{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,29]],"date-time":"2025-06-29T16:46:54Z","timestamp":1751215614629,"version":"3.37.3"},"reference-count":51,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2017,11,24]],"date-time":"2017-11-24T00:00:00Z","timestamp":1511481600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100000038","name":"Natural Sciences and Engineering Research Council of Canada","doi-asserted-by":"publisher","award":["356065-2013"],"award-info":[{"award-number":["356065-2013"]}],"id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001804","name":"Canada Research Chairs","doi-asserted-by":"publisher","award":["950-230623"],"award-info":[{"award-number":["950-230623"]}],"id":[{"id":"10.13039\/501100001804","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100008675","name":"Zayed University","doi-asserted-by":"crossref","award":["RIF R15046","R15048"],"award-info":[{"award-number":["RIF R15046","R15048"]}],"id":[{"id":"10.13039\/501100008675","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61272306"],"award-info":[{"award-number":["61272306"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Zhejiang Natural Science Foundation of China","award":["LY17F020004"],"award-info":[{"award-number":["LY17F020004"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Knowl Inf Syst"],"published-print":{"date-parts":[[2018,9]]},"DOI":"10.1007\/s10115-017-1132-3","type":"journal-article","created":{"date-parts":[[2017,11,24]],"date-time":"2017-11-24T18:17:18Z","timestamp":1511547438000},"page":"717-752","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Differentially private multidimensional data publishing"],"prefix":"10.1007","volume":"56","author":[{"given":"Khalil","family":"Al-Hussaeni","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8423-2906","authenticated-orcid":false,"given":"Benjamin C. M.","family":"Fung","sequence":"additional","affiliation":[]},{"given":"Farkhund","family":"Iqbal","sequence":"additional","affiliation":[]},{"given":"Junqiang","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Patrick C. K.","family":"Hung","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,24]]},"reference":[{"key":"1132_CR1","doi-asserted-by":"crossref","unstructured":"Barak B, Chaudhuri K, Dwork C, Kale S, McSherry F, Talwar K (2007) Privacy, accuracy, and consistency too: a holistic solution to contingency table release. In: Proceedings of the 26th ACM SIGMOD-SIGACT-SIGART symposium on principles of database systems (PODS \u201907), pp 273\u2013282","DOI":"10.1145\/1265530.1265569"},{"key":"1132_CR2","doi-asserted-by":"crossref","unstructured":"Bayardo RJ, Agrawal R (2005) Data privacy through optimal k-anonymization. In: Proceedings of the 21st international conference on data engineering (ICDE \u201905), pp 217\u2013228","DOI":"10.1109\/ICDE.2005.42"},{"key":"1132_CR3","doi-asserted-by":"crossref","unstructured":"Blum A, Ligett K, Roth A (2008) A learning theory approach to non-interactive database privacy. In: Proceedings of the fortieth annual ACM symposium on theory of computing (STOC \u201908), pp 609\u2013618","DOI":"10.1145\/1374376.1374464"},{"key":"1132_CR4","unstructured":"Carlisle DM, Rodrian ML, Diamond CL (2007) California inpatient data reporting manual, medical information reporting for California, 5th edn. Technical Report, Office of Statewide Health Planning and Development"},{"key":"1132_CR5","doi-asserted-by":"crossref","unstructured":"Chawla S, Dwork C, McSherry F, Smith A, Wee H (2005) Toward privacy in public databases. In: Proceedings of the second international conference on theory of cryptography (TCC \u201905), pp 