{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T13:30:06Z","timestamp":1725888606105},"publisher-location":"Cham","reference-count":37,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319598697"},{"type":"electronic","value":"9783319598703"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-59870-3_12","type":"book-chapter","created":{"date-parts":[[2017,5,30]],"date-time":"2017-05-30T02:14:17Z","timestamp":1496110457000},"page":"214-234","source":"Crossref","is-referenced-by-count":4,"title":["Privacy-Utility Tradeoff for Applications Using Energy Disaggregation of Smart-Meter Data"],"prefix":"10.1007","author":[{"given":"Mitsuhiro","family":"Hattori","sequence":"first","affiliation":[]},{"given":"Takato","family":"Hirano","sequence":"additional","affiliation":[]},{"given":"Nori","family":"Matsuda","sequence":"additional","affiliation":[]},{"given":"Rina","family":"Shimizu","sequence":"additional","affiliation":[]},{"given":"Ye","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,31]]},"reference":[{"key":"12_CR1","doi-asserted-by":"crossref","unstructured":"Alcal\u00e1, J., Parson, O., Rogers, A.: Detecting anomalies in activities of daily living of elderly residents via energy disaggregation and cox processes. In: BuildSys 2015. ACM (2015)","DOI":"10.1145\/2821650.2821654"},{"key":"12_CR2","doi-asserted-by":"crossref","unstructured":"Alcal\u00e1, J., Ure\u00f1a, J., Hern\u00e1ndez, A.: Activity supervision tool using non-intrusive load monitoring systems. In: ETFA 2015. IEEE (2015)","DOI":"10.1109\/ETFA.2015.7301622"},{"issue":"15","key":"12_CR3","doi-asserted-by":"crossref","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","volume":"54","author":"L Atzori","year":"2010","unstructured":"Atzori, L., Iera, A., Morabito, G.: The internet of things: a survey. Comput. Netw. 54(15), 2787\u20132805 (2010)","journal-title":"Comput. Netw."},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"Basciftci, Y.O., Wang, Y., Ishwar, P.: On privacy-utility tradeoffs for constrained data release mechanisms. In: ITA 2016. IEEE (2016)","DOI":"10.1109\/ITA.2016.7888175"},{"key":"12_CR5","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511804441","volume-title":"Convex Optimization","author":"S Boyd","year":"2004","unstructured":"Boyd, S., Vandenberghe, L.: Convex Optimization. Cambridge University Press, Cambridge (2004)"},{"key":"12_CR6","doi-asserted-by":"crossref","unstructured":"Boyd, S., Vandenberghe, L., Grant, M.: Advances in convex optimization. In: Chinese Control Conference 2006. IEEE (2006)","DOI":"10.1109\/CHICC.2006.280567"},{"key":"12_CR7","doi-asserted-by":"crossref","unstructured":"Duhigg, C.: How companies learn your secrets. The New York Times Magazine (2012)","DOI":"10.7312\/star16075-025"},{"key":"12_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11787006_1","volume-title":"Automata, Languages and Programming","author":"C Dwork","year":"2006","unstructured":"Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1\u201312. Springer, Heidelberg (2006). doi: 10.1007\/11787006_1"},{"key":"12_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-79228-4_1","volume-title":"Theory and Applications of Models of Computation","author":"C Dwork","year":"2008","unstructured":"Dwork, C.: Differential privacy: a survey of results. In: Agrawal, M., Du, D., Duan, Z., Li, A. (eds.) TAMC 2008. LNCS, vol. 4978, pp. 1\u201319. Springer, Heidelberg (2008). doi: 10.1007\/978-3-540-79228-4_1"},{"issue":"5","key":"12_CR10","doi-asserted-by":"crossref","first-page":"362","DOI":"10.1080\/0025570X.2008.11953577","volume":"81","author":"B Eisenberg","year":"2008","unstructured":"Eisenberg, B., Sullivan, R.: Why is the sum of independent normal random variables normal? Math. Mag. 81(5), 362\u2013366 (2008)","journal-title":"Math. Mag."