{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T20:08:21Z","timestamp":1743106101905,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":32,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819608492"},{"type":"electronic","value":"9789819608508"}],"license":[{"start":{"date-parts":[[2024,12,24]],"date-time":"2024-12-24T00:00:00Z","timestamp":1734998400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,24]],"date-time":"2024-12-24T00:00:00Z","timestamp":1734998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-0850-8_17","type":"book-chapter","created":{"date-parts":[[2024,12,23]],"date-time":"2024-12-23T04:40:12Z","timestamp":1734928812000},"page":"254-268","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Enhancing Privacy in\u00a0Big Data Publishing: $$\\eta $$-Inference Model"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0204-3533","authenticated-orcid":false,"given":"Zhenyu","family":"Chen","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8138-6045","authenticated-orcid":false,"given":"Lin","family":"yao","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3929-3598","authenticated-orcid":false,"given":"Guowei","family":"Wu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2892-1915","authenticated-orcid":false,"given":"Shisong","family":"Geng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,24]]},"reference":[{"key":"17_CR1","doi-asserted-by":"publisher","unstructured":"Bindschaedler, V., Shokri, R., Gunter, C.A.: Plausible deniability for privacy-preserving data synthesis. Proc. VLDB Endow. 10(5), 481\u2013492 (jan 2017). https:\/\/doi.org\/10.14778\/3055540.3055542","DOI":"10.14778\/3055540.3055542"},{"key":"17_CR2","unstructured":"Bun, M., Desfontaines, D., Dwork, C., Naor, M., Nissim, K., Roth, A., Smith, A., Steinke, T., Ullman, J., Vadhan, S.: Statistical inference is not a privacy violation. Differential-Privacy.org (06 2021), https:\/\/differentialprivacy.org\/inference-is-not-a-privacy-violation\/"},{"key":"17_CR3","doi-asserted-by":"publisher","unstructured":"Cai, K., Lei, X., Wei, J., Xiao, X.: Data synthesis via differentially private markov random fields. Proc. VLDB Endow. 14(11), 2190\u20132202 (jul 2021). https:\/\/doi.org\/10.14778\/3476249.3476272","DOI":"10.14778\/3476249.3476272"},{"key":"17_CR4","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1007\/978-3-642-39077-7_5","volume-title":"Privacy Enhancing Technologies","author":"K Chatzikokolakis","year":"2013","unstructured":"Chatzikokolakis, K., Andr\u00e9s, M.E., Bordenabe, N.E., Palamidessi, C.: Broadening the scope of differential privacy using metrics. In: De Cristofaro, E., Wright, M. (eds.) Privacy Enhancing Technologies, pp. 82\u2013102. Springer, Berlin Heidelberg, Berlin, Heidelberg (2013)"},{"key":"17_CR5","doi-asserted-by":"publisher","unstructured":"Duchi, J.C., Jordan, M.I., Wainwright, M.J.: Local privacy and statistical minimax rates. In: 2013 IEEE 54th Annual Symposium on Foundations of Computer Science. pp. 429\u2013438 (2013). https:\/\/doi.org\/10.1109\/FOCS.2013.53","DOI":"10.1109\/FOCS.2013.53"},{"key":"17_CR6","doi-asserted-by":"crossref","unstructured":"Dwork, C.: Differential privacy. In: International Colloquium on Automata, Languages, and Programming. pp. 1\u201312 (2006)","DOI":"10.1007\/11787006_1"},{"key":"17_CR7","doi-asserted-by":"publisher","first-page":"2110","DOI":"10.1109\/TIFS.2022.3177953","volume":"17","author":"E Ekenstedt","year":"2022","unstructured":"Ekenstedt, E., Ong, L., Liu, Y., Johnson, S., Yeoh, P.L., Kliewer, J.: When differential privacy implies syntactic privacy. IEEE Trans. Inf. Forensics Secur. 17, 2110\u20132124 (2022). https:\/\/doi.org\/10.1109\/TIFS.2022.3177953","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"17_CR8","doi-asserted-by":"publisher","unstructured":"He, X., Machanavajjhala, A., Ding, B.: Blowfish privacy: Tuning privacy-utility trade-offs using policies. In: Proceedings of the 2014 ACM SIGMOD International Conference on Management of Data. pp. 1447\u20131458. SIGMOD \u201914, Association for Computing Machinery, New York, NY, USA (2014). https:\/\/doi.org\/10.1145\/2588555.2588581","DOI":"10.1145\/2588555.2588581"},{"key":"17_CR9","doi-asserted-by":"publisher","unstructured":"Idrizi, E., Hamiti, M.: Classification of text, image and audio messages used for cyberbulling on social medias. In: 2023 46th MIPRO ICT and Electronics Convention (MIPRO). pp. 797\u2013802 (2023). https:\/\/doi.org\/10.23919\/MIPRO57284.2023.10159835","DOI":"10.23919\/MIPRO57284.2023.10159835"},{"issue":"3","key":"17_CR10","doi-asserted-by":"publisher","first-page":"1918","DOI":"10.1109\/TDSC.2020.3041733","volume":"19","author":"B Jiang","year":"2022","unstructured":"Jiang, B., Li, M., Tandon, R.: Local information privacy and its application to privacy-preserving data aggregation. IEEE Trans. Dependable Secure Comput. 