{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,6]],"date-time":"2026-02-06T22:36:34Z","timestamp":1770417394241,"version":"3.49.0"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2019,3,1]],"date-time":"2019-03-01T00:00:00Z","timestamp":1551398400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J. Comput. Sci. Technol."],"published-print":{"date-parts":[[2019,3]]},"DOI":"10.1007\/s11390-019-1910-3","type":"journal-article","created":{"date-parts":[[2019,3,27]],"date-time":"2019-03-27T17:52:34Z","timestamp":1553709154000},"page":"272-286","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":30,"title":["Improving Data Utility Through Game Theory in Personalized Differential Privacy"],"prefix":"10.1007","volume":"34","author":[{"given":"Lei","family":"Cui","sequence":"first","affiliation":[]},{"given":"Youyang","family":"Qu","sequence":"additional","affiliation":[]},{"given":"Mohammad Reza","family":"Nosouhi","sequence":"additional","affiliation":[]},{"given":"Shui","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Jian-Wei","family":"Niu","sequence":"additional","affiliation":[]},{"given":"Gang","family":"Xie","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,3,22]]},"reference":[{"issue":"8","key":"1910_CR1","doi-asserted-by":"publisher","DOI":"10.1126\/sciadv.1701172","volume":"3","author":"D Garcia","year":"2017","unstructured":"Garcia D. Leaking privacy and shadow profiles in online social networks. Science Advances, 2017, 3(8): Article No. e1701172.","journal-title":"Science Advances"},{"issue":"1","key":"1910_CR2","doi-asserted-by":"publisher","first-page":"665","DOI":"10.1109\/TVT.2017.2738018","volume":"67","author":"Z He","year":"2018","unstructured":"He Z, Cai Z, Yu J. Latent-data privacy preserving with customized data utility for social network data. IEEE Transactions on Vehicular Technology, 2018, 67(1): 665-673.","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"1910_CR3","doi-asserted-by":"crossref","unstructured":"Cristofaro E D, Soriente C, Tsudik G, Williams A. Hummingbird: Privacy at the time of twitter. In Proc. the 2012 IEEE Symposium on Security and Privacy, May 2012, pp.285-299.","DOI":"10.1109\/SP.2012.26"},{"issue":"3","key":"1910_CR4","doi-asserted-by":"publisher","first-page":"1974","DOI":"10.1109\/COMST.2016.2533668","volume":"18","author":"JH Abawajy","year":"2016","unstructured":"Abawajy J H, Ninggal M I H, Herawan T. Privacy preserving social network data publication. IEEE Communications Surveys and Tutorials, 2016, 18(3): 1974-1997.","journal-title":"IEEE Communications Surveys and Tutorials"},{"issue":"5","key":"1910_CR5","doi-asserted-by":"publisher","first-page":"1418","DOI":"10.1109\/TC.2015.2439287","volume":"65","author":"S Yu","year":"2016","unstructured":"Yu S, Zhou W, Guo S, Guo M. A feasible IP traceback framework through dynamic deterministic packet marking. IEEE Transactions on Computers, 2016, 65(5): 1418-1427.","journal-title":"IEEE Transactions on Computers"},{"issue":"3","key":"1910_CR6","doi-asserted-by":"publisher","first-page":"773","DOI":"10.1109\/TCSS.2018.2861775","volume":"5","author":"Y Qu","year":"2018","unstructured":"Qu Y, Yu S, Gao L, Zhou W, Peng S. A hybrid privacy protection scheme in cyber-physical social networks. IEEE Transactions on Computational Social Systems, 2018, 5(3): 773-784.","journal-title":"IEEE Transactions on Computational Social Systems"},{"issue":"6","key":"1910_CR7","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1109\/MWC.2017.1800112","volume":"25","author":"Y Qu","year":"2018","unstructured":"Qu Y, Yu S, Zhou W, Peng S, Wang G, Xiao K. Privacy of things: Emerging challenges and opportunities in