201387. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-01721-6_5"},{"key":"7_CR39","doi-asserted-by":"crossref","unstructured":"Hoh, B., Gruteser, M., Xiong, H., Alrabady, A.: Preserving privacy in GPS traces via uncertainty-aware path cloaking. In: Proceedings of CCS, pp. 161\u2013171. ACM (2007)","DOI":"10.1145\/1315245.1315266"},{"key":"7_CR40","doi-asserted-by":"crossref","unstructured":"Bindschaedler, V., Shokri, R.: Synthesizing plausible privacy-preserving location traces. In: Proceedings of S&P, pp. 546\u2013563 (2016)","DOI":"10.1109\/SP.2016.39"},{"key":"7_CR41","doi-asserted-by":"crossref","unstructured":"Chow, R., Golle, P.: Faking contextual data for fun, profit, and privacy. In: Proceedings of PES, pp. 105\u2013108. ACM (2009)","DOI":"10.1145\/1655188.1655204"},{"key":"7_CR42","doi-asserted-by":"crossref","unstructured":"Kido, H., Yanagisawa, Y., Satoh, T.: Protection of location privacy using dummies for location-based services. In: Proceedings of ICDE Workshops, p. 1248 (2005)","DOI":"10.1109\/ICDE.2005.269"},{"key":"7_CR43","doi-asserted-by":"crossref","unstructured":"Machanavajjhala, A., Kifer, D., Abowd, J.M., Gehrke, J., Vilhuber, L.: Privacy: theory meets practice on the map. In: Proceedings of ICDE, pp. 277\u2013286. IEEE (2008)","DOI":"10.1109\/ICDE.2008.4497436"},{"key":"7_CR44","doi-asserted-by":"crossref","unstructured":"Ho, S.-S., Ruan, S.: Differential privacy for location pattern mining. In: Proceedings of SPRINGL, pp. 17\u201324. ACM (2011)","DOI":"10.1145\/2071880.2071884"},{"key":"7_CR45","unstructured":"Cheng, Z., Caverlee, J., Lee, K., Sui, D.Z.: Exploring millions of footprints in location sharing services. In: Proceedings of ICWSM (2011)"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2019"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-29959-0_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,15]],"date-time":"2024-09-15T00:04:00Z","timestamp":1726358640000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-29959-0_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030299583","9783030299590"],"references-count":45,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-29959-0_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"15 September 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ESORICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Symposium on Research in Computer Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Luxembourg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Luxembourg","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 September 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 September 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"esorics2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/conf.laas.fr\/esorics\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"344","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"67","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"19% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3,2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"11","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}