{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T19:38:13Z","timestamp":1772739493867,"version":"3.50.1"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030801281","type":"print"},{"value":"9783030801298","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-80129-8_63","type":"book-chapter","created":{"date-parts":[[2021,7,5]],"date-time":"2021-07-05T09:04:22Z","timestamp":1625475862000},"page":"949-966","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Construction of Differentially Private Empirical Distributions from a Low-Order Marginals Set Through Solving Linear Equations with $$l_2$$ Regularization"],"prefix":"10.1007","author":[{"given":"Evercita C.","family":"Eugenio","sequence":"first","affiliation":[]},{"given":"Fang","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"63_CR1","doi-asserted-by":"crossref","unstructured":"Barak, B., Chaudhuri, K., Dwork, C., Kale, S., McSherry, F., Talwar, K.: Privacy, accuracy, and consistency too: a holistic solution to contingency table release. In: Proceedings of the Twenty-Sixth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, pp. 273\u2013282. ACM (2007)","DOI":"10.1145\/1265530.1265569"},{"issue":"2","key":"63_CR2","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1214\/19-STS742","volume":"35","author":"CM Bowen","year":"2020","unstructured":"Bowen, C.M., Liu, F.: Comparative study of differentially private data synthesis methods. Stat. Sci. 35(2), 280\u2013307 (2020)","journal-title":"Stat. Sci."},{"key":"63_CR3","doi-asserted-by":"crossref","unstructured":"Chen, R., Xiao, Q., Zhang, Y., Xu, J.: Differentially private high-dimensional data publication via sampling-based inference. In: Proceedings of the 21th ACM SIGKDD, pp. 129\u2013138. ACM (2015)","DOI":"10.1145\/2783258.2783379"},{"key":"63_CR4","unstructured":"Culnane, C., Rubinstein, B.I.P., Teague, V.: Health data in an open world (2017). arXiv preprint arXiv:1712.05627v1"},{"key":"63_CR5","unstructured":"Dheeru, D., Taniskidou, E.F.: UCI machine learning repository (2017)"},{"key":"63_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-79228-4_1","volume-title":"Theory and Applications of Models of Computation","author":"C Dwork","year":"2008","unstructured":"Dwork, C.: Differential privacy: a survey of results. In: Agrawal, M., Du, D., Duan, Z., Li, A. (eds.) TAMC 2008. LNCS, vol. 4978, pp. 1\u201319. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-79228-4_1"},{"key":"63_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/11681878_14","volume-title":"Theory of Cryptography","author":"C Dwork","year":"2006","unstructured":"Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 265\u2013284. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11681878_14"},{"key":"63_CR8","doi-asserted-by":"crossref","unstructured":"Dwork, C., Roth, A.: The algorithmic foundations of differential privacy. Found. Trends\u00ae Theor. Comput. Sci. 9(3\u20134), 211\u2013407 (2014)","DOI":"10.1561\/0400000042"},{"key":"63_CR9","unstructured":"Hardt, M., Ligett, K., McSherry, F.: A simple and practical algorithm for differentially private data release. In: Advances in Neural Information Processing Systems, pp. 2339\u20132347 (2012)"},{"key":"63_CR10","doi-asserted-by":"crossref","unstructured":"Hay, M., Machanavajjhala, A., Miklau, G., Chen, Y., Zhang, D.: Principled evaluation of differentially private algorithms using dpbench. In: Proceedings of the 2016 International Conference on Management of Data, pp. 139\u2013154. ACM (2016)","DOI":"10.1145\/2882903.2882931"},{"issue":"1\u20132","key":"63_CR11","doi-asserted-by":"publisher","first-page":"1021","DOI":"10.14778\/1920841.1920970","volume":"3","author":"M Hay","year":"2010","unstructured":"Hay, M., Rastogi, V., Miklau, G., Suciu, D.: Boosting the accuracy of differentially private histograms through consistency. Proc. VLDB Endowment 3(1\u20132), 1021\u20131032 (2010)","journal-title":"Proc. VLDB Endowment"},{"issue":"4","key":"63_CR12","doi-asserted-by":"publisher","first-page":"637","DOI":"10.1016\/S0957-4174(03)00102-7","volume":"25","author":"M-J Kim","year":"2003","unstructured":"Kim, M.