{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T22:45:24Z","timestamp":1743115524835,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":29,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819605750"},{"type":"electronic","value":"9789819605767"}],"license":[{"start":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T00:00:00Z","timestamp":1732665600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T00:00:00Z","timestamp":1732665600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-0576-7_6","type":"book-chapter","created":{"date-parts":[[2024,11,26]],"date-time":"2024-11-26T06:47:12Z","timestamp":1732603632000},"page":"74-83","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["FUD-LDP: Fully User Driven Local Differential Privacy"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4008-3843","authenticated-orcid":false,"given":"Gnanakumar","family":"Thedchanamoorthy","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5848-7451","authenticated-orcid":false,"given":"Michael","family":"Bewong","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0619-6361","authenticated-orcid":false,"given":"Meisam","family":"Mohammady","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3802-5687","authenticated-orcid":false,"given":"Tanveer","family":"Zia","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4868-4945","authenticated-orcid":false,"given":"Md Zahidul","family":"Islam","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,27]]},"reference":[{"key":"6_CR1","unstructured":"Where does google gets traffic data from? (2022). https:\/\/www.scienceabc.com\/ humans\/ travel-fatigue-why-does-traveling-tire-you-out.html"},{"key":"6_CR2","unstructured":"Barbaro, M., Zeller, T., Hansell, S.: A face is exposed for AOL searcher no. 4417749. New York Times 9(2008), 8 (2006)"},{"key":"6_CR3","doi-asserted-by":"crossref","unstructured":"Cormode, G., Jha, S., Kulkarni, T., Li, N., Srivastava, D., Wang, T.: Privacy at scale: local differential privacy in practice. In: Proceedings of the 2018 International Conference on Management of Data, pp. 1655\u20131658. Association for Computing Machinery, New York (2018)","DOI":"10.1145\/3183713.3197390"},{"key":"6_CR4","doi-asserted-by":"crossref","unstructured":"Cormode, G., Kulkarni, T., Srivastava, D.: Marginal release under local differential privacy. In: Proceedings of the 2018 International Conference on Management of Data, pp. 131\u2013146 (2018)","DOI":"10.1145\/3183713.3196906"},{"key":"6_CR5","unstructured":"Ding, B., Kulkarni, J., Yekhanin, S.: Collecting telemetry data privately. arXiv preprint arXiv:1712.01524 (2017)"},{"key":"6_CR6","doi-asserted-by":"publisher","unstructured":"Douriez, M., Doraiswamy, H., Freire, J., Silva, C.T.: Anonymizing nyc taxi data: does it matter? In: 2016 IEEE International Conference on Data Science and Advanced Analytics (DSAA), pp. 140\u2013148 (2016). https:\/\/doi.org\/10.1109\/DSAA.2016.21","DOI":"10.1109\/DSAA.2016.21"},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"Duchi, J.C., Jordan, M.I., Wainwright, M.J.: Local privacy and statistical minimax rates. In: 2013 IEEE 54th Annual Symposium on Foundations of Computer Science, pp. 429\u2013438. IEEE (2013)","DOI":"10.1109\/FOCS.2013.53"},{"key":"6_CR8","doi-asserted-by":"publisher","unstructured":"Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1\u201312. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11787006_1. https:\/\/www.microsoft.com\/en-us\/research\/publication\/differential-privacy\/","DOI":"10.1007\/11787006_1"},{"key":"6_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-79228-4_1","volume-title":"Theory and Applications of Models of Computation","author":"C Dwork","year":"2008","unstructured":"Dwork, C.: Differential privacy: a survey of results. In: Agrawal, M., Du, D., Duan, Z., Li, A. (eds.) TAMC 2008. LNCS, vol. 4978, pp. 1\u201319. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-79228-4_1"},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"Erlingsson, \u00da., Pihur, V., Korolova, A.: Rappor: randomized aggregatable privacy-preserving ordinal response. In: Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, AZ, USA, pp. 1054\u20131067. ACM (2014)","DOI":"10.1145\/2660267.2660348"},{"key":"6_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1007\/3-540-48298-9_41","volume-title":"DataWarehousing and Knowledge Discovery","author":"V Estivill-Castro","year":"1999","unstructured":"Estivill-Castro, V., Brankovic, L.: Data swapping: balancing privacy against precision in mining for logic rules. In: Mohania, M., Tjoa, A.M. (eds.) DaWaK 1999. LNCS, vol. 1676, pp. 389\u2013398. Springer, Heidelberg (1999). https:\/\/doi.org\/10.1007\/3-540-48298-9_41"},{"issue":"11","key":"6_CR12","first-page":"776","volume":"74","author":"M Harper","year":"2022","unstructured":"Harper, M.: Learnings from medibank: protecting your agms and company meetings against threats. Gov. Dir. 74(11), 776\u2013778 (2022)","journal-title":"Gov. Dir."