wireless Internet of Things. IEEE Wireless Communications, 2018, 25(6): 91-97.","journal-title":"IEEE Wireless Communications"},{"issue":"1","key":"1910_CR8","doi-asserted-by":"publisher","first-page":"531","DOI":"10.1109\/COMST.2016.2610963","volume":"19","author":"S Yu","year":"2017","unstructured":"Yu S, Liu M, Dou W, Liu X, Zhou S. Networking for big data: A survey. IEEE Communications Surveys and Tutorials, 2017, 19(1): 531-549.","journal-title":"IEEE Communications Surveys and Tutorials"},{"issue":"2","key":"1910_CR9","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1109\/TIFS.2014.2368363","volume":"10","author":"T Zhu","year":"2015","unstructured":"Zhu T, Xiong P, Li G, Zhou W. Correlated differential privacy: Hiding information in non-IID data set. IEEE Transactions on Information Forensics and Security, 2015, 10(2): 229-242.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"3","key":"1910_CR10","doi-asserted-by":"publisher","first-page":"1027","DOI":"10.1109\/TCNS.2017.2673414","volume":"5","author":"F Koufogiannis","year":"2016","unstructured":"Koufogiannis F, Pappas G J. Diffusing private data over networks. IEEE Transactions on Control of Network Systems, 2016, 5(3): 1027-1037.","journal-title":"IEEE Transactions on Control of Network Systems"},{"issue":"6","key":"1910_CR11","doi-asserted-by":"publisher","first-page":"3235","DOI":"10.1109\/TNET.2015.2512301","volume":"24","author":"W Wang","year":"2016","unstructured":"Wang W, Zhang Q. Privacy preservation for context sensing on smartphone. IEEE\/ACM Transactions on Networking, 2016, 24(6): 3235-3247.","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"1910_CR12","doi-asserted-by":"publisher","first-page":"2751","DOI":"10.1109\/ACCESS.2016.2577036","volume":"4","author":"S Yu","year":"2016","unstructured":"Yu S. Big privacy: Challenges and opportunities of privacy study in the age of big data. IEEE Access, 2016, 4: 2751-2763.","journal-title":"IEEE Access"},{"key":"1910_CR13","doi-asserted-by":"crossref","unstructured":"Mohassel P, Zhang Y. SecureML: A system for scalable privacy-preserving machine learning. In Proc. the 2017 IEEE Symposium on Security and Privacy, May 2017, pp.19-38.","DOI":"10.1109\/SP.2017.12"},{"issue":"4","key":"1910_CR14","doi-asserted-by":"publisher","first-page":"824","DOI":"10.1109\/TMC.2013.20","volume":"13","author":"G Costantino","year":"2014","unstructured":"Costantino G, Martinelli F, Santi P. Investigating the privacy versus forwarding accuracy tradeoff in opportunisticinterest-casting. IEEE Transactions on Mobile Computing, 2014, 13(4): 824-837.","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"1910_CR15","unstructured":"Pierangela S, Latanya S. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. https:\/\/dataprivacylab. org\/dataprivacy\/projects\/kanonymity\/paper3.pdf, May 2018."},{"key":"1910_CR16","doi-asserted-by":"crossref","unstructured":"Machanavajjhala A, Kifer D, Gehrke J, Venkitasubra-Maniam M. L-diversity: Privacy beyond k-anonymity. ACM Transactions on Knowledge Discovery from Data, 2007, 1(1): Article No. 3.","DOI":"10.1145\/1217299.1217302"},{"key":"1910_CR17","doi-asserted-by":"crossref","unstructured":"Gong X, Chen X, Xing K, Shin D, Zhang M, Zhang J. Personalized location privacy in mobile networks: A social group utility approach. In Proc. the 2005 IEEE Conference on Computer Communications, April 2015, pp.1008-1016.","DOI":"10.1109\/INFOCOM.2015.7218473"},{"key":"1910_CR18","doi-asserted-by":"crossref","unstructured":"Dwork C. Differential privacy. In Proc. the 33rd International Colloquium on Automata, Languages and Programming, July 2006, pp.1-12.","DOI":"10.1007\/11787006_1"},{"issue":"8","key":"1910_CR19","doi-asserted-by":"publisher","first-page":"1619","DOI":"10.1109\/TKDE.2017.2697856","volume":"29","author":"T Zhu","year":"2017","unstructured":"Zhu T, Li G, Zhou W, Yu P S. Differentially private data publishing and analysis: A survey. IEEE Transactions on Knowledge and Data Engineering, 2017, 29(8): 1619-1638.