363\u2013385","DOI":"10.1007\/978-3-540-30576-7_20"},{"issue":"11","key":"1132_CR6","doi-asserted-by":"crossref","first-page":"1087","DOI":"10.14778\/3402707.3402744","volume":"4","author":"R Chen","year":"2011","unstructured":"Chen R, Mohammed N, Fung BCM, Desai BC, Xiong L (2011) Publishing set-valued data via differential privacy. Proc VLDB Endow 4(11):1087\u20131098","journal-title":"Proc VLDB Endow"},{"key":"1132_CR7","doi-asserted-by":"crossref","unstructured":"Cormode G, Procopiuc C, Srivastava D, Tran TTL (2012) Differentially private summaries for sparse data. In: Proceedings of the 15th international conference on database theory (ICDT \u201912), pp 299\u2013311","DOI":"10.1145\/2274576.2274608"},{"key":"1132_CR8","doi-asserted-by":"crossref","unstructured":"Ding B, Winslett M, Han J, Li Z (2011) Differentially private data cubes: optimizing noise sources and consistency. In: Proceedings of the 2011 ACM SIGMOD international conference on management of data (SIGMOD \u201911), pp 217\u2013228","DOI":"10.1145\/1989323.1989347"},{"key":"1132_CR9","doi-asserted-by":"crossref","unstructured":"Dwork C (2006) Differential privacy. In: Proceedings of the 33rd international conference on automata, languages and programming\u2014volume part II (ICALP \u201906), pp 1\u201312","DOI":"10.1007\/11787006_1"},{"key":"1132_CR10","doi-asserted-by":"crossref","unstructured":"Dwork C (2008) Differential privacy: a survey of results. In: Proceedings of the 5th international conference on theory and applications of models of computation (TAMC \u201908), pp 1\u201319","DOI":"10.1007\/978-3-540-79228-4_1"},{"issue":"1","key":"1132_CR11","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1145\/1866739.1866758","volume":"54","author":"C Dwork","year":"2011","unstructured":"Dwork C (2011) A firm foundation for private data analysis. Commun ACM 54(1):86\u201395","journal-title":"Commun ACM"},{"key":"1132_CR12","doi-asserted-by":"crossref","unstructured":"Dwork C, McSherry F, Nissim K, Smith A (2006) Calibrating noise to sensitivity in private data analysis. In: Proceedings of the third conference on theory of cryptography (TCC \u201906), pp 265\u2013284","DOI":"10.1007\/11681878_14"},{"issue":"3\u20134","key":"1132_CR13","first-page":"211","volume":"9","author":"C Dwork","year":"2014","unstructured":"Dwork C, Roth A (2014) The algorithmic foundations of differential privacy. Found Trends Theor Comput Sci 9(3\u20134):211\u2013407","journal-title":"Found Trends Theor Comput Sci"},{"key":"1132_CR14","unstructured":"Frank A, Suncion A (2010) UCI machine learning repository. http:\/\/archive.ics.uci.edu\/ml"},{"key":"1132_CR15","doi-asserted-by":"crossref","unstructured":"Friedman A, Schuster A (2010) Data mining with differential privacy. In: Proceedings of the 16th ACM SIGKDD international conference on knowledge discovery and data mining (KDD \u201910), pp 493\u2013502","DOI":"10.1145\/1835804.1835868"},{"issue":"6","key":"1132_CR16","doi-asserted-by":"crossref","first-page":"552","DOI":"10.1016\/j.datak.2008.12.001","volume":"68","author":"BCM Fung","year":"2009","unstructured":"Fung BCM, Wang K, Wang L, Hung PCK (2009) Privacy-preserving data publishing for cluster analysis. Data Knowl Eng 68(6):552\u2013575","journal-title":"Data Knowl Eng"},{"issue":"5","key":"1132_CR17","doi-asserted-by":"crossref","first-page":"711","DOI":"10.1109\/TKDE.2007.1015","volume":"19","author":"BCM Fung","year":"2007","unstructured":"Fung BCM, Wang K, Yu PS (2007) Anonymizing classification data for privacy preservation. IEEE Trans Knowl Data Eng 19(5):711\u2013725","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"1132_CR18","doi-asserted-by":"crossref","unstructured":"Ganta SR, Kasiviswanathan S, Smith A (2008) Composition attacks and auxiliary information in data privacy. In: Proceedings of the 14th