{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:51:13Z","timestamp":1742914273334,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":16,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819756056"},{"type":"electronic","value":"9789819756063"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-97-5606-3_18","type":"book-chapter","created":{"date-parts":[[2024,7,29]],"date-time":"2024-07-29T09:03:33Z","timestamp":1722243813000},"page":"208-219","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A High-Dimensional Data Trust Publishing Method Based on Attention Mechanism and Differential Privacy"],"prefix":"10.1007","author":[{"given":"Taiqiang","family":"Li","sequence":"first","affiliation":[]},{"given":"Zhen","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Heng","family":"Qian","sequence":"additional","affiliation":[]},{"given":"Qiuyue","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Guanqun","family":"Su","sequence":"additional","affiliation":[]},{"given":"Lingzhen","family":"Meng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,7,30]]},"reference":[{"issue":"17","key":"18_CR1","doi-asserted-by":"publisher","first-page":"16080","DOI":"10.1109\/JIOT.2022.3153043","volume":"9","author":"HY Tran","year":"2022","unstructured":"Tran, H.Y., Hu, J., Pota, H.R.: Smart meter data obfuscation with a hybrid privacy-preserving data publishing scheme without a trusted third party. IEEE Internet Things J. 9(17), 16080\u201316095 (2022)","journal-title":"IEEE Internet Things J."},{"issue":"4","key":"18_CR2","first-page":"1423","volume":"34","author":"BB Mehta","year":"2022","unstructured":"Mehta, B.B., Rao, U.P.: Improved l-diversity: scalable anonymization approach for privacy preserving big data publishing. J. King Saud Univ.-Comput. Inform. Sci. 34(4), 1423\u20131430 (2022)","journal-title":"J. King Saud Univ.-Comput. Inform. Sci."},{"key":"18_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.122343","volume":"239","author":"J Qian","year":"2024","unstructured":"Qian, J., Jiang, H., Yu, Y., Wang, H., Miao, D.: Multi-level personalized k-anonymity privacy-preserving model based on sequential three-way decisions. Expert Syst. Appl. 239, 122343 (2024)","journal-title":"Expert Syst. Appl."},{"issue":"8","key":"18_CR4","first-page":"1941","volume":"39","author":"GM Yang","year":"2011","unstructured":"Yang, G.M., Yang, J., Zhang, J.P.: Achieving (alpha, k)-anonymity via clustering in data publishing. Dianzi Xuebao (Acta Electronica Sinica) 39(8), 1941\u20131946 (2011)","journal-title":"Dianzi Xuebao (Acta Electronica Sinica)"},{"issue":"10s","key":"18_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3490237","volume":"54","author":"Y Zhao","year":"2022","unstructured":"Zhao, Y., Chen, J.: A survey on differential privacy for unstructured data content. ACM Comput. Surv. 54(10s), 1\u201328 (2022)","journal-title":"ACM Comput. Surv."},{"key":"18_CR6","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1146\/annurev-statistics-040720-031848","volume":"8","author":"TE Raghunathan","year":"2021","unstructured":"Raghunathan, T.E.: Synthetic data. Ann. Rev. Stat. Appl. 8, 129\u2013140 (2021)","journal-title":"Ann. Rev. Stat. Appl."},{"key":"18_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2022.110239","volume":"264","author":"M Li","year":"2023","unstructured":"Li, M., Zhuang, D., Chang, J.M.: Mc-gen: multi-level clustering for private synthetic data generation. Knowl.-Based Syst. 264, 110239 (2023)","journal-title":"Knowl.-Based Syst."},{"key":"18_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/j.compbiomed.2022.106145","volume":"150","author":"J Liao","year":"2022","unstructured":"Liao, J., Chen, H., Wei, L., Wei, L.: GSAML-DTA: an interpretable drug-target binding affinity prediction model based on graph neural networks with self-attention mechanism and mutual information. Comput. Biol. Med. 150, 106145 (2022)","journal-title":"Comput. Biol. Med."},{"key":"18_CR9","doi-asserted-by":"crossref","unstructured":"Chen, R., Xiao, Q., Zhang, Y., Xu, J.: Differentially private high-dimensional data publication via sampling-based inference. In: Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 129\u2013138 (2015)","DOI":"10.1145\/2783258.2783379"},{"issue":"4","key":"18_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3134428","volume":"42","author":"J Zhang","year":"2017","unstructured":"Zhang, J., Cormode, G., Procopiuc, C.M., Srivastava, D., Xiao, X.: Privbayes: private data release via bayesian networks. ACM Trans. Database Syst. 42(4), 1\u201341 (2017)","journal-title":"ACM Trans. Database Syst."},{"key":"18_CR11","doi-asserted-by":"crossref","unstructured":"Shahmiri, A.M., Ling, C.W., Li, C.T.: Communication-efficient laplace mechanism for differential privacy via random quantization. In: ICASSP 2024\u20132024 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 4550\u20134554. IEEE (2024)","DOI":"10.1109\/ICASSP48485.2024.10446221"},{"issue":"1","key":"18_CR12","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/s44196-024-00422-x","volume":"17","author":"Q Ju","year":"2024","unstructured":"Ju, Q., Xia, R., Li, S., Zhang, X.: Privacy-preserving classification on deep learning with exponential mechanism. Int. J. Comput. Intell. Syst. 17(1), 39 (2024)","journal-title":"Int. J. Comput. Intell. Syst."},{"key":"18_CR13","doi-asserted-by":"crossref","unstructured":"Zhou, T., Pan, R., Zhang, J., Wang, H.: An attribute-based node2vec model for dynamic community detection on co-authorship network. Comput. Statist. 1\u201328 (2024)","DOI":"10.1007\/s00180-024-01486-1"},{"key":"18_CR14","doi-asserted-by":"crossref","unstructured":"McSherry, F.D.: Privacy integrated queries: an extensible platform for privacy-preserving data analysis. In: Proceedings of the 2009 ACM SIGMOD International Conference on Management of Data, pp. 19\u201330 (2009)","DOI":"10.1145\/1559845.1559850"},{"key":"18_CR15","unstructured":"IWQS, EST, https:\/\/www.heywhale.com\/mw\/dataset. Accessed 12 Dec 2023"},{"key":"18_CR16","unstructured":"AE. https:\/\/www.industrial-bigdata.com\/Data. Accessed 20 July 2023"}],"container-title":["Lecture Notes in Computer Science","Advanced Intelligent Computing Technology and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-97-5606-3_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,29]],"date-time":"2024-07-29T09:08:11Z","timestamp":1722244091000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-97-5606-3_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9789819756056","9789819756063"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-981-97-5606-3_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"30 July 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"ICIC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tianjin","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 August 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 August 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icic2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.ic-icc.cn\/2024\/index.htm","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}