{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T19:36:10Z","timestamp":1725910570819},"publisher-location":"Singapore","reference-count":9,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811063848"},{"type":"electronic","value":"9789811063855"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-981-10-6385-5_18","type":"book-chapter","created":{"date-parts":[[2017,9,15]],"date-time":"2017-09-15T10:03:52Z","timestamp":1505469832000},"page":"207-219","source":"Crossref","is-referenced-by-count":2,"title":["Composite Graph Publication Considering Important Data"],"prefix":"10.1007","author":[{"given":"Yuqing","family":"Sun","sequence":"first","affiliation":[]},{"given":"Hongbin","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Qilong","family":"Han","sequence":"additional","affiliation":[]},{"given":"Lijie","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,9,16]]},"reference":[{"key":"18_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1007\/978-3-642-15546-8_11","volume-title":"Secure Data Management","author":"Y Xiao","year":"2010","unstructured":"Xiao, Y., Xiong, L., Yuan, C.: Differentially private data release through multidimensional partitioning. In: Jonker, W., Petkovi\u0107, M. (eds.) SDM 2010. LNCS, vol. 6358, pp. 150\u2013168. Springer, Heidelberg (2010). doi: 10.1007\/978-3-642-15546-8_11"},{"key":"18_CR2","doi-asserted-by":"crossref","unstructured":"Cormode, G., Procopiuc, C., Srivastava, D., Shen, E., Yu, T.: Differentially private spatial decompositions. In: 2012 IEEE 28th International Conference on Data Engineering, pp. 20\u201331. IEEE Computer Society, Virginia (2011)","DOI":"10.1109\/ICDE.2012.16"},{"issue":"1\u20132","key":"18_CR3","doi-asserted-by":"crossref","first-page":"1021","DOI":"10.14778\/1920841.1920970","volume":"3","author":"M Hay","year":"2010","unstructured":"Hay, M., Rastogi, V., Miklau, G., et al.: Boosting the accuracy of differentially private histograms through consistency. J. Proc. Vldb Endow. 3(1\u20132), 1021\u20131032 (2010)","journal-title":"J. Proc. Vldb Endow."},{"key":"18_CR4","doi-asserted-by":"crossref","unstructured":"Qardaji, W., Li, N.: Recursive partitioning and summarization: a practical framework for differentially private data publishing. In: ACM Symposium on Information, Computer and Communications Security, pp. 38\u201339. ACM, Raleigh (2012)","DOI":"10.1145\/2414456.2414477"},{"issue":"8","key":"18_CR5","doi-asserted-by":"crossref","first-page":"1200","DOI":"10.1109\/TKDE.2010.247","volume":"23","author":"X Xiao","year":"2010","unstructured":"Xiao, X., Wang, G., Gehrke, J.: Differential privacy via wavelet transforms. IEEE Trans. J. Knowl. Data Eng. 23(8), 1200\u20131214 (2010)","journal-title":"IEEE Trans. J. Knowl. Data Eng."},{"key":"18_CR6","doi-asserted-by":"crossref","unstructured":"Zhang, J., Xiao, X., Xie, X.: PrivTree: a differentially private algorithm for hierarchical decompositions. In: Proceedings of the ACM SIGMOD International Conference on Management of Data, pp. 155\u2013170. ACM, San Francisco (2016)","DOI":"10.1145\/2882903.2882928"},{"issue":"4","key":"18_CR7","doi-asserted-by":"crossref","first-page":"653","DOI":"10.1007\/s00778-013-0344-8","volume":"23","author":"R Chen","year":"2014","unstructured":"Chen, R., Fung, B.C., Yu, P.S.: Correlated network data publication via differential privacy. VLDB J. 23(4), 653\u2013676 (2014)","journal-title":"VLDB J."},{"issue":"1","key":"18_CR8","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1145\/1866739.1866758","volume":"54","author":"C Dwork","year":"2011","unstructured":"Dwork, C.: A firm foundation for private data analysis. Commun. ACM 54(1), 86\u201395 (2011)","journal-title":"Commun. ACM"},{"key":"18_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/11681878_14","volume-title":"Theory of Cryptography","author":"C Dwork","year":"2006","unstructured":"Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 265\u2013284. Springer, Heidelberg (2006). doi: 10.1007\/11681878_14"}],"container-title":["Communications in Computer and Information Science","Data Science"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-6385-5_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,3]],"date-time":"2019-10-03T10:49:28Z","timestamp":1570099768000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-6385-5_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9789811063848","9789811063855"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-6385-5_18","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2017]]}}}