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"issue":"4","key":"1910_CR20","first-page":"591","volume":"15","author":"Q Wang","year":"2016","unstructured":"Wang Q, Zhang Y, Lu X, Wang Z, Qin Z, Ren K. Realtime and spatio-temporal crowd-sourced social network data publishing with differential privacy. IEEE Transactions on Dependable and Secure Computing, 2016, 15(4): 591-606.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"issue":"3","key":"1910_CR21","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1109\/TCSS.2016.2519819","volume":"2","author":"K Zhang","year":"2015","unstructured":"Zhang K, Liang X, Lu R, Shen X. PIF: A personalized finegrained spam filtering scheme with privacy preservation in mobile social networks. IEEE Transactions on Computational Social Systems, 2015, 2(3): 41-52.","journal-title":"IEEE Transactions on Computational Social Systems"},{"issue":"1","key":"1910_CR22","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1109\/TC.2013.191","volume":"64","author":"S Yu","year":"2015","unstructured":"Yu S, Guo S, Stojmenovic I. Fool me if you can: Mimicking attacks and anti-attacks in cyberspace. IEEE Transactions on Computers, 2015, 64(1): 139-151.","journal-title":"IEEE Transactions on Computers"},{"key":"1910_CR23","doi-asserted-by":"crossref","unstructured":"Qu Y, Cui L, Yu S, Zhou W, Wu J. Improving data utility through game theory in personalized differential privacy. In Proc. the 2018 IEEE International Conference on Communications, May 2018, Article No. 656.","DOI":"10.1109\/ICC.2018.8422735"},{"issue":"3","key":"1910_CR24","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1016\/j.dcan.2016.07.001","volume":"2","author":"D Wu","year":"2016","unstructured":"Wu D, Yang B, Wang R. Scalable privacy-preserving big data aggregation mechanism. Digital Communications and Networks, 2016, 2(3): 122-129.","journal-title":"Digital Communications and Networks"},{"key":"1910_CR25","doi-asserted-by":"crossref","unstructured":"Wang Q, Hu S, Ren K, Wang J, Wang Z, Du M. Catch me in the dark: Effective privacy-preserving outsourcing of feature extractions over image data. In Proc. the 35th Annual IEEE International Conference on Computer Communications, April 2016, Article No. 131.","DOI":"10.1109\/INFOCOM.2016.7524460"},{"key":"1910_CR26","doi-asserted-by":"publisher","unstructured":"Ma J, Liu J, Huang X, Xiang Y, Wu W. Authenticated data redaction with fine-grained control. IEEE Transactions on Emerging Topics in Computing. doi:\n                    https:\/\/doi.org\/10.1109\/TETC.2017.2754646\n                    \n                  .","DOI":"10.1109\/TETC.2017.2754646"},{"key":"1910_CR27","doi-asserted-by":"crossref","unstructured":"Qu Y, Yu S, Gao L, Niu J. Big data set privacy preserving through sensitive attribute-based grouping. In Proc. the 2017 IEEE International Conference on Communications, May 2017, Article No. 792.","DOI":"10.1109\/ICC.2017.7997113"},{"key":"1910_CR28","doi-asserted-by":"crossref","unstructured":"Dwork C, McSherry F, Nissim K, Smith A D. Calibrating noise to sensitivity in private data analysis. In Proc. the 3rd Theory of Cryptography Conference, March 2006, pp.265-284.","DOI":"10.1007\/11681878_14"},{"issue":"4","key":"1910_CR29","doi-asserted-by":"publisher","first-page":"2387","DOI":"10.1109\/TVT.2007.912327","volume":"57","author":"X