{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:33:39Z","timestamp":1742913219549,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":30,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819785452"},{"type":"electronic","value":"9789819785469"}],"license":[{"start":{"date-parts":[[2024,10,18]],"date-time":"2024-10-18T00:00:00Z","timestamp":1729209600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,10,18]],"date-time":"2024-10-18T00:00:00Z","timestamp":1729209600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-97-8546-9_3","type":"book-chapter","created":{"date-parts":[[2024,10,17]],"date-time":"2024-10-17T09:02:51Z","timestamp":1729155771000},"page":"47-66","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Enhancing Data Utility in\u00a0Personalized Differential Privacy: A Fine-Grained Processing Approach"],"prefix":"10.1007","author":[{"given":"Zhenhua","family":"Liu","sequence":"first","affiliation":[]},{"given":"Wenxin","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Han","family":"Liang","sequence":"additional","affiliation":[]},{"given":"Yujing","family":"Yuan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,10,18]]},"reference":[{"key":"3_CR1","doi-asserted-by":"publisher","unstructured":"Alaggan, M., Gambs, S.B., Kermarrec, A.M.: Heterogeneous differential privacy. J. Priv. Confidentiality 7(2), 127\u2013158 (2017). https:\/\/doi.org\/10.29012\/jpc.v7i2.652","DOI":"10.29012\/jpc.v7i2.652"},{"issue":"7","key":"3_CR2","doi-asserted-by":"publisher","first-page":"5859","DOI":"10.1109\/JIOT.2023.3237707","volume":"10","author":"H Cai","year":"2023","unstructured":"Cai, H., Ye, F., Yang, Y., Xiao, F., Zhu, Y.: Toward correlated data trading for private web browsing history. IEEE Internet Things J. 10(7), 5859\u20135872 (2023). https:\/\/doi.org\/10.1109\/JIOT.2023.3237707","journal-title":"IEEE Internet Things J."},{"key":"3_CR3","doi-asserted-by":"publisher","unstructured":"Chadha, R., Sistla, A.P., Viswanathan, M., Bhusal, B.: Deciding differential privacy of online algorithms with multiple variables. In: ACM Conference on Computer and Communications Security\u2013CCS 2023, pp. 1761\u20131775. ACM (2023). https:\/\/doi.org\/10.1145\/3576915.3623170","DOI":"10.1145\/3576915.3623170"},{"key":"3_CR4","doi-asserted-by":"publisher","unstructured":"Chaudhuri, S., Courtade, T.A.: Mean estimation under heterogeneous privacy: some privacy can be free. In: IEEE International Symposium on Information Theory\u2013ISIT 2023, pp. 1639\u20131644. IEEE (2023). https:\/\/doi.org\/10.1109\/ISIT54713.2023.10206746","DOI":"10.1109\/ISIT54713.2023.10206746"},{"key":"3_CR5","doi-asserted-by":"publisher","unstructured":"Du, M., Yue, X., Chow, S.S.M., Wang, T., Huang, C., Sun, H.: DP-forward: fine-tuning and inference on language models with differential privacy in forward pass. In: ACM Conference on Computer and Communications Security\u2013CCS 2023, pp. 2665\u20132679. ACM (2023). https:\/\/doi.org\/10.1145\/3576915.3616592","DOI":"10.1145\/3576915.3616592"},{"key":"3_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11787006_1","volume-title":"Automata, Languages and Programming","author":"C Dwork","year":"2006","unstructured":"Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1\u201312. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11787006_1"},{"issue":"1","key":"3_CR7","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1145\/1866739.1866758","volume":"54","author":"C Dwork","year":"2011","unstructured":"Dwork, C.: A firm foundation for private data analysis. Commun. Assoc. Comput. Mach. 54(1), 86\u201395 (2011). https:\/\/doi.org\/10.1145\/1866739.1866758","journal-title":"Commun. Assoc. Comput. Mach."},{"key":"3_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"486","DOI":"10.1007\/11761679_29","volume-title":"Advances in Cryptology - EUROCRYPT 2006","author":"C Dwork","year":"2006","unstructured":"Dwork, C., Kenthapadi, K., McSherry, F., Mironov, I., Naor, M.: Our data, ourselves: privacy via distributed noise generation. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 486\u2013503. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11761679_29"},{"key":"3_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/11681878_14","volume-title":"Theory of Cryptography","author":"C Dwork","year":"2006","unstructured":"Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 265\u2013284. