{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T15:44:10Z","timestamp":1743003850307,"version":"3.40.3"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319938028"},{"type":"electronic","value":"9783319938035"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-93803-5_47","type":"book-chapter","created":{"date-parts":[[2018,6,9]],"date-time":"2018-06-09T18:33:58Z","timestamp":1528569238000},"page":"503-512","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Multi-question Negative Surveys"],"prefix":"10.1007","author":[{"given":"Hao","family":"Jiang","sequence":"first","affiliation":[]},{"given":"Wenjiang","family":"Luo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,6,10]]},"reference":[{"issue":"5","key":"47_CR1","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertainty Fuzziness Knowl. Based Syst. 10(5), 557\u2013570 (2002)","journal-title":"Int. J. Uncertainty Fuzziness Knowl. Based Syst."},{"issue":"1","key":"47_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1217299.1217302","volume":"1","author":"A Machanavajjhala","year":"2007","unstructured":"Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: L-diversity: privacy beyond k-anonymity. ACM Trans. Knowl. Discov. Data 1(1), 1\u201352 (2007)","journal-title":"ACM Trans. Knowl. Discov. Data"},{"key":"47_CR3","doi-asserted-by":"crossref","unstructured":"Li, N., Li, T., Venkatasubramanian, S.: t-closeness: privacy beyond k-anonymity and l-diversity. In: Proceedings of the 23rd International Conference on Data Engineering, pp. 106\u2013115. IEEE, Istanbul (2007)","DOI":"10.1109\/ICDE.2007.367856"},{"issue":"1","key":"47_CR4","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1109\/TDSC.2015.2507133","volume":"15","author":"D Zhao","year":"2018","unstructured":"Zhao, D., Luo, W., Liu, R., Yue, L.: Negative iris recognition. IEEE Trans. Dependable Secure Comput. 15(1), 112\u2013125 (2018)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"5","key":"47_CR5","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1007\/s10207-009-0078-1","volume":"8","author":"F Esponda","year":"2009","unstructured":"Esponda, F., Forrest, S., Helman, P.: Negative representations of information. Int. J. Inf. Secur. 8(5), 331\u2013345 (2009)","journal-title":"Int. J. Inf. Secur."},{"key":"47_CR6","unstructured":"Esponda, F.: Negative surveys. arXiv preprint math\/0608176 (2006)"},{"issue":"24","key":"47_CR7","doi-asserted-by":"publisher","first-page":"2456","DOI":"10.1016\/j.spl.2009.08.019","volume":"79","author":"F Esponda","year":"2009","unstructured":"Esponda, F., Guerrero, V.M.: Surveys with negative questions for sensitive items. Stat. Probab. Lett. 79(24), 2456\u20132461 (2009)","journal-title":"Stat. Probab. Lett."},{"key":"47_CR8","doi-asserted-by":"crossref","unstructured":"Groat, M.M., Edwards, B., Horey, J., He, W., Forrest, S.: Enhancing privacy in participatory sensing applications with multidimensional data. In: Proceedings of the 2012 IEEE International Conference on Pervasive Computing and Communications, pp. 144\u2013152. IEEE, Lugano (2012)","DOI":"10.1109\/PerCom.2012.6199861"},{"issue":"2","key":"47_CR9","doi-asserted-by":"publisher","first-page":"551","DOI":"10.1016\/j.spl.2012.10.032","volume":"83","author":"Y Bao","year":"2013","unstructured":"Bao, Y., Luo, W., Zhang, X.: Estimating positive surveys from negative surveys. Stat. Probab. Lett. 83(2), 551\u2013558 (2013)","journal-title":"Stat. Probab. Lett."},{"key":"47_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1007\/978-3-319-40973-3_9","volume-title":"Data Mining and Big Data","author":"D Zhao","year":"2016","unstructured":"Zhao, D., Luo, W., Yue, L.: Reconstructing positive surveys from negative surveys with background knowledge. In: Tan, Y., Shi, Y. (eds.) DMBD 2016. LNCS, vol. 9714, pp. 86\u201399. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-40973-3_9"},{"issue":"4","key":"47_CR11","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1109\/TETCI.2017.2721440","volume":"1","author":"H Jiang","year":"2017","unstructured":"Jiang, H., Luo, W., Ni, L., Hua, B.: On the reconstruction method for negative surveys with application to education surveys. IEEE Trans. Emerg. Top. Comput. Intell. 1(4), 259\u2013269 (2017)","journal-title":"IEEE Trans. Emerg. Top. Comput. Intell."},{"issue":"6","key":"47_CR12","doi-asserted-by":"publisher","first-page":"576","DOI":"10.1016\/j.datak.2011.03.007","volume":"70","author":"H Xie","year":"2011","unstructured":"Xie, H., Kulik, L., Tanin, E.: Privacy-aware collection of aggregate spatial data. Data Knowl. Eng. 70(6), 576\u2013595 (2011)","journal-title":"Data Knowl. Eng."},{"key":"47_CR13","doi-asserted-by":"crossref","unstructured":"Aoki, S., Iwai, M., Sezaki, K.: Limited negative surveys: privacy-preserving participatory sensing. In: Proceeding of 2012 IEEE 1st International Conference on Cloud Networking, pp. 158\u2013160. IEEE, Paris (2012)","DOI":"10.1109\/CloudNet.2012.6483674"},{"key":"47_CR14","doi-asserted-by":"crossref","unstructured":"Horey, J., Forrest, S., Groat, M.: Reconstructing spatial distributions from anonymized locations. In: Proceedings of the 2012 IEEE 28th International Conference on Data Engineering Workshops, pp. 243\u2013250. IEEE, Arlington (2012)","DOI":"10.1109\/ICDEW.2012.82"},{"key":"47_CR15","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1016\/j.spl.2014.02.011","volume":"89","author":"Y Bao","year":"2014","unstructured":"Bao, Y., Luo, W., Lu, Y.: On the dependable level of the negative survey. Stat. Probab. Lett. 89, 31\u201340 (2014)","journal-title":"Stat. Probab. Lett."},{"issue":"2","key":"47_CR16","first-page":"1","volume":"2","author":"X Du","year":"2014","unstructured":"Du, X., Luo, W., Zhao, D.: Negative publication of data. Int. J. Immune Comput. 2(2), 1\u201314 (2014)","journal-title":"Int. J. Immune Comput."},{"key":"47_CR17","doi-asserted-by":"crossref","unstructured":"Wu, L., Luo, W., Zhao, D.: SvdNPD: a negative data publication method based on the sensitive value distribution. In: Proceedings of the 2015 International Workshop on Artificial Immune Systems, pp. 1\u20139. IEEE, Taormina (2015)","DOI":"10.1109\/AISW.2015.7469246"},{"key":"47_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/978-3-319-20472-7_17","volume-title":"Advances in Swarm and Computational Intelligence","author":"R Liu","year":"2015","unstructured":"Liu, R., Tang, S.: Negative survey-based privacy protection of cloud data. In: Tan, Y., Shi, Y., Buarque, F., Gelbukh, A., Das, S., Engelbrecht, A. (eds.) ICSI 2015. LNCS, vol. 9141, pp. 151\u2013159. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-20472-7_17"},{"issue":"1","key":"47_CR19","doi-asserted-by":"publisher","first-page":"e0147314","DOI":"10.1371\/journal.pone.0147314","volume":"11","author":"F Esponda","year":"2016","unstructured":"Esponda, F., Huerta, K., Guerrero, V.M.: A statistical approach to provide individualized privacy for surveys. PLoS ONE 11(1), e0147314 (2016)","journal-title":"PLoS ONE"},{"issue":"2","key":"47_CR20","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1109\/TETCI.2017.2669089","volume":"1","author":"W Luo","year":"2017","unstructured":"Luo, W., Lu, Y., Zhao, D., Jiang, H.: On location and trace privacy of the moving object using the negative survey. IEEE Trans. Emerg. Top. Comput. Intell. 1(2), 125\u2013134 (2017)","journal-title":"IEEE Trans. Emerg. Top. Comput. Intell."