19(3), 1918\u20131935 (2022). https:\/\/doi.org\/10.1109\/TDSC.2020.3041733","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"17_CR11","doi-asserted-by":"publisher","unstructured":"Jin, F., Hua, W., Francia, M., Chao, P., Orlowska, M., Zhou, X.: A survey and experimental study on privacy-preserving trajectory data publishing. IEEE Transactions on Knowledge and Data Engineering pp.\u00a01\u20131 (2022). https:\/\/doi.org\/10.1109\/TKDE.2022.3174204","DOI":"10.1109\/TKDE.2022.3174204"},{"key":"17_CR12","doi-asserted-by":"publisher","unstructured":"Kenny, C.T., Kuriwaki, S., McCartan, C., Rosenman, E.T.R., Simko, T., Imai, K.: The use of differential privacy for census data and its impact on redistricting: The case of the 2020 u.s. census. Science Advances 7(41), eabk3283 (2021). https:\/\/doi.org\/10.1126\/sciadv.abk3283","DOI":"10.1126\/sciadv.abk3283"},{"key":"17_CR13","doi-asserted-by":"publisher","unstructured":"Kifer, D., Machanavajjhala, A.: A rigorous and customizable framework for privacy. In: Proceedings of the 31st ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems. pp. 77\u201388. PODS \u201912, Association for Computing Machinery, New York, NY, USA (2012). https:\/\/doi.org\/10.1145\/2213556.2213571","DOI":"10.1145\/2213556.2213571"},{"key":"17_CR14","doi-asserted-by":"publisher","unstructured":"Li, N., Li, T., Venkatasubramanian, S.: t-closeness: Privacy beyond k-anonymity and l-diversity. In: 2007 IEEE 23rd International Conference on Data Engineering. pp. 106\u2013115 (2007). https:\/\/doi.org\/10.1109\/ICDE.2007.367856","DOI":"10.1109\/ICDE.2007.367856"},{"key":"17_CR15","doi-asserted-by":"publisher","unstructured":"Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: L-diversity: Privacy beyond k-anonymity. ACM Trans. Knowl. Discov. Data 1(1), 3\u2013es (mar 2007). https:\/\/doi.org\/10.1145\/1217299.1217302","DOI":"10.1145\/1217299.1217302"},{"key":"17_CR16","doi-asserted-by":"publisher","first-page":"8512","DOI":"10.1109\/ACCESS.2020.3045700","volume":"9","author":"A Majeed","year":"2021","unstructured":"Majeed, A., Lee, S.: Anonymization techniques for privacy preserving data publishing: A comprehensive survey. IEEE Access 9, 8512\u20138545 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2020.3045700","journal-title":"IEEE Access"},{"key":"17_CR17","doi-asserted-by":"publisher","unstructured":"McSherry, F., Talwar, K.: Mechanism design via differential privacy. In: 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS\u201907). pp. 94\u2013103 (2007). https:\/\/doi.org\/10.1109\/FOCS.2007.66","DOI":"10.1109\/FOCS.2007.66"},{"key":"17_CR18","doi-asserted-by":"publisher","unstructured":"Mironov, I.: R\u00e9nyi differential privacy. In: 2017 IEEE 30th Computer Security Foundations Symposium (CSF). pp. 263\u2013275 (2017). https:\/\/doi.org\/10.1109\/CSF.2017.11","DOI":"10.1109\/CSF.2017.11"},{"key":"17_CR19","unstructured":"Murakami, T., Kawamoto, Y.: Utility-Optimized local differential privacy mechanisms for distribution estimation. In: 28th USENIX Security Symposium (USENIX Security 19). pp. 1877\u20131894. USENIX Association, Santa Clara, CA (Aug 2019), https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/murakami"},{"key":"17_CR20","doi-asserted-by":"publisher","unstructured":"Nergiz, M.E., Atzori, M., Clifton, C.: Hiding the presence of individuals from shared databases. In: Proceedings of the 2007 ACM SIGMOD International Conference on Management of Data. pp. 665\u2013676. SIGMOD \u201907, Association for Computing Machinery, New York, NY, USA (2007). https:\/\/doi.org\/10.1145\/1247480.1247554","DOI":"10.1145\/1247480.1247554"},{"key":"17_CR21","doi-asserted-by":"publisher","unstructured":"du\u00a0Pin\u00a0Calmon, F., Fawaz, N.: Privacy against statistical inference. In: 2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton). pp. 1401\u20131408 (2012). https:\/\/doi.org\/10.1109\/Allerton.2012.6483382","DOI":"10.1109\/Allerton.2012.6483382"},{"key":"17_CR22","unstructured":"Rastogi, V., Suciu, D., Hong, S.: The boundary between privacy and utility in data publishing. In: Proceedings of the 33rd International Conference on Very Large Data Bases. pp. 531\u2013542. VLDB \u201907, VLDB Endowment (2007)"},{"key":"17_CR23","doi-asserted-by":"publisher","unstructured":"Sweeney, L.: K-anonymity: A model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl.-Based Syst. 10(5), 557\u2013570 (oct 2002). https:\/\/doi.org\/10.1142\/S0218488502001648","DOI":"10.1142\/S0218488502001648"},{"key":"17_CR24","doi-asserted-by":"publisher","unstructured":"Takagi, S., Takahashi, T., Cao, Y., Yoshikawa, M.: P3gm: Private high-dimensional data release via privacy preserving phased generative model. In: 2021 IEEE 37th International Conference on Data Engineering (ICDE). pp. 169\u2013180 (2021). https:\/\/doi.org\/10.1109\/ICDE51399.2021.00022","DOI":"10.1109\/ICDE51399.2021.00022"},{"key":"17_CR25","doi-asserted-by":"publisher","unstructured":"Wong, R.C.W., Li, J., Fu, A.W.C., Wang, K.: ($$\\alpha $$, k)-anonymity: An enhanced k-anonymity model for privacy preserving data publishing. In: Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. pp. 754\u2013759. Association for Computing Machinery, New York, NY, USA (2006). https:\/\/doi.org\/10.1145\/1150402.1150499","DOI":"10.1145\/1150402.1150499"},{"issue":"12","key":"17_CR26","doi-asserted-by":"publisher","first-page":"3081","DOI":"10.1109\/TIFS.2017.2737966","volume":"12","author":"C Xu","year":"2017","unstructured":"Xu, C., Ren, J., Zhang, Y., Qin, Z., Ren, K.: Dppro: Differentially private high-dimensional data release via random projection. IEEE Trans. Inf. Forensics Secur. 12(12), 3081\u20133093 (2017). https:\/\/doi.org\/10.1109\/TIFS.2017.2737966","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"17_CR27","doi-asserted-by":"publisher","unstructured":"Yang, B., Sato, I., Nakagawa, H.: Bayesian differential privacy on correlated data. In: Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data. p. 747\u2013762. SIGMOD \u201915, Association for Computing Machinery, New York, NY, USA (2015). https:\/\/doi.org\/10.1145\/2723372.2747643","DOI":"10.1145\/2723372.2747643"},{"issue":"4","key":"17_CR28","doi-asserted-by":"publisher","first-page":"729","DOI":"10.1109\/TBDATA.2017.2715334","volume":"7","author":"X Yang","year":"2021","unstructured":"Yang, X., Wang, T., Ren, X., Yu, W.: Survey on improving data utility in differentially private sequential data publishing. IEEE Transactions on Big Data 7(4), 729\u2013749 (2021). https:\/\/doi.org\/10.1109\/TBDATA.2017.2715334","journal-title":"IEEE Transactions on Big Data"},{"key":"17_CR29","doi-asserted-by":"publisher","unstructured":"Yao, L., Wang, X., Hu, H., Wu, G.: A utility-aware anonymization model for multiple sensitive attributes based on association concealment. IEEE Transactions on Dependable and Secure Computing pp. 1\u201312 (2023). https:\/\/doi.org\/10.1109\/TDSC.2023.3299641","DOI":"10.1109\/TDSC.2023.3299641"},{"key":"17_CR30","doi-asserted-by":"publisher","unstructured":"Zhang, M., Li, X., Ren, Y., Luo, B., Miao, Y., Liu, X., Deng, R.H.: Privacy-preserved data trading via verifiable data disturbance. IEEE Transactions on Dependable and Secure Computing pp. 1\u201314 (2023). https:\/\/doi.org\/10.1109\/TDSC.2023.3323669","DOI":"10.1109\/TDSC.2023.3323669"},{"key":"17_CR31","unstructured":"Zhang, Z., Wang, T., Li, N., Honorio, J., Backes, M., He, S., Chen, J., Zhang, Y.: PrivSyn: Differentially private data synthesis. In: 30th USENIX Security Symposium (USENIX Security 21). pp. 929\u2013946. USENIX Association (Aug 2021), https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/zhang-zhikun"},{"issue":"8","key":"17_CR32","doi-asserted-by":"publisher","first-page":"1619","DOI":"10.1109\/TKDE.2017.2697856","volume":"29","author":"T Zhu","year":"2017","unstructured":"Zhu, T., Li, G., Zhou, W., Yu, P.S.: Differentially private data publishing and analysis: A survey. IEEE Trans. Knowl. Data Eng. 29(8), 1619\u20131638 (2017). https:\/\/doi.org\/10.1109\/TKDE.2017.2697856","journal-title":"IEEE Trans. Knowl. Data Eng."}],"container-title":["Lecture Notes in Computer Science","Advanced Data Mining and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-0850-8_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,23]],"date-time":"2024-12-23T05:06:17Z","timestamp":1734930377000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-0850-8_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,24]]},"ISBN":["9789819608492","9789819608508"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-0850-8_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,12,24]]},"assertion":[{"value":"24 December 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ADMA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Data Mining and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sydney, NSW","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"adma2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/adma2024.github.io\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}