{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,22]],"date-time":"2025-03-22T04:03:20Z","timestamp":1742616200097,"version":"3.40.2"},"publisher-location":"Singapore","reference-count":32,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819637737","type":"print"},{"value":"9789819637744","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-3774-4_10","type":"book-chapter","created":{"date-parts":[[2025,3,21]],"date-time":"2025-03-21T04:54:39Z","timestamp":1742532879000},"page":"157-174","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Secure Aggregation of\u00a0Smartwatch Health Data with\u00a0LDP"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4896-2909","authenticated-orcid":false,"given":"Andres","family":"Hernandez-Matamoros","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0903-8430","authenticated-orcid":false,"given":"Hiroaki","family":"Kikuchi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,21]]},"reference":[{"key":"10_CR1","unstructured":"Kikuchi, H.: Castell: scalable joint probability estimation of multi-dimensional data randomized with local differential privacy. arXiv preprint (2022). https:\/\/arxiv.org\/abs\/2212.01627"},{"key":"10_CR2","unstructured":"Apple Differential Privacy Team. (2017). Learning with Privacy at Scale"},{"key":"10_CR3","unstructured":"Ding, B., Kulkarni, J., Yekhanin, S.: Collecting telemetry data privately (2017)"},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"Erlingsson, \u00da., Pihur, V., Korolova, A.: RAPPOR: randomized aggregatable privacy-preserving ordinal response (2014)","DOI":"10.1145\/2660267.2660348"},{"key":"10_CR5","unstructured":"European Union. General Data Protection Regulation (2016)"},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"Dwork, C., Roth, A.: The algorithmic foundations of differential privacy (2014)","DOI":"10.1561\/9781601988195"},{"key":"10_CR7","doi-asserted-by":"crossref","unstructured":"Fredrikson, M., Jha, S., Ristenpart, T.: Model inversion attacks that exploit confidence information and basic countermeasures (2014)","DOI":"10.1145\/2810103.2813677"},{"key":"10_CR8","unstructured":"Li, X., et al.: Digital health: tracking physiomes and activity using wearable biosensors reveals useful health-related information (2019)"},{"issue":"5","key":"10_CR9","first-page":"e105","volume":"18","author":"E Choi","year":"2016","unstructured":"Choi, E., Lee, S., Lee, Y.: Personal health records: a systematic review. J. Med. Internet Res. 18(5), e105 (2016)","journal-title":"J. Med. Internet Res."},{"issue":"6","key":"10_CR10","doi-asserted-by":"publisher","first-page":"e2316634","DOI":"10.1001\/jamanetworkopen.2023.16634","volume":"6","author":"LS Dhingra","year":"2023","unstructured":"Dhingra, L.S., Aminorroaya, A., Oikonomou, E.K., et al.: Use of wearable devices in individuals with or at risk for cardiovascular disease in the US, 2019 to 2020. JAMA Netw. Open 6(6), e2316634 (2023). https:\/\/doi.org\/10.1001\/jamanetworkopen.2023.16634","journal-title":"JAMA Netw. Open"},{"key":"10_CR11","doi-asserted-by":"crossref","unstructured":"Wang, T., Blocki, J., Li, N., Jha, S.: Locally differentially private protocols for frequency estimation. In: 26th Annual Network and Distributed System Security Symposium (NDSS 2019) (2019)","DOI":"10.14722\/ndss.2020.24157"},{"key":"10_CR12","doi-asserted-by":"publisher","first-page":"2151","DOI":"10.1109\/TIFS.2018.2812146","volume":"13","author":"X Ren","year":"2018","unstructured":"Ren, X., et al.: LoPub: high-dimensional crowdsourced data publication with local differential privacy. IEEE Trans. Inf. Forensics Secur. 13, 2151\u20132166 (2018). https:\/\/doi.org\/10.1109\/TIFS.2018.2812146","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10_CR13","doi-asserted-by":"crossref","unstructured":"Qin, Z., Yang, Y., Feng, W., Lei, X., Hu, S.: Heavy hitter estimation over set-valued data with local differential privacy. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 192\u2013203 (2016)","DOI":"10.1145\/2976749.2978409"},{"key":"10_CR14","doi-asserted-by":"publisher","first-page":"778","DOI":"10.1109\/TSC.2019.2961092","volume":"15","author":"T Wang","year":"2022","unstructured":"Wang, T., Yang, X., Ren, X., Yu, W., Yang, S.: Locally private high-dimensional crowdsourced data release based on copula functions. IEEE Trans. Serv. Comput. 15, 778\u2013792 (2022). https:\/\/doi.org\/10.1109\/TSC.2019.2961092","journal-title":"IEEE Trans. Serv. Comput."},{"key":"10_CR15","first-page":"1716","volume":"16","author":"M Kulkarni","year":"2021","unstructured":"Kulkarni, M., Li, C., Yang, Y.: Achieving information-theoretic local differential privacy with high utility. IEEE Trans. Inf. Forensics Secur. 16, 1716\u20131731 (2021)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"7","key":"10_CR16","doi-asserted-by":"publisher","first-page":"2864","DOI":"10.3390\/app14072864","volume":"14","author":"A Hernandez-Matamoros","year":"2024","unstructured":"Hernandez-Matamoros, A., Kikuchi, H.: Comparative analysis of local differential privacy schemes in healthcare datasets. Appl. Sci. 14(7), 2864 (2024). https:\/\/doi.org\/10.3390\/app14072864","journal-title":"Appl. Sci."},{"key":"10_CR17","first-page":"422","volume":"13","author":"BH Bloom","year":"1970","unstructured":"Bloom, B.H.: Space\/time trade-offs in hash coding with allowable errors. Assoc. Comput. Mach. 13, 422\u2013426 (1970)","journal-title":"Assoc. Comput. Mach."},{"key":"10_CR18","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1080\/01621459.1965.10480775","volume":"60","author":"SL Warner","year":"1965","unstructured":"Warner, S.L.: Randomized response: a survey technique for eliminating evasive answer bias. J. Am. Stat. Assoc. 60, 63\u201369 (1965)","journal-title":"J. Am. Stat. Assoc."},{"key":"10_CR19","doi-asserted-by":"crossref","unstructured":"Kasiviswanathan S.P., Lee, H.K., Nissim, K., Raskhodnikova, S., Smith, A.: What can we learn privately? In: Proceedings of the 49th Annual IEEE Symposium on Foundations of Computer Science, Philadelphia, PA, USA (2008)","DOI":"10.1109\/FOCS.2008.27"},{"key":"10_CR20","doi-asserted-by":"crossref","unstructured":"Zou, H., Hastie, T., Tibshirani, R.: On the \u201cdegrees of freedom\u201d of the LASSO. In: The Annals of Statistics, vol. 35. Institute of Mathematical Statistics, Hayward (2007)","DOI":"10.1214\/009053607000000127"},{"key":"10_CR21","doi-asserted-by":"publisher","first-page":"2741","DOI":"10.1007\/s00180-022-01213-8","volume":"37","author":"H Michimae","year":"2022","unstructured":"Michimae, H., Emura, T.: Bayesian ridge estimators based on copula-based joint prior distributions for regression coefficients. Comput. Stat. 37, 2741\u20132769 (2022)","journal-title":"Comput. Stat."},{"key":"10_CR22","doi-asserted-by":"publisher","first-page":"192","DOI":"10.3844\/jmssp.2014.192.200","volume":"10","author":"S Sutikno","year":"2014","unstructured":"Sutikno, S., Kuswanto, H., Ratih, I.: Gaussian Copula Marginal Regression for modeling extreme data with application. J. Math. Stat. 10, 192\u2013200 (2014). https:\/\/doi.org\/10.3844\/jmssp.2014.192.200","journal-title":"J. Math. Stat."