},{"key":"47_CR21","doi-asserted-by":"publisher","first-page":"350","DOI":"10.1016\/j.engappai.2016.06.002","volume":"62","author":"R Liu","year":"2017","unstructured":"Liu, R., Peng, J., Tang, S.: Multiple-negative survey method for enhancing the accuracy of negative survey-based cloud data privacy: applications and extensions. Eng. Appl. Artif. Intell. 62, 350\u2013358 (2017)","journal-title":"Eng. Appl. Artif. Intell."},{"issue":"5","key":"47_CR22","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1109\/TETCI.2017.2669083","volume":"1","author":"W Luo","year":"2017","unstructured":"Luo, W., Jiang, H., Zhao, D.: Rating credits of online merchants using negative ranks. IEEE Trans. Emerg. Top. Comput. Intell. 1(5), 354\u2013365 (2017)","journal-title":"IEEE Trans. Emerg. Top. Comput. Intell."},{"key":"47_CR23","doi-asserted-by":"publisher","unstructured":"Jiang, H., Luo, W., Zhao, D.: A novel negative location collection method for finding aggregated locations. IEEE Trans. Intell. Transp. Syst. (2017). https:\/\/doi.org\/10.1109\/TITS.2017.2735543","DOI":"10.1109\/TITS.2017.2735543"},{"key":"47_CR24","doi-asserted-by":"crossref","unstructured":"Horey, J., Groat, M.M., Forrest, S., Esponda, F.: Anonymous data collection in sensor networks. In: Proceedings of the Fourth Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, pp. 1\u20138. IEEE, Philadelphia (2007)","DOI":"10.1109\/MOBIQ.2007.4451016"},{"issue":"3","key":"47_CR25","doi-asserted-by":"publisher","first-page":"372","DOI":"10.1016\/j.pmcj.2012.12.004","volume":"9","author":"MM Groat","year":"2013","unstructured":"Groat, M.M., Edwards, B., Horey, J., He, W., Forrest, S.: Application and analysis of multidimensional negative surveys in participatory sensing applications. Pervasive Mob. Comput. 9(3), 372\u2013391 (2013)","journal-title":"Pervasive Mob. Comput."},{"issue":"2","key":"47_CR26","doi-asserted-by":"publisher","first-page":"183","DOI":"10.2140\/pjm.1955.5.183","volume":"5","author":"GB Dantzig","year":"1955","unstructured":"Dantzig, G.B., Orden, A., Wolfe, P., et al.: The generalized simplex method for minimizing a linear form under linear inequality restraints. Pac. J. Math. 5(2), 183\u2013195 (1955)","journal-title":"Pac. J. Math."},{"issue":"4","key":"47_CR27","doi-asserted-by":"publisher","first-page":"575","DOI":"10.1137\/0802028","volume":"2","author":"S Mehrotra","year":"1992","unstructured":"Mehrotra, S.: On the implementation of a primal-dual interior point method. SIAM J. Optim. 2(4), 575\u2013601 (1992)","journal-title":"SIAM J. Optim."},{"issue":"1","key":"47_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/10556789808805699","volume":"10","author":"Y Zhang","year":"1998","unstructured":"Zhang, Y.: Solving large-scale linear programs by interior-point methods under the MATLAB environment. Optim. Methods Softw. 10(1), 1\u201331 (1998)","journal-title":"Optim. Methods Softw."}],"container-title":["Lecture Notes in Computer Science","Data Mining and Big Data"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-93803-5_47","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T15:27:26Z","timestamp":1709825246000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-93803-5_47"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319938028","9783319938035"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-93803-5_47","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"10 June 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DMBD","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Data Mining and Big Data","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Shanghai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 June 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 June 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dmbd2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.guide2research.com\/conference\/dmbd-2018","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}