ACM SIGKDD international conference on knowledge discovery and data mining (KDD \u201908), pp 265\u2013273","DOI":"10.1145\/1401890.1401926"},{"key":"1132_CR19","volume-title":"And if you liked the movie, a netflix contest may reward you handsomely","author":"K Hafner","year":"2006","unstructured":"Hafner K (2006) And if you liked the movie, a netflix contest may reward you handsomely. New York Times, New York"},{"issue":"1","key":"1132_CR20","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1145\/1656274.1656278","volume":"11","author":"M Hall","year":"2009","unstructured":"Hall M, Frank E, Holmes G, Pfahringer B, Reutemann P, Witten IH (2009) The WEKA data mining software: an update. ACM SIGKDD Explor Newsl 11(1):10\u201318","journal-title":"ACM SIGKDD Explor Newsl"},{"issue":"1\u20132","key":"1132_CR21","doi-asserted-by":"crossref","first-page":"1021","DOI":"10.14778\/1920841.1920970","volume":"3","author":"M Hay","year":"2010","unstructured":"Hay M, Rastogi V, Miklau G, Suciu D (2010) Boosting the accuracy of differentially private histograms through consistency. Proc VLDB Endow 3(1\u20132):1021\u20131032","journal-title":"Proc VLDB Endow"},{"key":"1132_CR22","doi-asserted-by":"crossref","unstructured":"Iyengar VS (2002) Transforming data to satisfy privacy constraints. In: Proceedings of the eighth ACM SIGKDD international conference on knowledge discovery and data mining (KDD \u201902), pp 279\u2013288","DOI":"10.1145\/775047.775089"},{"key":"1132_CR23","first-page":"169","volume-title":"Advances in Kernel methods\u2013support vector learning","author":"T Joachims","year":"1999","unstructured":"Joachims T (1999) Making large-scale SVM learning practical. In: Sch\u00f6lkopf B, Burges C, Smola A (eds) Advances in Kernel methods\u2013support vector learning, vol 11. MIT Press, Cambridge, pp 169\u2013184"},{"key":"1132_CR24","unstructured":"Karypis G (2006) CLUTO\u2014software for clustering high-dimensional datasets. http:\/\/glaros.dtc.umn.edu\/gkhome\/views\/cluto"},{"key":"1132_CR25","volume-title":"Finding groups in data: an introduction to cluster analysis","author":"L Kaufman","year":"2009","unstructured":"Kaufman L, Rousseeuw PJ (2009) Finding groups in data: an introduction to cluster analysis, vol 344. Wiley, Hoboken"},{"key":"1132_CR26","doi-asserted-by":"crossref","unstructured":"Kifer D (2009) Attacks on privacy and de Finetti\u2019s theorem. In: Proceedings of the 2009 ACM SIGMOD international conference on management of data (SIGMOD \u201909), pp 127\u2013138","DOI":"10.1145\/1559845.1559861"},{"key":"1132_CR27","doi-asserted-by":"crossref","unstructured":"Kifer D, Lin B-R (2010) Towards an axiomatization of statistical privacy and utility. In: Proceedings of the 29th ACM SIGMOD-SIGACT-SIGART symposium on principles of database systems (PODS \u201910), pp 147\u2013158","DOI":"10.1145\/1807085.1807106"},{"key":"1132_CR28","doi-asserted-by":"crossref","unstructured":"LeFevre K, DeWitt DJ, Ramakrishnan R (2006) Mondrian multidimensional K-anonymity. In: Proceedings of the 22nd international conference on data engineering (ICDE \u201906)","DOI":"10.1109\/ICDE.2006.101"},{"issue":"3","key":"1132_CR29","doi-asserted-by":"crossref","first-page":"17:1","DOI":"10.1145\/1386118.1386123","volume":"33","author":"K LeFevre","year":"2008","unstructured":"LeFevre K, DeWitt DJ, Ramakrishnan R (2008) Workload-aware anonymization techniques for large-scale datasets. ACM Trans Database Syst 33(3):17:1\u201317:47","journal-title":"ACM Trans Database Syst"},{"key":"1132_CR30","doi-asserted-by":"crossref","unstructured":"Li C, Hay M, Rastogi V, Miklau G, McGregor A (2010) Optimizing linear counting queries under differential privacy. In: Proceedings of the 29th ACM SIGMOD-SIGACT-SIGART