-J., Han, I.: The discovery of experts\u2019 decision rules from qualitative bankruptcy data using genetic algorithms. Expert Syst. Appl. 25(4), 637\u2013646 (2003)","journal-title":"Expert Syst. Appl."},{"key":"63_CR13","unstructured":"Liu, F.: Model-based differential private data synthesis (2016). arXiv preprint arXiv:1606.08052"},{"issue":"4","key":"63_CR14","doi-asserted-by":"publisher","first-page":"747","DOI":"10.1109\/TKDE.2018.2845388","volume":"31","author":"F Liu","year":"2019","unstructured":"Liu, F.: Generalized gaussian mechanism for differential privacy. IEEE Trans. Knowl. Data Eng. 31(4), 747\u2013756 (2019)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"63_CR15","doi-asserted-by":"crossref","unstructured":"Liu, F., Zhao, X., Zhang, G.: Disclosure risk from homogeneity attack in differentially private frequency distribution (2021). arXiv preprint arXiv:2101.00311v2","DOI":"10.1145\/3508398.3519357"},{"key":"63_CR16","doi-asserted-by":"crossref","unstructured":"Machanavajjhala, A., Kifer, D., Abowd, J., Gehrke, J., Vilhuber, L.: Privacy: theory meets practice on the map. In: IEEE ICDE IEEE 24th International Conference, pp. 277\u2013286 (2008)","DOI":"10.1109\/ICDE.2008.4497436"},{"key":"63_CR17","doi-asserted-by":"crossref","unstructured":"McSherry, F., Talwar, K.: Mechanism design via differential privacy. In: 48th Annual IEEE Symposium on Foundations of Computer Science, 2007. FOCS 200, pp. 94\u2013103. IEEE (2007)","DOI":"10.1109\/FOCS.2007.66"},{"key":"63_CR18","doi-asserted-by":"crossref","unstructured":"McSherry, F.D.: Privacy integrated queries: an extensible platform for privacy-preserving data analysis. In: Proceedings of the 2009 ACM SIGMOD International Conference on Management of data, pp. 19\u201330. ACM (2009)","DOI":"10.1145\/1559845.1559850"},{"key":"63_CR19","unstructured":"Narayanan, A., Shmatikov, V.: How to break anonymity of the netflix prize dataset (2006). CoRR, abs\/cs\/0610105"},{"key":"63_CR20","doi-asserted-by":"crossref","unstructured":"Narayanan, A., Shmatikov, V.: Robust de-anonymization of large sparse datasets. In: IEEE Symposium on Security and Privacy, 2008. SP 2008, pp. 111\u2013125. IEEE (2008)","DOI":"10.1109\/SP.2008.33"},{"key":"63_CR21","doi-asserted-by":"crossref","unstructured":"Sweeney, L.: Matching known patients to health records in washington state data (2013). CoRR, abs\/1307.1370","DOI":"10.2139\/ssrn.2289850"},{"key":"63_CR22","unstructured":"Tikhonov, A.N.: On the solution of ill-posed problems and the method of regularization. Doklady Akademii Nauk 151(3), 501\u2013504 (1963). Russian Academy of Sciences"},{"key":"63_CR23","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-015-8480-7","volume-title":"Numerical Methods for the Solution of Ill-Posed Problems","author":"AN Tikhonov","year":"2013","unstructured":"Tikhonov, A.N., Goncharsky, A., Stepanov, V.V., Yagola, A.G.: Numerical Methods for the Solution of Ill-Posed Problems, vol. 328. Springer, New York (2013). https:\/\/doi.org\/10.1007\/978-94-015-8480-7"},{"key":"63_CR24","unstructured":"Tockar, A.: Riding with the stars: Passenger privacy in the nyc taxicab dataset (2014). https:\/\/research.neustar.biz\/author\/atockar\/"},{"key":"63_CR25","doi-asserted-by":"crossref","unstructured":"Zhang, J., Cormode, G., Procopiuc, C.M., Srivastava, D., Xiao, X.: Privbayes: private data release via bayesian networks. In: Proceedings of the 2014 ACM SIGMOD, SIGMOD 2014, pp. 1423\u20131434 (2014)","DOI":"10.1145\/2588555.2588573"}],"container-title":["Lecture Notes in Networks and Systems","Intelligent Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-80129-8_63","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T07:13:40Z","timestamp":1771658020000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-80129-8_63"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030801281","9783030801298"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-80129-8_63","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"value":"2367-3370","type":"print"},{"value":"2367-3389","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"6 July 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}