{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T15:30:20Z","timestamp":1759332620284,"version":"3.40.3"},"publisher-location":"Cham","reference-count":13,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031682070"},{"type":"electronic","value":"9783031682087"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-68208-7_18","type":"book-chapter","created":{"date-parts":[[2024,8,14]],"date-time":"2024-08-14T06:02:44Z","timestamp":1723615364000},"page":"211-223","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A Poisoning-Resilient LDP Schema Leveraging Oblivious Transfer with\u00a0the\u00a0Hadamard Transform"],"prefix":"10.1007","author":[{"given":"Masahiro","family":"Shimizu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0903-8430","authenticated-orcid":false,"given":"Hiroaki","family":"Kikuchi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,8,15]]},"reference":[{"key":"18_CR1","unstructured":"Cao, X., Jia, Gong, N.Z.: Data poisoning attacks to local differential privacy protocols. In: USENIX Security Symposium, pp. 947\u2013964 (2021)"},{"key":"18_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1007\/978-3-031-33498-6_17","volume-title":"Modeling Decisions for Artificial Intelligence - MDAI 2023","author":"H Horigome","year":"2023","unstructured":"Horigome, H., Kikuchi, H., Yu, C.M.: Local differential privacy protocol for making key-value data robust against poisoning attacks. In: Torra, V., Narukawa, Y. (eds.) MDAI 2023. LNCS, vol. 13890, pp. 241\u2013252. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-33498-6_17"},{"key":"18_CR3","unstructured":"Differential Privacy Team: Leaning with Privacy at Scale. https:\/\/machinelearning.apple.com\/research\/learning-with-privacy-at-scale"},{"key":"18_CR4","doi-asserted-by":"crossref","unstructured":"Erlingsson, \u00da., Pihur, V., Korolova, A.: RAPPOR: randomized aggregatable privacy-preserving ordinal response. In: ACM Conference on Computer and Communications Security, pp. 1054\u20131067 (2014)","DOI":"10.1145\/2660267.2660348"},{"key":"18_CR5","doi-asserted-by":"crossref","unstructured":"Even, S., Goldreich, O., Lempel, A.: A randomized protocol for signing contracts. Commun. ACM, 205\u2013210 (1982)","DOI":"10.1007\/978-1-4757-0602-4_19"},{"key":"18_CR6","unstructured":"Gadotti, A., Houssiau, F., Annamalai, M.S.M.S., de Montjoye, Y.A.: Pool inference attacks on local differential privacy: quantifying the privacy guarantees of Apple\u2019s count mean sketch in practice. In: 31st USENIX Security Symposium (USENIX Security 22) (2022)"},{"key":"18_CR7","doi-asserted-by":"crossref","unstructured":"Duchi, J.C., Jordan, M.I., Wainwright, M.J.: Local privacy and statistical minimax rates. In: 2013 IEEE 54th Annual Symposium on Foundations of Computer Science, Berkeley, CA, USA, pp. 429\u2013438 (2013)","DOI":"10.1109\/FOCS.2013.53"},{"key":"18_CR8","unstructured":"clickstream data for online shopping, UCI Machine Learning Repository (2019)"},{"key":"18_CR9","unstructured":"Wu, Y., Cao, X., Jia, J., Gong, N.Z.: Poisoning attacks to local differential privacy protocols for key-value data. In: USENIX Security Symposium, pp. 519\u2013536 (2022)"},{"issue":"1","key":"18_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s00145-004-0102-6","volume":"18","author":"M Naor","year":"2005","unstructured":"Naor, M., Pinkas, B.: Computationally secure oblivious transfer. J. Cryptol. 18(1), 1\u201335 (2005). Springer","journal-title":"J. Cryptol."},{"key":"18_CR11","doi-asserted-by":"crossref","unstructured":"Ye, Q., Hu, H., Meng, X., Zheng, H.: PrivKV: key-value data collection with local differential privacy. In: IEEE S &P, pp. 294\u2013308 (2019)","DOI":"10.1109\/SP.2019.00018"},{"key":"18_CR12","doi-asserted-by":"crossref","unstructured":"Warner, S.L.: Randomized response: a survey technique for eliminating evasive answer bias. J. Am. Stat. Assoc. 63\u201369 (1965)","DOI":"10.1080\/01621459.1965.10480775"},{"key":"18_CR13","doi-asserted-by":"crossref","unstructured":"Huang, K., et al.: LDPGuard: defenses against data poisoning attacks to local differential privacy protocols. IEEE Trans. Knowl. Data Eng. 1\u201314 (2024)","DOI":"10.1109\/TKDE.2024.3358909"}],"container-title":["Lecture Notes in Computer Science","Modeling Decisions for Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-68208-7_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,14]],"date-time":"2024-08-14T06:07:56Z","timestamp":1723615676000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-68208-7_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031682070","9783031682087"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-68208-7_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"15 August 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MDAI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Modeling Decisions for Artificial Intelligence","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tokyo","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 August 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 August 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"mdai2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}