{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T23:04:43Z","timestamp":1771023883895,"version":"3.50.1"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319598697","type":"print"},{"value":"9783319598703","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-59870-3_14","type":"book-chapter","created":{"date-parts":[[2017,5,30]],"date-time":"2017-05-30T02:14:17Z","timestamp":1496110457000},"page":"249-260","source":"Crossref","is-referenced-by-count":12,"title":["Computing Aggregates Over Numeric Data with Personalized Local Differential Privacy"],"prefix":"10.1007","author":[{"given":"Mousumi","family":"Akter","sequence":"first","affiliation":[]},{"given":"Tanzima","family":"Hashem","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,31]]},"reference":[{"key":"14_CR1","unstructured":"Ipums. Integrated public use microdata series: Version 6.0 (2015). \nhttps:\/\/www.ipums.org\/"},{"key":"14_CR2","doi-asserted-by":"publisher","unstructured":"Bassily, R., Smith, A.: Local, private, efficient protocols for succinct histograms. In: STOC, pp. 127\u2013135 (2015). doi:\n10.1145\/2746539.2746632","DOI":"10.1145\/2746539.2746632"},{"key":"14_CR3","doi-asserted-by":"publisher","unstructured":"Chen, R., Li, H., Qin, A., Kasiviswanathan, S.P., Jin, H.: Private spatial data aggregation in the local setting. In: ICDE, pp. 289\u2013300 (2016). doi:\n10.1109\/ICDE.2016.7498248","DOI":"10.1109\/ICDE.2016.7498248"},{"key":"14_CR4","doi-asserted-by":"publisher","unstructured":"Dinur, I., Nissim, K.: Revealing information while preserving privacy. In: PODS, pp. 202\u2013210 (2003). doi:\n10.1145\/773153.773173","DOI":"10.1145\/773153.773173"},{"key":"14_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11787006_1","volume-title":"Automata, Languages and Programming","author":"C Dwork","year":"2006","unstructured":"Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1\u201312. Springer, Heidelberg (2006). doi:\n10.1007\/11787006_1"},{"issue":"1","key":"14_CR6","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1145\/1866739.1866758","volume":"54","author":"C Dwork","year":"2011","unstructured":"Dwork, C.: A firm foundation for private data analysis. Commun. ACM 54(1), 86\u201395 (2011). doi:\n10.1145\/1866739.1866758","journal-title":"Commun. ACM"},{"key":"14_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/11681878_14","volume-title":"Theory of Cryptography","author":"C Dwork","year":"2006","unstructured":"Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 265\u2013284. Springer, Heidelberg (2006). doi:\n10.1007\/11681878_14"},{"key":"14_CR8","doi-asserted-by":"publisher","unstructured":"Dwork, C., Roth, A., et al.: The algorithmic foundations of differential privacy. Found. Trends\n            $$\\textregistered $$\n           Theor. Comput. Sci. 9(3\u20134), 211\u2013407 (2014). doi:\n10.1561\/0400000042","DOI":"10.1561\/0400000042"},{"key":"14_CR9","doi-asserted-by":"publisher","unstructured":"Erlingsson, \u00da., Pihur, V., Korolova, A.: Randomized aggregatable privacy-preserving ordinal response. In: CCS, pp. 1054\u20131067 (2014). doi:\n10.1145\/2660267.2660348","DOI":"10.1145\/2660267.2660348"},{"key":"14_CR10","doi-asserted-by":"crossref","unstructured":"Fanti, G.C., Pihur, V., Erlingsson, \u00da.: Building a RAPPOR with the unknown: privacy-preserving learning of associations and data dictionaries. In: PoPETs, vol. 3, pp. 41\u201361 (2016)","DOI":"10.1515\/popets-2016-0015"},{"key":"14_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"372","DOI":"10.1007\/978-3-540-74853-3_22","volume-title":"UbiComp 2007: Ubiquitous Computing","author":"T Hashem","year":"2007","unstructured":"Hashem, T., Kulik, L.: Safeguarding location privacy in wireless ad-hoc networks. In: Krumm, J., Abowd, G.D., Seneviratne, A., Strang, T. (eds.) UbiComp 2007. LNCS, vol. 4717, pp. 372\u2013390. Springer, Heidelberg (2007). doi:\n10.1007\/978-3-540-74853-3_22"},{"key":"14_CR12","doi-asserted-by":"publisher","unstructured":"Hashem, T., Kulik, L., Zhang, R.: Privacy preserving group nearest neighbor queries. In: EDBT, pp. 489\u2013500 (2010). doi:\n10.1145\/1739041.1739100","DOI":"10.1145\/1739041.1739100"},{"key":"14_CR13","doi-asserted-by":"publisher","unstructured":"Hashem, T., Hashem, T., Iqbal, A.: Ensuring feedback data privacy in the context of developing countries. In: ACM DEV, pp. 18:1\u201318:4 (2016). doi:\n10.1145\/3001913.3006627","DOI":"10.1145\/3001913.3006627"},{"key":"14_CR14","doi-asserted-by":"publisher","unstructured":"Jorgensen, Z., Yu, T., Cormode, G.: Conservative or liberal? Personalized differential privacy. In: ICDE, pp. 1023\u20131034 (2015). doi:\n10.1109\/ICDE.2015.7113353","DOI":"10.1109\/ICDE.2015.7113353"},{"key":"14_CR15","unstructured":"Nguy\u00ean, T.T., Xiao, X., Yang, Y., Hui, S.C., Shin, H., Shin, J.: Collecting and analyzing data from smart device users with local differential privacy. arXiv preprint (2016). \narXiv:160605053"},{"key":"14_CR16","doi-asserted-by":"publisher","unstructured":"Rastogi, V., Nath, S.: Differentially private aggregation of distributed time-series with transformation and encryption. In: Proceedings of the ACM SIGMOD International Conference on Management of Data (SIGMOD) (2010). doi:\n10.1145\/1807167.1807247","DOI":"10.1145\/1807167.1807247"},{"issue":"1","key":"14_CR17","first-page":"1","volume":"4","author":"R Sarathy","year":"2011","unstructured":"Sarathy, R., Muralidhar, K.: Evaluating laplace noise addition to satisfy differential privacy for numeric data. Trans. Data Priv. 4(1), 1\u201317 (2011)","journal-title":"Trans. Data Priv."},{"issue":"11","key":"14_CR18","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Commun. ACM 22(11), 612\u2013613 (1979)","journal-title":"Commun. ACM"},{"issue":"2","key":"14_CR19","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1007\/s11280-016-0384-2","volume":"20","author":"SC Soma","year":"2017","unstructured":"Soma, S.C., Hashem, T., Cheema, M.A., Samrose, S.: Trip planning queries with location privacy in spatial databases. World Wide Web 20(2), 205\u2013236 (2017)","journal-title":"World Wide Web"},{"key":"14_CR20","doi-asserted-by":"publisher","unstructured":"Sweeney, L.: Achieving k-anonymity privacy protection using generalization and suppression. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 10(5), 571\u2013588 (2002). doi:\n10.1142\/S021848850200165X","DOI":"10.1142\/S021848850200165X"}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-59870-3_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,5,30]],"date-time":"2017-05-30T02:19:37Z","timestamp":1496110777000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-59870-3_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319598697","9783319598703"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-59870-3_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]}}}