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11681878_14"},{"key":"3_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"479","DOI":"10.1007\/978-3-642-32009-5_28","volume-title":"Advances in Cryptology \u2013 CRYPTO 2012","author":"J Gehrke","year":"2012","unstructured":"Gehrke, J., Hay, M., Lui, E., Pass, R.: Crowd-blending privacy. In: Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. LNCS, vol. 7417, pp. 479\u2013496. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-32009-5_28"},{"key":"3_CR11","unstructured":"Geng, Q., Ding, W., Guo, R., Kumar, S.: Tight analysis of privacy and utility tradeoff in approximate differential privacy. In: Artificial Intelligence and Statistics\u2013AISTATS 2018, pp. 1\u201315 (2018). https:\/\/api.semanticscholar.org\/CorpusID:59604401"},{"issue":"1","key":"3_CR12","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1109\/JIOT.2021.3089518","volume":"9","author":"W Huang","year":"2022","unstructured":"Huang, W., Zhou, S., Zhu, T., Liao, Y.: Privately publishing internet of things data: bring personalized sampling into differentially private mechanisms. IEEE Internet Things J. 9(1), 80\u201391 (2022). https:\/\/doi.org\/10.1109\/JIOT.2021.3089518","journal-title":"IEEE Internet Things J."},{"key":"3_CR13","unstructured":"Johnston, L., et al.: Value of curation survey (2021). https:\/\/hdl.handle.net\/11299\/223250"},{"key":"3_CR14","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"615","DOI":"10.1007\/978-3-319-57454-7_48","volume-title":"Advances in Knowledge Discovery and Data Mining","author":"H Li","year":"2017","unstructured":"Li, H., Xiong, L., Ji, Z., Jiang, X.: Partitioning-based mechanisms under personalized differential privacy. In: Kim, J., Shim, K., Cao, L., Lee, J.-G., Lin, X., Moon, Y.-S. (eds.) PAKDD 2017. LNCS (LNAI), vol. 10234, pp. 615\u2013627. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-57454-7_48"},{"key":"3_CR15","doi-asserted-by":"publisher","unstructured":"Li, J., et al.: A privacy-preserving online deep learning algorithm based on differential privacy. In: Computer Supported Cooperative Work in Design\u2013CSCWD 2023, pp. 559\u2013564. IEEE (2023).https:\/\/doi.org\/10.1109\/CSCWD57460.2023.10152847","DOI":"10.1109\/CSCWD57460.2023.10152847"},{"issue":"5","key":"3_CR16","doi-asserted-by":"publisher","first-page":"3840","DOI":"10.1109\/JIOT.2022.3151348","volume":"10","author":"Y Li","year":"2023","unstructured":"Li, Y., Tao, X., Zhang, X., Wang, M., Wang, S.: Break the data barriers while keeping privacy: a graph differential privacy method. IEEE Internet Things J. 10(5), 3840\u20133850 (2023). https:\/\/doi.org\/10.1109\/JIOT.2022.3151348","journal-title":"IEEE Internet Things J."},{"key":"3_CR17","doi-asserted-by":"publisher","unstructured":"Li, Z., Zhou, Y., Li, W., Yang, Y., Deng, B., Chen, H.: Differential privacy federated learning based privacy-preserving transmission scheme of distributed PV stations. In: Energy Engineering and Power Systems\u2013EEPS 2023, pp. 439\u2013443. IEEE (2023). https:\/\/doi.org\/10.1109\/EEPS58791.2023.10257063","DOI":"10.1109\/EEPS58791.2023.10257063"},{"key":"3_CR18","doi-asserted-by":"publisher","unstructured":"Liu, J., Zhang, L., Lv, C., Yu, T., Freris, N.M., Li, X.Y.: TPMDP: threshold personalized multi-party differential privacy via optimal gaussian mechanism. In: Mobile Ad Hoc and Smart Systems\u2013MASS 2023, pp. 161\u2013169. IEEE (2023). https:\/\/doi.org\/10.1109\/MASS58611.2023.00027","DOI":"10.1109\/MASS58611.2023.00027"},{"key":"3_CR19","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/978-981-99-9331-4_10","volume-title":"Frontiers in Cyber Security - FCS 2023","author":"M Lu","year":"2023","unstructured":"Lu, M., Liu, Z.: Improving accuracy of interactive queries in personalized differential privacy. In: Yang, H., Lu, R. (eds.) FCS 2023. CCIS, vol. 1992, pp. 141\u2013159. Springer, Singapore (2023). https:\/\/doi.org\/10.1007\/978-981-99-9331-4_10"},{"key":"3_CR20","doi-asserted-by":"publisher","unstructured":"Mironov, I.: Renyi differential privacy. In: Computer Security Foundations Symposium\u2013CSF 2017, pp. 263\u2013275. IEEE (2017).https:\/\/doi.org\/10.1109\/CSF.2017.11","DOI":"10.1109\/CSF.2017.11"},{"key":"3_CR21","doi-asserted-by":"publisher","unstructured":"Nissim, K., Raskhodnikova, S., Smith, A.: Smooth sensitivity and sampling in private data analysis. In: ACM Symposium on Theory of Computing\u2013STOC 2007, pp. 75\u201384. ACM (2007). https:\/\/doi.org\/10.1145\/1250790.1250803","DOI":"10.1145\/1250790.1250803"},{"key":"3_CR22","doi-asserted-by":"publisher","unstructured":"Niu, B., Chen, Y., Wang, B., Cao, J., Li, F.: Utility-aware exponential mechanism for personalized differential privacy. In: Wireless Communications and Networking Conference\u2013WCNC 2020, pp.