symposium on principles of database systems (PODS \u201910), pp 123\u2013134","DOI":"10.1145\/1807085.1807104"},{"key":"1132_CR31","unstructured":"Li H, Xiong L, Jiang X (2014) Differentially private synthesization of multi-dimensional data using copula functions. In: Proceedings of the 17th international conference on extending database technology (EDBT \u201914), vol 2014, pp 475\u2013486"},{"key":"1132_CR32","unstructured":"Li N, Li T, Venkatasubramanian S (2007) $$t$$ t -closeness: privacy beyond $$k$$ k -anonymity and $$\\ell $$ \u2113 -diversity. In: Proceedings of the 23rd international conference on data engineering (ICDE \u201907), pp 106\u2013115"},{"key":"1132_CR33","unstructured":"Machanavajjhala A, Gehrke J, Kifer D, Venkitasubramaniam M (2006) $$\\ell $$ \u2113 -diversity: privacy beyond $$k$$ k -anonymity. In: Proceedings of the 22nd IEEE international conference on data engineering (ICDE \u20196), p 24"},{"key":"1132_CR34","doi-asserted-by":"crossref","unstructured":"McSherry F (2009) Privacy integrated queries. In: Proceedings of the 2009 ACM SIGMOD international conference on management of data (SIGMOD \u201909), pp 19\u201330","DOI":"10.1145\/1559845.1559850"},{"key":"1132_CR35","doi-asserted-by":"crossref","unstructured":"McSherry F, Talwar K (2007) Mechanism design via differential privacy. In: Proceedings of the 48th annual IEEE symposium on foundations of computer science (FOCS \u201907), pp 94\u2013103","DOI":"10.1109\/FOCS.2007.66"},{"key":"1132_CR36","doi-asserted-by":"crossref","unstructured":"Mohammed N, Chen R, Fung BCM, Yu PS (2011) Differentially private data release for data mining. In: Proceedings of the 17th ACM SIGKDD international conference on knowledge discovery and data mining (KDD \u201911), pp 493\u2013501","DOI":"10.1145\/2020408.2020487"},{"key":"1132_CR37","doi-asserted-by":"crossref","unstructured":"Qardaji W, Li N (2012) Recursive partitioning and summarization: a practical framework for differentially private data publishing. In: Proceedings of the 7th ACM symposium on information, computer and communications security (ASIACCS \u201912), pp 38\u201339","DOI":"10.1145\/2414456.2414477"},{"key":"1132_CR38","doi-asserted-by":"crossref","unstructured":"Qardaji W, Yang W, Li N (2013) Differentially private grids for geospatial data. In: Proceedings of the 29th IEEE international conference on data engineering (ICDE \u201913), pp 757\u2013768","DOI":"10.1109\/ICDE.2013.6544872"},{"issue":"14","key":"1132_CR39","doi-asserted-by":"crossref","first-page":"1954","DOI":"10.14778\/2556549.2556576","volume":"6","author":"W Qardaji","year":"2013","unstructured":"Qardaji W, Yang W, Li N (2013) Understanding hierarchical methods for differentially private histograms. Proc VLDB Endow 6(14):1954\u20131965","journal-title":"Proc VLDB Endow"},{"key":"1132_CR40","doi-asserted-by":"crossref","unstructured":"Qardaji W, Yang W, Li N (2014) PriView: practical differentially private release of marginal contingency tables. In: Proceedings of the 2014 ACM SIGMOD international conference on management of data (SIGMOD \u201914), pp 1435\u20131446","DOI":"10.1145\/2588555.2588575"},{"key":"1132_CR41","volume-title":"C4.5: programs for machine learning","author":"JR Quinlan","year":"1993","unstructured":"Quinlan JR (1993) C4.5: programs for machine learning. Morgan Kaufmann, San Francisco"},{"issue":"6","key":"1132_CR42","doi-asserted-by":"crossref","first-page":"1010","DOI":"10.1109\/69.971193","volume":"13","author":"P Samarati","year":"2001","unstructured":"Samarati P (2001) Protecting respondents\u2019 identities in microdata release. IEEE Trans Knowl Data Eng 13(6):1010\u20131027","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"5","key":"1132_CR43","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney L (2002) K-anonymity: a model for protecting privacy. Int J Uncertain Fuzziness Knowl Based Syst 10(5):557\u2013570","journal-title":"Int J Uncertain Fuzziness Knowl Based Syst"},{"key":"1132_CR44","volume-title":"Computer systems that learn: classification and prediction methods from statistics, neural nets, machine learning, and expert systems","author":"SM Weiss","year":"1991","unstructured":"Weiss SM, Kulikowski CA (1991) Computer systems that learn: classification and prediction methods from statistics, neural nets, machine learning, and expert systems. Morgan Kaufmann Publishers Inc., San Francisco"},{"key":"1132_CR45","unstructured":"Wong RC-W, Fu AW-C, Wang K, Pei J (2007) Minimality attack in privacy preserving data publishing. In: Proceedings of the 33rd international conference on very large data bases (VLDB \u201907), pp 543\u2013554"},{"key":"1132_CR46","doi-asserted-by":"crossref","unstructured":"Xiao X, Bender G, Hay M, Gehrke J (2011) iReduct: differential privacy with reduced relative errors. In: Proceedings of the 2011 ACM SIGMOD international conference on management of data (SIGMOD \u201911), pp 229\u2013240","DOI":"10.1145\/1989323.1989348"},{"issue":"8","key":"1132_CR47","doi-asserted-by":"crossref","first-page":"1200","DOI":"10.1109\/TKDE.2010.247","volume":"23","author":"X Xiao","year":"2011","unstructured":"Xiao X, Wang G, Gehrke J (2011) Differential privacy via wavelet transforms. IEEE Trans Knowl Data Eng 23(8):1200\u20131214","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"3","key":"1132_CR48","first-page":"195","volume":"7","author":"Y Xiao","year":"2014","unstructured":"Xiao Y, Xiong L, Fan L, Goryczka S, Li H (2014) DPCube: differentially private histogram release through multidimensional partitioning. Trans Data Privacy 7(3):195\u2013222","journal-title":"Trans Data Privacy"},{"key":"1132_CR49","doi-asserted-by":"crossref","unstructured":"Xu J, Wang W, Pei J, Wang X, Shi B, Fu AWC (2006) Utility-based anonymization using local recoding. In: Proceedings of the 12th ACM SIGKDD international conference on knowledge discovery and data mining (KDD \u201906), pp 785\u2013790","DOI":"10.1145\/1150402.1150504"},{"issue":"6","key":"1132_CR50","doi-asserted-by":"crossref","first-page":"797","DOI":"10.1007\/s00778-013-0309-y","volume":"22","author":"J Xu","year":"2013","unstructured":"Xu J, Zhang Z, Xiao X, Yang Y, Yu G, Winslett M (2013) Differentially private histogram publication. VLDB J 22(6):797\u2013822","journal-title":"VLDB J"},{"key":"1132_CR51","doi-asserted-by":"crossref","unstructured":"Zhang J, Cormode G, Procopiuc CM, Srivastava D, Xiao X (2014) PrivBayes: private data release via Bayesian networks. In: Proceedings of the 2014 ACM SIGMOD international conference on management of data (SIGMOD \u201914), pp 1423\u20131434","DOI":"10.1145\/2588555.2588573"}],"container-title":["Knowledge and Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10115-017-1132-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10115-017-1132-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10115-017-1132-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,8]],"date-time":"2022-08-08T16:13:17Z","timestamp":1659975197000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10115-017-1132-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11,24]]},"references-count":51,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2018,9]]}},"alternative-id":["1132"],"URL":"https:\/\/doi.org\/10.1007\/s10115-017-1132-3","relation":{},"ISSN":["0219-1377","0219-3116"],"issn-type":[{"type":"print","value":"0219-1377"},{"type":"electronic","value":"0219-3116"}],"subject":[],"published":{"date-parts":[[2017,11,24]]}}}