{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:53:49Z","timestamp":1750308829898,"version":"3.41.0"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319600321"},{"type":"electronic","value":"9783319600338"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-60033-8_38","type":"book-chapter","created":{"date-parts":[[2017,5,26]],"date-time":"2017-05-26T16:18:42Z","timestamp":1495815522000},"page":"433-444","source":"Crossref","is-referenced-by-count":6,"title":["Differentially Private Frequent Itemset Mining from Smart Devices in Local Setting"],"prefix":"10.1007","author":[{"given":"Xinyuan","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Liusheng","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Peng","family":"Fang","sequence":"additional","affiliation":[]},{"given":"Shaowei","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Zhenyu","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Hongli","family":"Xu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,27]]},"reference":[{"key":"38_CR1","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1080\/01621459.1965.10480775","volume":"60","author":"SL Warner","year":"1965","unstructured":"Warner, S.L.: Randomized response: a survey technique for eliminating evasive. J. Am. Stat. Assoc. 60, 63\u201369 (1965)","journal-title":"J. Am. Stat. Assoc."},{"key":"38_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11787006_1","volume-title":"Automata, Languages and Programming","author":"C Dwork","year":"2006","unstructured":"Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1\u201312. Springer, Heidelberg (2006). doi: 10.1007\/11787006_1"},{"key":"38_CR3","doi-asserted-by":"crossref","unstructured":"Erlingsson, \u00da., Pihur, V., Korolova, A.: Rappor: randomized aggregatable privacy-preserving ordinal response. In: CCS. ACM (2014)","DOI":"10.1145\/2660267.2660348"},{"key":"38_CR4","doi-asserted-by":"crossref","unstructured":"Jorgensen, Z., Yu, T., Cormode, G.: Conservative or liberal personalized differential privacy. In: ICDE. IEEE (2015)","DOI":"10.1109\/ICDE.2015.7113353"},{"key":"38_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-79228-4_1","volume-title":"Theory and Applications of Models of Computation","author":"C Dwork","year":"2008","unstructured":"Dwork, C.: Differential privacy: a survey of results. In: Agrawal, M., Du, D., Duan, Z., Li, A. (eds.) TAMC 2008. LNCS, vol. 4978, pp. 1\u201319. Springer, Heidelberg (2008). doi: 10.1007\/978-3-540-79228-4_1"},{"key":"38_CR6","doi-asserted-by":"crossref","unstructured":"Prasad, K.S., Lee, H.K., Nissim, K., et al.: What can we learn privately? In: IEEE Symposium on Foundations of Computer Science 2008, pp. 531\u2013540 (2008)","DOI":"10.1109\/FOCS.2008.27"},{"key":"38_CR7","doi-asserted-by":"crossref","unstructured":"Wang, S., Huang, L., Tian, M., et al.: Personalized privacy-preserving data aggregation for histogram estimation. In: GLOBECOM. IEEE (2015)","DOI":"10.1109\/GLOCOM.2015.7417364"},{"key":"38_CR8","doi-asserted-by":"crossref","unstructured":"Aggarwal, C.C., Pei, J., Zhang, B.: On privacy preservation against adversarial data mining. In: KDD. ACM (2006)","DOI":"10.1145\/1150402.1150460"},{"key":"38_CR9","doi-asserted-by":"crossref","unstructured":"Kantarcioglu, M., Jin, J., Clifton, C.: When do data mining results violate privacy? In: KDD. ACM (2004)","DOI":"10.1145\/1014052.1014126"},{"key":"38_CR10","unstructured":"Kairouz, P., Bonawitz, K., Ramage, D.: Discrete distribution estimation under local privacy. In: ICML. IEEE (2016)"},{"key":"38_CR11","unstructured":"Kairouz, P., Oh, S., Viswanath, P.: Extremal mechanisms for local differential privacy. In: Advances in Neural Information Processing Systems, pp. 2879\u20132887 (2014)"},{"key":"38_CR12","doi-asserted-by":"crossref","unstructured":"Lee, J., Clifton, C., Christopher, W.: Top-k frequent itemsets via differential private FP-trees. In: SIGKDD. ACM (2014)","DOI":"10.1145\/2623330.2623723"},{"key":"38_CR13","doi-asserted-by":"crossref","unstructured":"Shi, E., Chan, T.H., Rieffel, E., Chow, R., Song, D.: On differentially private frequent itemset mining. In: VLDB 2012, pp. 25\u201336 (2012)","DOI":"10.14778\/2428536.2428539"},{"key":"38_CR14","doi-asserted-by":"crossref","unstructured":"Sun, C., Fu, Y., Zhou, J., Gao, H.: Personalized privacy-preserving frequent itemset mining using randomized response. Sci. World J. (2014)","DOI":"10.1155\/2014\/686151"},{"key":"38_CR15","doi-asserted-by":"crossref","unstructured":"Atzori, M., Bonchi, F., Giannotti, F., Pedreschi, D.: Anonymity preserving pattern discovery. In: VLDB 2008, pp. 703\u2013727 (2008)","DOI":"10.1007\/s00778-006-0034-x"}],"container-title":["Lecture Notes in Computer Science","Wireless Algorithms, Systems, and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-60033-8_38","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:31:43Z","timestamp":1750278703000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-60033-8_38"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319600321","9783319600338"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-60033-8_38","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}