{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T18:27:25Z","timestamp":1742927245739,"version":"3.40.3"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031334979"},{"type":"electronic","value":"9783031334986"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-33498-6_18","type":"book-chapter","created":{"date-parts":[[2023,5,18]],"date-time":"2023-05-18T07:02:40Z","timestamp":1684393360000},"page":"253-264","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Differentially Private Graph Publishing Through Noise-Graph Addition"],"prefix":"10.1007","author":[{"given":"Juli\u00e1n","family":"Salas","sequence":"first","affiliation":[]},{"given":"Vladimiro","family":"Gonz\u00e1lez-Zelaya","sequence":"additional","affiliation":[]},{"given":"Vicen\u00e7","family":"Torra","sequence":"additional","affiliation":[]},{"given":"David","family":"Meg\u00edas","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,5,19]]},"reference":[{"key":"18_CR1","first-page":"8419","volume":"34","author":"S Abu-El-Haija","year":"2021","unstructured":"Abu-El-Haija, S., Mostafa, H., Nassar, M., Crespi, V., Ver Steeg, G., Galstyan, A.: Implicit SVD for graph representation learning. Adv. Neural Inf. Process. Syst. 34, 8419\u20138431 (2021)","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"18_CR2","unstructured":"Abu-El-Haija, S., Perozzi, B., Al-Rfou, R., Alemi, A.A.: Watch your step: learning node embeddings via graph attention. In: Advances in Neural Information Processing Systems. vol. 31 (2018)"},{"issue":"1","key":"18_CR3","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1080\/10586458.2001.10504428","volume":"10","author":"W Aiello","year":"2001","unstructured":"Aiello, W., Chung, F., Lu, L.: A random graph model for power law graphs. Exp. Math. 10(1), 53\u201366 (2001)","journal-title":"Exp. Math."},{"key":"18_CR4","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1016\/j.ins.2014.02.035","volume":"275","author":"F Bonchi","year":"2014","unstructured":"Bonchi, F., Gionis, A., Tassa, T.: Identity obfuscation in graphs through the information theoretic lens. Inf. Sci. 275, 232\u2013256 (2014)","journal-title":"Inf. Sci."},{"issue":"3\u20134","key":"18_CR5","first-page":"211","volume":"9","author":"C Dwork","year":"2014","unstructured":"Dwork, C., Roth, A.: The algorithmic foundations of differential privacy. Found. Trends Theor. Comput. Sci. 9(3\u20134), 211\u2013407 (2014)","journal-title":"Found. Trends Theor. Comput. Sci."},{"key":"18_CR6","doi-asserted-by":"crossref","unstructured":"Erlingsson, U., Pihur, V., Korolova, A.: RAPPOR: randomized aggregatable privacy-preserving ordinal response. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 1054\u20131067. CCS 2014, Association for Computing Machinery, New York, USA (2014)","DOI":"10.1145\/2660267.2660348"},{"issue":"1","key":"18_CR7","doi-asserted-by":"publisher","first-page":"102","DOI":"10.14778\/1453856.1453873","volume":"1","author":"M Hay","year":"2008","unstructured":"Hay, M., Miklau, G., Jensen, D., Towsley, D., Weis, P.: Resisting structural re-identification in anonymized social networks. Proc. VLDB Endowment 1(1), 102\u2013114 (2008)","journal-title":"Proc. VLDB Endowment"},{"issue":"11","key":"18_CR8","doi-asserted-by":"publisher","first-page":"2726","DOI":"10.1109\/TIFS.2017.2718487","volume":"12","author":"N Holohan","year":"2017","unstructured":"Holohan, N., Leith, D.J., Mason, O.: Optimal differentially private mechanisms for randomised response. Trans. Info. For. Sec. 12(11), 2726\u20132735 (2017)","journal-title":"Trans. Info. For. Sec."},{"key":"18_CR9","unstructured":"Imola, J., Murakami, T., Chaudhuri, K.: Locally differentially private analysis of graph statistics. In: 30th USENIX Security Symposium (USENIX Security 21), pp. 983\u20131000 (2021)"},{"key":"18_CR10","unstructured":"M\u00fclle, Y., Clifton, C., B\u00f6hm, K.: Privacy-integrated graph clustering through differential privacy. In: EDBT\/ICDT Workshops. vol. 157 (2015)"},{"key":"18_CR11","doi-asserted-by":"crossref","unstructured":"Qin, Z., Yu, T., Yang, Y., Khalil, I., Xiao, X., Ren, K.: Generating synthetic decentralized social graphs with local differential privacy. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 425\u2013438 (2017)","DOI":"10.1145\/3133956.3134086"},{"key":"18_CR12","doi-asserted-by":"crossref","unstructured":"Salas, J., Torra, V.: Differentially private graph publishing and randomized response for collaborative filtering. In: Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, ICETE 2020 - Vol. 2: SECRYPT, Lieusaint, Paris, France, 8\u201310 July 2020, pp. 415\u2013422. ScitePress (2020)","DOI":"10.5220\/0009833804150422"},{"key":"18_CR13","doi-asserted-by":"publisher","unstructured":"Salas, J., Torra, V., Meg\u00edas, D.: Towards measuring fairness for local differential privacy. In: Data Privacy Management, Cryptocurrencies and Blockchain Technology: ESORICS 2022 International Workshops, DPM 2022 and CBT 2022, Copenhagen, Denmark, 26\u201330 Sep 2022, Revised Selected Papers. pp. 19\u201334. Springer (2023). https:\/\/doi.org\/10.1007\/978-3-031-25734-6_2","DOI":"10.1007\/978-3-031-25734-6_2"},{"key":"18_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1007\/978-3-030-31500-9_8","volume-title":"Data Privacy Management, Cryptocurrencies and Blockchain Technology","author":"V Torra","year":"2019","unstructured":"Torra, V., Salas, J.: Graph perturbation as noise graph addition: a new perspective for graph anonymization. In: P\u00e9rez-Sol\u00e0, C., Navarro-Arribas, G., Biryukov, A., Garcia-Alfaro, J. (eds.) DPM\/CBT -2019. LNCS, vol. 11737, pp. 121\u2013137. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-31500-9_8"},{"key":"18_CR15","unstructured":"Wang, Y., Wu, X., Hu, D.: Using randomized response for differential privacy preserving data collection. In: EDBT\/ICDT2016WS (2016)"},{"issue":"309","key":"18_CR16","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1080\/01621459.1965.10480775","volume":"60","author":"SL Warner","year":"1965","unstructured":"Warner, S.L.: Randomized response: A survey technique for eliminating evasive answer bias. J. Am. Stat. Assoc. 60(309), 63\u201369 (1965)","journal-title":"J. Am. Stat. Assoc."}],"container-title":["Lecture Notes in Computer Science","Modeling Decisions for Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-33498-6_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,21]],"date-time":"2023-05-21T23:17:43Z","timestamp":1684711063000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-33498-6_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031334979","9783031334986"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-33498-6_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"19 May 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MDAI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Modeling Decisions for Artificial Intelligence","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ume\u00e5","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sweden","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 June 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 June 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"mdai2022b","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}