},{"key":"10_CR23","doi-asserted-by":"crossref","unstructured":"Hernandez-Matamoros, A., Kikuchi, H.: Meaningful performance analysis on healthcare data under local differential privacy. In: New Trends in Intelligent Software Methodologies, Tools and Techniques 2024. IOS Press (2024)","DOI":"10.3233\/FAIA240387"},{"key":"10_CR24","doi-asserted-by":"publisher","unstructured":"Fuller, D.: Replication Data for: Using machine learning methods to predict physical activity types with Apple Watch and Fitbit data using indirect calorimetry as the criterion (2020). https:\/\/doi.org\/10.7910\/DVN\/ZS2Z2J, https:\/\/dataverse.harvard.edu\/dataset.xhtml?persistentId=doi%3A10.7910\/DVN\/ZS2Z2J","DOI":"10.7910\/DVN\/ZS2Z2J"},{"key":"10_CR25","unstructured":"Jarnoma, Data World. Activity Data from Garmin Devices (2021). https:\/\/data.world\/jarnoma\/activity-history\/workspace\/project-summary? agentid=jarnoma& atasetid=activity-history"},{"key":"10_CR26","doi-asserted-by":"publisher","unstructured":"Xue, J., Zhou, X., Grossklags, J.: Privacy-preserving highdimensional data collection with federated generative autoencoder. Proc. Priv. Enhanc. Technol. 481\u2013500 (2022). https:\/\/doi.org\/10.2478\/popets-2022-0024","DOI":"10.2478\/popets-2022-0024"},{"key":"10_CR27","doi-asserted-by":"publisher","unstructured":"Li, Z., Wang, B., Li, J., Hua, Y., Zhang, S.: Local differential privacy protection for wearable device data. PLOS ONE 17(8), e0272766 (2022). https:\/\/doi.org\/10.1371\/journal.pone.0272766","DOI":"10.1371\/journal.pone.0272766"},{"issue":"18","key":"10_CR28","doi-asserted-by":"publisher","first-page":"6396","DOI":"10.3390\/app10186396","volume":"10","author":"JW Kim","year":"2020","unstructured":"Kim, J.W., Moon, S.-M., Kang, S., Jang, B.: Effective privacy-preserving collection of health data from a user\u2019s wearable device. Appl. Sci. 10(18), 6396 (2020). https:\/\/doi.org\/10.3390\/app10186396","journal-title":"Appl. Sci."},{"key":"10_CR29","doi-asserted-by":"publisher","unstructured":"Marchioro, T., Kazlouski, A., Markatos, E.P.: Practical crowdsourcing of wearable IoT data with local differential privacy. In: Proceedings of the 8th ACM\/IEEE Conference on Internet of Things Design and Implementation (IoTDI 2023), pp. 275\u2013287. Association for Computing Machinery, New York (2023). https:\/\/doi.org\/10.1145\/3576842.3582367","DOI":"10.1145\/3576842.3582367"},{"key":"10_CR30","unstructured":"Ding, B., Kulkarni, J., Yekhanin, S.: Collecting telemetry data privately. In: NIPS, pp. 3574\u20133583 (2017)"},{"key":"10_CR31","doi-asserted-by":"crossref","unstructured":"Erlingsson, U., Feldman,V., Mironov, I., Raghunathan, A., Talwar, K., Thakurta, A.: Amplification by shuffling: from local to central differential privacy via anonymity. In: Annual ACM-SIAM Symposium on Discrete Algorithms, pp. 2468\u20132479. SIAM (2019)","DOI":"10.1137\/1.9781611975482.151"},{"issue":"11","key":"10_CR32","first-page":"2258","volume":"14","author":"E Bao","year":"2021","unstructured":"Bao, E., Yang, Y., Xiao, X., Ding, B.: CGM: an enhanced mechanism for streaming data collection with local differential privacy. PVLDB 14(11), 2258\u20132270 (2021)","journal-title":"PVLDB"}],"container-title":["Lecture Notes in Computer Science","Security and Privacy in Social Networks and Big Data"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-3774-4_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,21]],"date-time":"2025-03-21T04:54:57Z","timestamp":1742532897000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-3774-4_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819637737","9789819637744"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-3774-4_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"21 March 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SocialSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Security and Privacy in Social Networks and Big Data","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Abu Dhabi","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Arab Emirates","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 November 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 November 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"socialsec2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}