},{"key":"12_CR11","doi-asserted-by":"crossref","unstructured":"Erdogdu, M.A., Fawaz, N.: Privacy-utility trade-off under continual observation. In: ISIT 2015, pp. 1801\u20131805. IEEE (2015)","DOI":"10.1109\/ISIT.2015.7282766"},{"key":"12_CR12","unstructured":"Erdogdu, M.A., Fawaz, N., Montanari, A.: Privacy-utility trade-off for time-series with application to smart-meter data. In: AAAI 2015 Workshop on Computational Sustainability (2015)"},{"issue":"2\/3","key":"12_CR13","doi-asserted-by":"crossref","first-page":"245","DOI":"10.1023\/A:1007425814087","volume":"29","author":"Z Ghahramani","year":"1997","unstructured":"Ghahramani, Z., Jordan, M.I.: Factorial hidden Markov models. Mach. Learn. 29(2\/3), 245\u2013273 (1997)","journal-title":"Mach. Learn."},{"issue":"1","key":"12_CR14","doi-asserted-by":"crossref","first-page":"254","DOI":"10.1109\/TPWRS.2014.2327041","volume":"30","author":"Z Guo","year":"2015","unstructured":"Guo, Z., Wang, Z.J., Kashani, A.: Home appliance load modmodel from aggregated smart meter data. IEEE Trans. Power Syst. 30(1), 254\u2013262 (2015)","journal-title":"IEEE Trans. Power Syst."},{"issue":"12","key":"12_CR15","doi-asserted-by":"crossref","first-page":"1870","DOI":"10.1109\/5.192069","volume":"80","author":"G Hart","year":"1992","unstructured":"Hart, G.: Nonintrusive appliance load monitoring. Proc. IEEE 80(12), 1870\u20131891 (1992)","journal-title":"Proc. IEEE"},{"key":"12_CR16","doi-asserted-by":"crossref","unstructured":"Kalogridis, G., Denic, S.Z.: Data mining and privacy of personal behaviour types in smart grid. In: ICDMW 2011. IEEE (2011)","DOI":"10.1109\/ICDMW.2011.58"},{"key":"12_CR17","doi-asserted-by":"crossref","unstructured":"Kelly, J., Knottenbelt, W.: Neural NILM: deep neural networks applied to energy disaggregation. In: BuildSys 2015. ACM (2015)","DOI":"10.1145\/2821650.2821672"},{"key":"12_CR18","doi-asserted-by":"crossref","unstructured":"Kim, H., Marwah, M., Arlitt, M., Lyon, G., Han, J.: Unsupervised disaggregation of low frequency power measurements. In: SDM 2011, pp. 747\u2013758. SIAM (2011)","DOI":"10.1137\/1.9781611972818.64"},{"key":"12_CR19","doi-asserted-by":"crossref","unstructured":"Li, N., Li, T., Venkatasubramanian, S.: t-closeness: privacy beyond k-anonymity and l-diversity. In: ICDE 2007, pp. 106\u2013115. IEEE (2007)","DOI":"10.1109\/ICDE.2007.367856"},{"key":"12_CR20","doi-asserted-by":"crossref","unstructured":"Li, S., Khisti, A., Mahajan, A.: Privacy-optimal strategies for smart metering systems with a rechargeable battery. In: ACC 2016. IEEE (2016)","DOI":"10.1109\/ACC.2016.7525225"},{"key":"12_CR21","doi-asserted-by":"publisher","unstructured":"Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M.: L-diversity: privacy beyond k-anonymity. In: 22nd International Conference on Data Engineering, ICDE 2006, p. 24. IEEE (2006). doi: 10.1109\/icde.2006.1","DOI":"10.1109\/icde.2006.1"},{"key":"12_CR22","doi-asserted-by":"crossref","unstructured":"Parson, O., Ghosh, S., Weal, M., Rogers, A.: Non-intrusive load monitoring using prior models of general appliance types. In: AAAI 2012, pp. 356\u2013362 (2012)","DOI":"10.1609\/aaai.v26i1.8162"},{"key":"12_CR23","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.artint.2014.07.010","volume":"217","author":"O Parson","year":"2014","unstructured":"Parson, O., Ghosh, S., Weal, M., Rogers, A.: An unsupervised training method for non-intrusive appliance load monitoring. Artif. Intell. 217, 1\u201319 (2014)","journal-title":"Artif. Intell."