{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T13:45:23Z","timestamp":1743083123154,"version":"3.40.3"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030720728"},{"type":"electronic","value":"9783030720735"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-72073-5_1","type":"book-chapter","created":{"date-parts":[[2021,3,17]],"date-time":"2021-03-17T18:02:58Z","timestamp":1616004178000},"page":"1-12","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A New Noise Generating Method Based on Gaussian Sampling for Privacy Preservation"],"prefix":"10.1007","author":[{"given":"Bo","family":"Ma","sequence":"first","affiliation":[]},{"given":"Wei Qi","family":"Yan","sequence":"additional","affiliation":[]},{"given":"Edmund","family":"Lai","sequence":"additional","affiliation":[]},{"given":"Jingsong","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,3,18]]},"reference":[{"key":"1_CR1","doi-asserted-by":"crossref","unstructured":"Abadi, M., Chu, A., Goodfellow, I., McMahan, H.B., Mironov, I., Talwar, K., Zhang, L.: Deep learning with differential privacy. In: Proceedings of ACM SIGSAC Conference on Computer and Communications Security, pp. 308\u2013318 (2016)","DOI":"10.1145\/2976749.2978318"},{"key":"1_CR2","unstructured":"Agarwal, N., Suresh, A.T., Yu, F.X.X., Kumar, S., McMahan, B.: CPSGD: communication-efficient and differentially-private distributed SGD. In: Advances in Neural Information Processing Systems, pp. 7564\u20137575 (2018)"},{"key":"1_CR3","series-title":"Advances in Database Systems","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1007\/978-0-387-70992-5_2","volume-title":"Privacy-Preserving Data Mining","author":"CC Aggarwal","year":"2008","unstructured":"Aggarwal, C.C., Yu, P.S.: A general survey of privacy-preserving data mining models and algorithms. In: Aggarwal, C.C., Yu, P.S. (eds.) Privacy-Preserving Data Mining. Advances in Database Systems, vol. 34, pp. 11\u201352. Springer, Boston (2008). https:\/\/doi.org\/10.1007\/978-0-387-70992-5_2"},{"key":"1_CR4","unstructured":"Chaudhuri, K., Monteleoni, C.: Privacy-preserving logistic regression. In: Advances in Neural Information Processing Systems, pp. 289\u2013296 (2009)"},{"key":"1_CR5","volume-title":"Least Squares Support Vector Machines","author":"J De Brabanter","year":"2002","unstructured":"De Brabanter, J., De Moor, B., Suykens, J.A., Van Gestel, T., Vandewalle, J.P.: Least Squares Support Vector Machines. World Scientific, Singapore (2002)"},{"key":"1_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/11681878_14","volume-title":"Theory of Cryptography","author":"C Dwork","year":"2006","unstructured":"Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 265\u2013284. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11681878_14"},{"key":"1_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-79228-4_1","volume-title":"Theory and Applications of Models of Computation","author":"C Dwork","year":"2008","unstructured":"Dwork, C.: Differential privacy: a survey of results. In: Agrawal, M., Du, D., Duan, Z., Li, A. (eds.) TAMC 2008. LNCS, vol. 4978, pp. 1\u201319. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-79228-4_1"},{"issue":"14","key":"1_CR8","doi-asserted-by":"publisher","first-page":"1623","DOI":"10.1002\/(SICI)1097-0258(19980730)17:14<1623::AID-SIM871>3.0.CO;2-S","volume":"17","author":"FY Hsieh","year":"1998","unstructured":"Hsieh, F.Y., Bloch, D.A., Larsen, M.D.: A simple method of sample size calculation for linear and logistic regression. Stat. Med. 17(14), 1623\u20131634 (1998)","journal-title":"Stat. Med."},{"key":"1_CR9","unstructured":"Krizhevsky, A., Nair, V., Hinton, G.: The CIFAR-10 Dataset, vol. 55 (2014). http:\/\/www.cs.toronto.edu\/kriz\/cifar.html"},{"key":"1_CR10","doi-asserted-by":"crossref","unstructured":"Lee, S., Rao, R., Narasimha, R.: Characterization of self-similarity properties of discrete-time linear scale-invariant systems. In: IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No. 01CH37221), vol. 6, pp. 3969\u20133972. IEEE (2001)","DOI":"10.1109\/ICASSP.2001.940713"},{"key":"1_CR11","doi-asserted-by":"crossref","unstructured":"Liu, Z., Luo, P., Wang, X., Tang, X.: Deep learning face attributes in the wild. In: Proceedings of International Conference on Computer Vision (ICCV) (2015)","DOI":"10.1109\/ICCV.2015.425"},{"issue":"7","key":"1_CR12","doi-asserted-by":"publisher","first-page":"2154","DOI":"10.1109\/TCYB.2017.2728644","volume":"48","author":"Y Lou","year":"2017","unstructured":"Lou, Y., Yu, L., Wang, S., Yi, P.: Privacy preservation in distributed subgradient optimization algorithms. IEEE Trans. Cybern. 