},{"key":"6_CR13","unstructured":"Kairouz, P., Bonawitz, K., Ramage, D.: Discrete distribution estimation under local privacy. In: International Conference on Machine Learning, pp. 2436\u20132444. PMLR (2016)"},{"key":"6_CR14","first-page":"2879","volume":"27","author":"P Kairouz","year":"2014","unstructured":"Kairouz, P., Oh, S., Viswanath, P.: Extremal mechanisms for local differential privacy. Adv. Neural. Inf. Process. Syst. 27, 2879\u20132887 (2014)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"issue":"3","key":"6_CR15","doi-asserted-by":"publisher","first-page":"793","DOI":"10.1137\/090756090","volume":"40","author":"SP Kasiviswanathan","year":"2011","unstructured":"Kasiviswanathan, S.P., Lee, H.K., Nissim, K., Raskhodnikova, S., Smith, A.: What can we learn privately? SIAM J. Comput. 40(3), 793\u2013826 (2011)","journal-title":"SIAM J. Comput."},{"issue":"3","key":"6_CR16","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1515\/popets-2018-0022","volume":"2018","author":"T Murakami","year":"2018","unstructured":"Murakami, T., Hino, H., Sakuma, J.: Toward distribution estimation under local differential privacy with small samples. Proc. Priv. Enhancing Technol. 2018(3), 84\u2013104 (2018)","journal-title":"Proc. Priv. Enhancing Technol."},{"key":"6_CR17","unstructured":"Narayanan, A., Shmatikov, V.: How to break anonymity of the netflix prize dataset (2006)"},{"key":"6_CR18","doi-asserted-by":"crossref","unstructured":"Narayanan, A., Shmatikov, V.: Robust de-anonymization of large sparse datasets. In: 2008 IEEE Symposium on Security and Privacy (SP 2008), pp. 111\u2013125. IEEE (2008)","DOI":"10.1109\/SP.2008.33"},{"key":"6_CR19","doi-asserted-by":"crossref","unstructured":"Nugent, J.: Inaturalist. Sci. Scope 41(7), 12\u201313 (2018)","DOI":"10.2505\/4\/ss18_041_07_12"},{"key":"6_CR20","doi-asserted-by":"publisher","unstructured":"Qu, L., Yuan, W., Zheng, R., Cui, L., Shi, Y., Yin, H.: Towards personalized privacy: user-governed data contribution for federated recommendation. In: Proceedings of the ACM on Web Conference 2024, WWW 2024, pp. 3910\u20133918. Association for Computing Machinery, New York (2024). https:\/\/doi.org\/10.1145\/3589334.3645690","DOI":"10.1145\/3589334.3645690"},{"key":"6_CR21","unstructured":"Shah, P.G.: Optus data breach Australia year 2022\u2013case study. Aust. J. Wirel. Technol. Mobility Secur. 1 (2022)"},{"key":"6_CR22","doi-asserted-by":"crossref","unstructured":"Shen, Z., Xia, Z., Yu, P.: PLDP: personalized local differential privacy for multidimensional data aggregation. Secur. Commun. Netw. 2021 (2021)","DOI":"10.1155\/2021\/6684179"},{"issue":"05","key":"6_CR23","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L.: k-anonymity: a model for protecting privacy. Internat. J. Uncertain. Fuzziness Knowl.-Based Syst. 10(05), 557\u2013570 (2002)","journal-title":"Internat. J. Uncertain. Fuzziness Knowl.-Based Syst."},{"key":"6_CR24","unstructured":"Team, A., et al.: Learning with privacy at scale, vol. 1, pp. 1\u201325 (2017)"},{"key":"6_CR25","doi-asserted-by":"publisher","unstructured":"Thedchanamoorthy, G., Bewong, M., Mohammady, M., Zia, T., Islam, M.Z.: Optimization of UD-LDP with statistical prior knowledge. In: 2024 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops), pp. 25\u201330 (2024). https:\/\/doi.org\/10.1109\/PerComWorkshops59983.2024.10502758","DOI":"10.1109\/PerComWorkshops59983.2024.10502758"},{"key":"6_CR26","doi-asserted-by":"crossref","unstructured":"Thedchanamoorthy, G., Bewong, M., Mohammady, M., Zia, T.A., Islam, M.Z.: UD-LDP: a technique for optimally catalyzing user driven local differential privacy (2023). https:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=4619532","DOI":"10.2139\/ssrn.4629110"},{"issue":"1","key":"6_CR27","doi-asserted-by":"publisher","first-page":"38","DOI":"10.21924\/cst.4.1.2019.112","volume":"4","author":"F Trapsilawati","year":"2019","unstructured":"Trapsilawati, F., Wijayanto, T., Jourdy, E.S.: Human-computer trust in navigation systems: google maps vs waze. Commun. Sci. Technol. 4(1), 38\u201343 (2019)","journal-title":"Commun. Sci. Technol."},{"key":"6_CR28","unstructured":"Vadhan, S.: A primer on differential privacy"},{"issue":"309","key":"6_CR29","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1080\/01621459.1965.10480775","volume":"60","author":"SL Warner","year":"1965","unstructured":"Warner, S.L.: Randomized response: a survey technique for eliminating evasive answer bias. J. Am. Stat. Assoc. 60(309), 63\u201369 (1965)","journal-title":"J. Am. Stat. Assoc."}],"container-title":["Lecture Notes in Computer Science","Web Information Systems Engineering \u2013 WISE 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-0576-7_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,26]],"date-time":"2024-11-26T08:29:08Z","timestamp":1732609748000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-0576-7_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,27]]},"ISBN":["9789819605750","9789819605767"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-0576-7_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,11,27]]},"assertion":[{"value":"27 November 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WISE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Web Information Systems Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Doha","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Qatar","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"wise2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/wise2024-qatar.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}