},{"key":"12_CR24","unstructured":"Pillitteri, V.Y., Brewer, T.L.: Guidelines for smart grid cybersecurity. Internal Report NISTIR 7628 Revision 1, National Institute of Standards and Technology (2014)"},{"key":"12_CR25","doi-asserted-by":"crossref","unstructured":"du Pin Calmon, F., Fawaz, N.: Privacy against statistical inference. In: Allerton 2012. IEEE (2012)","DOI":"10.1109\/Allerton.2012.6483382"},{"key":"12_CR26","doi-asserted-by":"publisher","unstructured":"Quinn, E.L.: Smart metering and privacy: Existing laws and competing policies. SSRN Electron. J. (2009). doi: 10.2139\/ssrn.1462285","DOI":"10.2139\/ssrn.1462285"},{"key":"12_CR27","doi-asserted-by":"crossref","unstructured":"Rajagopalan, S.R., Sankar, L., Mohajer, S., Poor, H.V.: Smart meter privacy: a utility-privacy framework. In: SmartGridComm 2011. IEEE (2011)","DOI":"10.1109\/SmartGridComm.2011.6102315"},{"key":"12_CR28","doi-asserted-by":"crossref","unstructured":"Salamatian, S., Zhang, A., du Pin Calmon, F., Bhamidipati, S., Fawaz, N., Kveton, B., Oliveira, P., Taft, N.: Managing your private and public data: Bringing down inference attacks against your privacy. IEEE J. Sel. Top. Sig. Proces. 9(7), 1240\u20131255 (2015)","DOI":"10.1109\/JSTSP.2015.2442227"},{"issue":"6","key":"12_CR29","doi-asserted-by":"crossref","first-page":"1010","DOI":"10.1109\/69.971193","volume":"13","author":"P Samarati","year":"2001","unstructured":"Samarati, P.: Protecting respondents identities in microdata release. IEEE Trans. Knowl. Data Eng. 13(6), 1010\u20131027 (2001)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"12_CR30","unstructured":"Schneier, B.: Data and goliath: The hidden battles to collect your data and control your world. W. W. Norton & Company (2015)"},{"key":"12_CR31","doi-asserted-by":"crossref","unstructured":"Song, H., Kalogridis, G., Fan, Z.: Short paper: time-dependent power load disaggregation with applications to daily activity monitoring. In: WF-IoT 2014. IEEE (2014)","DOI":"10.1109\/WF-IoT.2014.6803150"},{"issue":"05","key":"12_CR32","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L.: k-anonymity: A model for protecting privacy. Int. J. Uncertainty Fuzziness Knowl. Based Syst. 10(05), 557\u2013570 (2002)","journal-title":"Int. J. Uncertainty Fuzziness Knowl. Based Syst."},{"issue":"7","key":"12_CR33","doi-asserted-by":"crossref","first-page":"1331","DOI":"10.1109\/JSAC.2013.130715","volume":"31","author":"O Tan","year":"2013","unstructured":"Tan, O., Gunduz, D., Poor, H.V.: Increasing smart meter privacy through energy harvesting and storage devices. IEEE J. Sel. Areas Commun. 31(7), 1331\u20131341 (2013)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"12_CR34","doi-asserted-by":"crossref","unstructured":"Xiao, X., Tao, Y.: m-invariance: towards privacy preserving re-publication of dynamic datasets. In: SIGMOD 2007, pp. 689\u2013700. ACM (2007)","DOI":"10.1145\/1247480.1247556"},{"issue":"1","key":"12_CR35","doi-asserted-by":"crossref","first-page":"486","DOI":"10.1109\/TSG.2014.2343611","volume":"6","author":"L Yang","year":"2015","unstructured":"Yang, L., Chen, X., Zhang, J., Poor, H.V.: Cost-effective and privacy-preserving energy management for smart meters. IEEE Trans. Smart Grid 6(1), 486\u2013495 (2015)","journal-title":"IEEE Trans. Smart Grid"},{"key":"12_CR36","doi-asserted-by":"crossref","unstructured":"Yang, W., Li, N., Qi, Y., Qardaji, W., McLaughlin, S., McDaniel, P.: Minimizing private data disclosures in the smart grid. In: ACM CCS 2012, pp. 415\u2013427. ACM (2012)","DOI":"10.1145\/2382196.2382242"},{"issue":"5","key":"12_CR37","doi-asserted-by":"crossref","first-page":"2417","DOI":"10.1109\/TSG.2015.2438035","volume":"6","author":"J Yao","year":"2015","unstructured":"Yao, J., Venkitasubramaniam, P.: The privacy analysis of battery control mechanisms in demand response: revealing state approach and rate distortion bounds. IEEE Trans. Smart Grid 6(5), 2417\u20132425 (2015)","journal-title":"IEEE Trans. Smart Grid"}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-59870-3_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,28]],"date-time":"2022-07-28T23:09:18Z","timestamp":1659049758000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-59870-3_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319598697","9783319598703"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-59870-3_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}