{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T08:12:53Z","timestamp":1743063173448,"version":"3.40.3"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319180311"},{"type":"electronic","value":"9783319180328"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-18032-8_24","type":"book-chapter","created":{"date-parts":[[2015,5,8]],"date-time":"2015-05-08T05:41:54Z","timestamp":1431063714000},"page":"305-316","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Achieving Accuracy Guarantee for Answering Batch Queries with Differential Privacy"],"prefix":"10.1007","author":[{"given":"Dong","family":"Huang","sequence":"first","affiliation":[]},{"given":"Shuguo","family":"Han","sequence":"additional","affiliation":[]},{"given":"Xiaoli","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,5,9]]},"reference":[{"key":"24_CR1","unstructured":"Billingsley, P.: Probability and measure. John Wiley & Sons (2008)"},{"key":"24_CR2","unstructured":"Blake, C.L., Merz, C.J.: UCI repository of machine learning databases (1998); Robustness of maximum boxes"},{"key":"24_CR3","first-page":"1069","volume":"12","author":"K Chaudhuri","year":"2011","unstructured":"Chaudhuri, K., Monteleoni, C., Sarwate, A.D.: Differentially private empirical risk minimization. Journal of Machine Learning Research: JMLR 12, 1069 (2011)","journal-title":"Journal of Machine Learning Research: JMLR"},{"key":"24_CR4","doi-asserted-by":"crossref","unstructured":"Clifton, C., Tassa, T.: On syntactic anonymity and differential privacy. In: First Workshop on Privacy-Preserving Data Publication and Analysis at ICDE, pp. 8\u201312 (2013)","DOI":"10.1109\/ICDEW.2013.6547433"},{"key":"24_CR5","doi-asserted-by":"crossref","unstructured":"Ding, B., Winslett, M., Han, J., Li, Z.: Differentially private data cubes: optimizing noise sources and consistency. In: SIGMOD Conference, pp. 217\u2013228 (2011)","DOI":"10.1145\/1989323.1989347"},{"key":"24_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11787006_1","volume-title":"Automata, Languages and Programming","author":"C Dwork","year":"2006","unstructured":"Dwork, C.: Differential Privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1\u201312. Springer, Heidelberg (2006)"},{"issue":"1","key":"24_CR7","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1145\/1866739.1866758","volume":"54","author":"C Dwork","year":"2011","unstructured":"Dwork, C.: A firm foundation for private data analysis. Communications of the ACM 54(1), 86\u201395 (2011)","journal-title":"Communications of the ACM"},{"key":"24_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/11681878_14","volume-title":"Theory of Cryptography","author":"C Dwork","year":"2006","unstructured":"Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating Noise to Sensitivity in Private Data Analysis. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 265\u2013284. Springer, Heidelberg (2006)"},{"key":"24_CR9","doi-asserted-by":"crossref","unstructured":"Hardt, M., Rothblum, G.N., Servedio, R.A.: Private data release via learning thresholds. In: Proceedings of the Twenty-Third Annual ACM-SIAM Symposium on Discrete Algorithms, pp. 168\u2013187 (2012)","DOI":"10.1137\/1.9781611973099.15"},{"key":"24_CR10","doi-asserted-by":"crossref","unstructured":"Mohan, P., Thakurta, A., Shi, E., Song, D., Culler, D.: Gupt: privacy preserving data analysis made easy. In: Proceedings of the ACM SIGMOD International Conference on Management of Data, pp. 349\u2013360 (2012)","DOI":"10.1145\/2213836.2213876"},{"key":"24_CR11","doi-asserted-by":"crossref","unstructured":"Nissim, K., Raskhodnikova, S., Smith, A.: Smooth sensitivity and sampling in private data analysis. In: Proceedings of the 39th Annual ACM Symposium on Theory of Computing, pp. 75\u201384 (2007)","DOI":"10.1145\/1250790.1250803"},{"key":"24_CR12","doi-asserted-by":"crossref","unstructured":"Rastogi, V., Nath, S.: Differentially private aggregation of distributed time-series with transformation and encryption. In: Proceedings of the International Conference on Management of Data, pp. 735\u2013746. ACM (2010)","DOI":"10.1145\/1807167.1807247"},{"key":"24_CR13","doi-asserted-by":"crossref","unstructured":"Reed, W.J.: The normal-laplace distribution and its relatives. In: Advances in Distribution Theory, Order Statistics, and Inference, pp. 61\u201374. Springer (2006)","DOI":"10.1007\/0-8176-4487-3_4"},{"key":"24_CR14","unstructured":"Smith, A.: Efficient, differentially private point estimators. arXiv preprint arXiv:0809.4794 (2008)"},{"key":"24_CR15","doi-asserted-by":"crossref","unstructured":"Vu, D., Slavkovic, A.: Differential privacy for clinical trial data: Preliminary evaluations. In: IEEE International Conference on Data Mining Workshops, pp. 138\u2013143 (2009)","DOI":"10.1109\/ICDMW.2009.52"},{"issue":"8","key":"24_CR16","doi-asserted-by":"publisher","first-page":"1200","DOI":"10.1109\/TKDE.2010.247","volume":"23","author":"X Xiao","year":"2011","unstructured":"Xiao, X., Wang, G., Gehrke, J.: Differential privacy via wavelet transforms. IEEE Transactions on Knowledge and Data Engineering 23(8), 1200\u20131214 (2011)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"issue":"11","key":"24_CR17","doi-asserted-by":"publisher","first-page":"1364","DOI":"10.14778\/2350229.2350253","volume":"5","author":"J Zhang","year":"2012","unstructured":"Zhang, J., Zhang, Z., Xiao, X., Yang, Y., Winslett, M.: Functional mechanism: regression analysis under differential privacy. Proceedings of the VLDB Endowment 5(11), 1364\u20131375 (2012)","journal-title":"Proceedings of the VLDB Endowment"}],"container-title":["Lecture Notes in Computer Science","Advances in Knowledge Discovery and Data Mining"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-18032-8_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,8]],"date-time":"2023-02-08T10:19:33Z","timestamp":1675851573000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-18032-8_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319180311","9783319180328"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-18032-8_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"9 May 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}