Du","year":"2008","unstructured":"Du X, Guizani M, Xiao Y, Chen H. Secure and efficient time synchronization in heterogeneous sensor networks. IEEE Transactions on Vehicular Technology, 2008, 57(4): 2387-2394.","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"1910_CR30","doi-asserted-by":"publisher","first-page":"13118","DOI":"10.1109\/ACCESS.2017.2720187","volume":"5","author":"E Aghasian","year":"2017","unstructured":"Aghasian E, Garg S, Gao L, Yu S, Montgomery J. Scoring users\u2019 privacy disclosure across multiple online social networks. IEEE Access, 2017, 5: 13118-13130.","journal-title":"IEEE Access"},{"issue":"489","key":"1910_CR31","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1198\/jasa.2009.tm08651","volume":"105","author":"L Wasserman","year":"2010","unstructured":"Wasserman L, Zhou S. A statistical framework for differential privacy. Journal of the American Statistical Association, 2010, 105(489): 375-389.","journal-title":"Journal of the American Statistical Association"},{"key":"1910_CR32","doi-asserted-by":"crossref","unstructured":"Jorgensen Z, Yu T, Cormode G. Conservative or liberal? Personalized differential privacy. In Proc. the 31st IEEE International Conference on Data Engineering, April 2015, pp.1023-1034.","DOI":"10.1109\/ICDE.2015.7113353"},{"key":"1910_CR33","doi-asserted-by":"crossref","unstructured":"Wang S, Huang L, Tian M, Yang W, Xu H, Guo H. Personalized privacy-preserving data aggregation for histogram estimation. In Proc. the 2015 IEEE Global Communications Conference, December 2015, Article No. 423.","DOI":"10.1109\/GLOCOM.2015.7417364"},{"issue":"1","key":"1910_CR34","doi-asserted-by":"publisher","first-page":"665","DOI":"10.1109\/TVT.2017.2738018","volume":"67","author":"Z He","year":"2018","unstructured":"He Z, Cai Z, Yu J. Latent-data privacy preserving with customized data utility for social network data. IEEE Transactions on Vehicular Technology, 2018, 67(1): 665-673.","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"1910_CR35","doi-asserted-by":"publisher","unstructured":"Nie Y, Yang W, Huang L, Xie X, Zhao Z, Wang S. A utilityoptimized framework for personalized private histogram estimation. IEEE Transactions on Knowledge and Data Engineering. doi:\n                    https:\/\/doi.org\/10.1109\/TKDE.2018.2841360\n                    \n                  .","DOI":"10.1109\/TKDE.2018.2841360"},{"key":"1910_CR36","unstructured":"McAuley J, Leskovec J. Social circles: Google+. \n                    https:\/\/snap.stanford.edu\/data\/egonets-Gplus.html\n                    \n                  , Nov. 2018."}],"container-title":["Journal of Computer Science and Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11390-019-1910-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11390-019-1910-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11390-019-1910-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,21]],"date-time":"2020-03-21T00:13:47Z","timestamp":1584749627000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11390-019-1910-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3]]},"references-count":36,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2019,3]]}},"alternative-id":["1910"],"URL":"https:\/\/doi.org\/10.1007\/s11390-019-1910-3","relation":{},"ISSN":["1000-9000","1860-4749"],"issn-type":[{"value":"1000-9000","type":"print"},{"value":"1860-4749","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,3]]},"assertion":[{"value":"28 June 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 January 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 March 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}