{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T16:07:39Z","timestamp":1774541259151,"version":"3.50.1"},"publisher-location":"Cham","reference-count":36,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031514753","type":"print"},{"value":"9783031514760","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-51476-0_22","type":"book-chapter","created":{"date-parts":[[2024,1,10]],"date-time":"2024-01-10T07:02:29Z","timestamp":1704870149000},"page":"446-466","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Item-Oriented Personalized LDP for\u00a0Discrete Distribution Estimation"],"prefix":"10.1007","author":[{"given":"Xin","family":"Li","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9815-3934","authenticated-orcid":false,"given":"Hong","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Zhiqiang","family":"Zhang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1973-7470","authenticated-orcid":false,"given":"Meiyi","family":"Xie","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,1,11]]},"reference":[{"key":"22_CR1","unstructured":"kosarak dataset. http:\/\/fimi.uantwerpen.be\/data\/"},{"key":"22_CR2","doi-asserted-by":"publisher","unstructured":"Abstracts of Papers. Ann. Math. Stat. 20(4), 620 \u2013 624 (1949). https:\/\/doi.org\/10.1214\/aoms\/1177729959","DOI":"10.1214\/aoms\/1177729959"},{"key":"22_CR3","doi-asserted-by":"crossref","unstructured":"Alaggan, M., Gambs, S., Kermarrec, A.: Heterogeneous differential privacy. J. Priv. Confidentiality 7(2) (2016)","DOI":"10.29012\/jpc.v7i2.652"},{"key":"22_CR4","unstructured":"Bassily, R., Nissim, K., Stemmer, U., Thakurta, A.G.: Practical locally private heavy hitters. In: NIPS, pp. 2288\u20132296 (2017)"},{"key":"22_CR5","doi-asserted-by":"crossref","unstructured":"Bassily, R., Smith, A.D.: Local, private, efficient protocols for succinct histograms. In: STOC, pp. 127\u2013135. ACM (2015)","DOI":"10.1145\/2746539.2746632"},{"key":"22_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"635","DOI":"10.1007\/978-3-662-53641-4_24","volume-title":"Theory of Cryptography","author":"M Bun","year":"2016","unstructured":"Bun, M., Steinke, T.: Concentrated differential privacy: simplifications, extensions, and lower bounds. In: Hirt, M., Smith, A. (eds.) TCC 2016. LNCS, vol. 9985, pp. 635\u2013658. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-53641-4_24"},{"key":"22_CR7","doi-asserted-by":"crossref","unstructured":"Chen, R., Li, H., Qin, A.K., Kasiviswanathan, S.P., Jin, H.: Private spatial data aggregation in the local setting. In: ICDE, pp. 289\u2013300. IEEE Computer Society (2016)","DOI":"10.1109\/ICDE.2016.7498248"},{"key":"22_CR8","unstructured":"Chen, Z., Wang, J.: Ldp-fpminer: Fp-tree based frequent itemset mining with local differential privacy. CoRR arxiv:2209.01333 (2022)"},{"key":"22_CR9","doi-asserted-by":"crossref","unstructured":"Cuff, P., Yu, L.: Differential privacy as a mutual information constraint. In: CCS, pp. 43\u201354. ACM (2016)","DOI":"10.1145\/2976749.2978308"},{"key":"22_CR10","doi-asserted-by":"crossref","unstructured":"Duchi, J.C., Jordan, M.I., Wainwright, M.J.: Local privacy and statistical minimax rates. In: FOCS, pp. 429\u2013438. IEEE Computer Society (2013)","DOI":"10.1109\/FOCS.2013.53"},{"key":"22_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11787006_1","volume-title":"Automata, Languages and Programming","author":"C Dwork","year":"2006","unstructured":"Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1\u201312. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11787006_1"},{"key":"22_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/11681878_14","volume-title":"Theory of Cryptography","author":"C Dwork","year":"2006","unstructured":"Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 265\u2013284. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11681878_14"},{"key":"22_CR13","doi-asserted-by":"crossref","unstructured":"Erlingsson, \u00da., Pihur, V., Korolova, A.: RAPPOR: randomized aggregatable privacy-preserving ordinal response. In: CCS, pp. 1054\u20131067. ACM (2014)","DOI":"10.1145\/2660267.2660348"},{"key":"22_CR14","doi-asserted-by":"crossref","unstructured":"Gu, X., Li, M., Xiong, L., Cao, Y.: Providing input-discriminative protection for local differential privacy. In: ICDE, pp. 505\u2013516. IEEE (2020)","DOI":"10.1109\/ICDE48307.2020.00050"},{"key":"22_CR15","doi-asserted-by":"crossref","unstructured":"Han, J., Pei, J., Yin, Y.: Mining frequent patterns without candidate generation. In: SIGMOD Conference, pp. 1\u201312. ACM (2000)","DOI":"10.1145\/335191.335372"},{"key":"22_CR16","doi-asserted-by":"crossref","unstructured":"Jorgensen, Z., Yu, T., Cormode, G.: Conservative or liberal? personalized differential privacy. In: ICDE, pp. 1023\u20131034. IEEE Computer Society (2015)","DOI":"10.1109\/ICDE.2015.7113353"},{"key":"22_CR17","unstructured":"Kairouz, P., Bonawitz, K.A., Ramage, D.: Discrete distribution estimation under local privacy. In: ICML. JMLR Workshop and Conference Proceedings, vol. 48, pp. 2436\u20132444. JMLR.org (2016)"},{"key":"22_CR18","unstructured":"Kairouz, P., Oh, S., Viswanath, P.: Extremal mechanisms for local differential privacy. In: NIPS, pp. 2879\u20132887 (2014)"},{"key":"22_CR19","doi-asserted-by":"crossref","unstructured":"Kifer, D., Machanavajjhala, A.: Pufferfish: a framework for mathematical privacy definitions. ACM Trans. Database Syst. 39(1), 3:1\u20133:36 (2014)","DOI":"10.1145\/2514689"},{"key":"22_CR20","doi-asserted-by":"crossref","unstructured":"Kotsogiannis, I., Doudalis, S., Haney, S., Machanavajjhala, A., Mehrotra, S.: One-sided differential privacy. In: ICDE, pp. 493\u2013504. IEEE (2020)","DOI":"10.1109\/ICDE48307.2020.00049"},{"key":"22_CR21","doi-asserted-by":"crossref","unstructured":"Lin, B., Kifer, D.: Information preservation in statistical privacy and bayesian estimation of unattributed histograms. In: SIGMOD Conference, pp. 677\u2013688. ACM (2013)","DOI":"10.1145\/2463676.2463721"},{"key":"22_CR22","doi-asserted-by":"publisher","first-page":"2936","DOI":"10.1109\/TIFS.2022.3198283","volume":"17","author":"W Lin","year":"2022","unstructured":"Lin, W., Li, B., Wang, C.: Towards private learning on decentralized graphs with local differential privacy. IEEE Trans. Inf. Forensics Secur. 17, 2936\u20132946 (2022)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"22_CR23","doi-asserted-by":"crossref","unstructured":"Mangat, N.S.: An improved randomized response strategy. J. Royal Stat. Soc. Ser. B (Methodol.) 56(1), 93\u201395 (1994). http:\/\/www.jstor.org\/stable\/2346030","DOI":"10.1111\/j.2517-6161.1994.tb01962.x"},{"key":"22_CR24","doi-asserted-by":"crossref","unstructured":"Mironov, I.: R\u00e9nyi differential privacy. In: CSF, pp. 263\u2013275. IEEE Computer Society (2017)","DOI":"10.1109\/CSF.2017.11"},{"key":"22_CR25","unstructured":"Murakami, T., Kawamoto, Y.: Utility-optimized local differential privacy mechanisms for distribution estimation. In: USENIX Security Symposium, pp. 1877\u20131894. USENIX Association (2019)"},{"issue":"4","key":"22_CR26","doi-asserted-by":"publisher","first-page":"655","DOI":"10.1109\/TKDE.2018.2841360","volume":"31","author":"Y Nie","year":"2019","unstructured":"Nie, Y., Yang, W., Huang, L., Xie, X., Zhao, Z., Wang, S.: A utility-optimized framework for personalized private histogram estimation. IEEE Trans. Knowl. Data Eng. 31(4), 655\u2013669 (2019)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"22_CR27","doi-asserted-by":"crossref","unstructured":"Qin, Z., Yu, T., Yang, Y., Khalil, I., Xiao, X., Ren, K.: Generating synthetic decentralized social graphs with local differential privacy. In: CCS, pp. 425\u2013438. ACM (2017)","DOI":"10.1145\/3133956.3134086"},{"key":"22_CR28","doi-asserted-by":"crossref","unstructured":"Wang, N., et al.: Privtrie: effective frequent term discovery under local differential privacy. In: ICDE, pp. 821\u2013832. IEEE Computer Society (2018)","DOI":"10.1109\/ICDE.2018.00079"},{"key":"22_CR29","doi-asserted-by":"crossref","unstructured":"Wang, T., Li, N., Jha, S.: Locally differentially private frequent itemset mining. In: IEEE Symposium on Security and Privacy, pp. 127\u2013143. IEEE Computer Society (2018)","DOI":"10.1109\/SP.2018.00035"},{"issue":"2","key":"22_CR30","doi-asserted-by":"publisher","first-page":"982","DOI":"10.1109\/TDSC.2019.2927695","volume":"18","author":"T Wang","year":"2021","unstructured":"Wang, T., Li, N., Jha, S.: Locally differentially private heavy hitter identification. IEEE Trans. Dependable Secur. Comput. 18(2), 982\u2013993 (2021)","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"22_CR31","doi-asserted-by":"crossref","unstructured":"Wang, T., Lopuha\u00e4-Zwakenberg, M., Li, Z., Skoric, B., Li, N.: Locally differentially private frequency estimation with consistency. In: NDSS. The Internet Society (2020)","DOI":"10.14722\/ndss.2020.24157"},{"issue":"13","key":"22_CR32","doi-asserted-by":"publisher","first-page":"3545","DOI":"10.14778\/3424573.3424576","volume":"13","author":"T Wang","year":"2020","unstructured":"Wang, T., et al.: Improving utility and security of the shuffler-based differential privacy. Proc. VLDB Endow. 13(13), 3545\u20133558 (2020)","journal-title":"Proc. VLDB Endow."},{"key":"22_CR33","doi-asserted-by":"crossref","unstructured":"Wang, Z., Zhu, Y., Wang, D., Han, Z.: Fedfpm: a unified federated analytics framework for collaborative frequent pattern mining. In: INFOCOM, pp. 61\u201370. IEEE (2022)","DOI":"10.1109\/INFOCOM48880.2022.9796719"},{"issue":"309","key":"22_CR34","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1080\/01621459.1965.10480775","volume":"60","author":"SL Warner","year":"1965","unstructured":"Warner, S.L.: Randomized response: a survey technique for eliminating evasive answer bias. J. Am. Stat. Assoc. 60(309), 63\u201369 (1965)","journal-title":"J. Am. Stat. Assoc."},{"key":"22_CR35","doi-asserted-by":"publisher","first-page":"3239","DOI":"10.1109\/TIFS.2020.2985524","volume":"15","author":"C Wei","year":"2020","unstructured":"Wei, C., Ji, S., Liu, C., Chen, W., Wang, T.: ASGLDP: collecting and generating decentralized attributed graphs with local differential privacy. IEEE Trans. Inf. Forensics Secur. 15, 3239\u20133254 (2020)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"22_CR36","doi-asserted-by":"crossref","unstructured":"Xu, J., Zhang, Z., Xiao, X., Yang, Y., Yu, G.: Differentially private histogram publication. In: ICDE, pp. 32\u201343. IEEE Computer Society (2012)","DOI":"10.1109\/ICDE.2012.48"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2023"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-51476-0_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,10]],"date-time":"2024-01-10T07:08:05Z","timestamp":1704870485000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-51476-0_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031514753","9783031514760"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-51476-0_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"11 January 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ESORICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Symposium on Research in Computer Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The Hague","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The Netherlands","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 September 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 September 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"esorics2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/esorics2023.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"478","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"93","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"19% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3-4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"10","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}