48(7), 2154\u20132165 (2017)","journal-title":"IEEE Trans. Cybern."},{"key":"1_CR13","doi-asserted-by":"crossref","unstructured":"Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: $$l$$-diversity: privacy beyond $$k$$-anonymity. ACM Trans. Knowl. Discov. Data (TKDD) 1(1), 3-es (2007)","DOI":"10.1145\/1217299.1217302"},{"key":"1_CR14","unstructured":"Margineantu, D.D., Dietterich, T.G.: Pruning adaptive boosting. In: International Conference on Machine Learning, vol. 97, pp. 211\u2013218. ICML (1997)"},{"issue":"7","key":"1_CR15","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1109\/LSP.2003.811589","volume":"10","author":"MA Richards","year":"2003","unstructured":"Richards, M.A.: Coherent integration loss due to white Gaussian phase noise. IEEE Sig. Process. Lett. 10(7), 208\u2013210 (2003)","journal-title":"IEEE Sig. Process. Lett."},{"key":"1_CR16","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-2053-8","volume-title":"A Survey of Data Leakage Detection and Prevention Solutions","author":"A Shabtai","year":"2012","unstructured":"Shabtai, A., Elovici, Y., Rokach, L.: A Survey of Data Leakage Detection and Prevention Solutions. Springer, Boston (2012). https:\/\/doi.org\/10.1007\/978-1-4614-2053-8"},{"key":"1_CR17","doi-asserted-by":"crossref","unstructured":"Shokri, R., Shmatikov, V.: Privacy-preserving deep learning. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 1310\u20131321 (2015)","DOI":"10.1145\/2810103.2813687"},{"issue":"05","key":"1_CR18","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L.: $$k$$-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl.-Based Syst. 10(05), 557\u2013570 (2002)","journal-title":"Int. J. Uncertain. Fuzziness Knowl.-Based Syst."},{"key":"1_CR19","unstructured":"Vapnik, V.: Principles of risk minimization for learning theory. In: Advances in Neural Information Processing Systems, pp. 831\u2013838 (1992)"},{"issue":"5","key":"1_CR20","doi-asserted-by":"publisher","first-page":"423","DOI":"10.1007\/BF02590998","volume":"2","author":"P Whittle","year":"1953","unstructured":"Whittle, P.: Estimation and information in stationary time series. Arkiv f\u00f6r matematik 2(5), 423\u2013434 (1953)","journal-title":"Arkiv f\u00f6r matematik"},{"issue":"1\u20133","key":"1_CR21","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1016\/0169-7439(87)80084-9","volume":"2","author":"S Wold","year":"1987","unstructured":"Wold, S., Esbensen, K., Geladi, P.: Principal component analysis. Chemom. Intell. Lab. Syst. 2(1\u20133), 37\u201352 (1987)","journal-title":"Chemom. Intell. Lab. Syst."},{"key":"1_CR22","unstructured":"Wombacher, A.: Data workflow-a workflow model for continuous data processing. Data Process. (2010)"},{"key":"1_CR23","doi-asserted-by":"crossref","unstructured":"Zhu, Y., Liu, L.: Optimal randomization for privacy preserving data mining. In: Proceedings of the Tenth ACM SIGKDD, pp. 761\u2013766 (2004)","DOI":"10.1145\/1014052.1014153"}],"container-title":["Communications in Computer and Information Science","Geometry and Vision"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-72073-5_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,26]],"date-time":"2024-08-26T05:23:00Z","timestamp":1724649780000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-72073-5_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030720728","9783030720735"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-72073-5_1","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"18 March 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISGV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Geometry and Vision","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Auckland","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"New Zealand","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 January 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 January 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"isgv2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/cerv.aut.ac.nz\/isgv2021","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"50","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"29","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"58% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.72","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Due to the COVID-19 pandemic the conference was partly held in a virtual format.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}