\u00a01\u20136. IEEE (2020). https:\/\/doi.org\/10.1109\/WCNC45663.2020.9120532","DOI":"10.1109\/WCNC45663.2020.9120532"},{"key":"3_CR23","doi-asserted-by":"publisher","unstructured":"Niu, B., Chen, Y., Wang, B., Wang, Z., Li, F., Cao, J.: AdaPDP: adaptive personalized differential privacy. In: IEEE Conference on Computer Communications\u2013INFOCOM 2021, pp. 1\u201310. IEEE (2021). https:\/\/doi.org\/10.1109\/INFOCOM42981.2021.9488825","DOI":"10.1109\/INFOCOM42981.2021.9488825"},{"key":"3_CR24","doi-asserted-by":"publisher","unstructured":"Wei, C., et al.: DPMLBench: holistic evaluation of differentially private machine learning. In: ACM Conference on Computer and Communications Security\u2013CCS 2023, pp. 2621\u20132635. ACM (2023). https:\/\/doi.org\/10.1145\/3576915.3616593","DOI":"10.1145\/3576915.3616593"},{"key":"3_CR25","doi-asserted-by":"publisher","unstructured":"Xiao, H., Wan, J., Devadas, S.: Geometry of sensitivity: twice sampling and hybrid clipping in differential privacy with optimal gaussian noise and application to deep learning. In: ACM Conference on Computer and Communications Security\u2013CCS 2023, pp. 2636\u20132650. ACM (2023). https:\/\/doi.org\/10.1145\/3576915.3623142","DOI":"10.1145\/3576915.3623142"},{"issue":"1","key":"3_CR26","doi-asserted-by":"publisher","first-page":"1163","DOI":"10.1109\/TITS.2022.3182019","volume":"24","author":"C Xu","year":"2023","unstructured":"Xu, C., Ding, Y., Chen, C., Ding, Y., Zhou, W., Wen, S.: Personalized location privacy protection for location-based services in vehicular networks. IEEE Trans. Intell. Transp. Syst. 24(1), 1163\u20131177 (2023). https:\/\/doi.org\/10.1109\/TITS.2022.3182019","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"3_CR27","doi-asserted-by":"publisher","unstructured":"Yan, J., Tian, Y., Wang, W., Zhang, Y., Zhou, Y., Lu, L.: A local differential privacy based method to preserve link privacy in mobile social network. In: Networking and Network Applications\u2013NaNA 2023, pp. 390\u2013396. IEEE (2023). https:\/\/doi.org\/10.1109\/NaNA60121.2023.00071","DOI":"10.1109\/NaNA60121.2023.00071"},{"key":"3_CR28","doi-asserted-by":"publisher","unstructured":"Yang, B., Sato, I., Nakagawa, H.: Bayesian differential privacy on correlated data. In: ACM International Conference on Management of Data\u2013SIGMOD 2015, pp. 747\u2013762. ACM (2015). https:\/\/doi.org\/10.1145\/2723372.2747643","DOI":"10.1145\/2723372.2747643"},{"key":"3_CR29","doi-asserted-by":"publisher","unstructured":"Zach, J., Ting, Y., Graham, C.: Conservative or liberal? Personalized differential privacy. In: International Conference on Data Engineering\u2013ICDE 2015, pp. 1023\u20131034. IEEE (2015). https:\/\/doi.org\/10.1109\/ICDE.2015.7113353","DOI":"10.1109\/ICDE.2015.7113353"},{"issue":"2","key":"3_CR30","doi-asserted-by":"publisher","first-page":"922","DOI":"10.1109\/TNSE.2022.3224731","volume":"10","author":"M Zhang","year":"2023","unstructured":"Zhang, M., Zhou, J., Zhang, G., Cui, L., Gao, T., Yu, S.: APDP: attribute-based personalized differential privacy data publishing scheme for social networks. IEEE Trans. Netw. Sci. Eng. 10(2), 922\u2013933 (2023). https:\/\/doi.org\/10.1109\/TNSE.2022.3224731","journal-title":"IEEE Trans. Netw. Sci. Eng."}],"container-title":["Lecture Notes in Computer Science","Data Security and Privacy Protection"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-97-8546-9_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,17]],"date-time":"2024-10-17T09:10:31Z","timestamp":1729156231000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-97-8546-9_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,18]]},"ISBN":["9789819785452","9789819785469"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-981-97-8546-9_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,10,18]]},"assertion":[{"value":"18 October 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors have no competing interests to declare that\u00a0are relevant to the content of this article.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"DSPP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Data Security and Privacy Protection","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Xi'an","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 October 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 October 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dspp2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}