{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,2]],"date-time":"2025-11-02T16:08:50Z","timestamp":1762099730258,"version":"build-2065373602"},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T00:00:00Z","timestamp":1701302400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T00:00:00Z","timestamp":1701302400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J. Comput. Sci. Technol."],"published-print":{"date-parts":[[2023,12]]},"DOI":"10.1007\/s11390-023-1346-7","type":"journal-article","created":{"date-parts":[[2024,1,31]],"date-time":"2024-01-31T13:02:41Z","timestamp":1706706161000},"page":"1403-1422","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Hadamard Encoding Based Frequent Itemset Mining under Local Differential Privacy"],"prefix":"10.1007","volume":"38","author":[{"given":"Dan","family":"Zhao","sequence":"first","affiliation":[]},{"given":"Su-Yun","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Hong","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Rui-Xuan","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Cui-Ping","family":"Li","sequence":"additional","affiliation":[]},{"given":"Xiao-Ying","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,11,30]]},"reference":[{"key":"1346_CR1","doi-asserted-by":"publisher","unstructured":"Li N H, Qardaji W, Su D, Cao J N. PrivBasis: Frequent itemset mining with differential privacy. Proceedings of the VLDB Endowment, 2012, 5(11): 1340\u20131351. https:\/\/doi.org\/10.14778\/2350229.2350251.","DOI":"10.14778\/2350229.2350251"},{"key":"1346_CR2","doi-asserted-by":"publisher","first-page":"28877","DOI":"10.1109\/ACCESS.2018.2839752","volume":"6","author":"XY Xiong","year":"2018","unstructured":"Xiong X Y, Chen F, Huang P Z, Tian M M, Hu X F, Chen B D, Qin J. Frequent itemsets mining with differential privacy over large-scale data. IEEE Access, 2018, 6: 28877\u201328889. https:\/\/doi.org\/10.1109\/ACCESS.2018.2839752.","journal-title":"IEEE Access"},{"key":"1346_CR3","doi-asserted-by":"publisher","unstructured":"Wang T H, Li N H, Jha S. Locally differentially private frequent itemset mining. In Proc. the 2018 IEEE Symposium on Security and Privacy (SP), May 2018, pp.127\u2013143. https:\/\/doi.org\/10.1109\/SP.2018.00035.","DOI":"10.1109\/SP.2018.00035"},{"key":"1346_CR4","doi-asserted-by":"publisher","unstructured":"Agrawal R, Srikant R. Fast algorithms for mining association rules. In Proc. the 20th International Conference on Very Large Data Bases, Sept. 1994, pp.487\u2013499. https:\/\/doi.org\/10.5555\/645920.672836.","DOI":"10.5555\/645920.672836"},{"key":"1346_CR5","doi-asserted-by":"publisher","unstructured":"Adar E, Weld D S, Bershad B N, Gribble S S. Why we search: Visualizing and predicting user behavior. In Proc. the 16th International Conference on World Wide Web, May 2007, pp.161\u2013170. https:\/\/doi.org\/10.1145\/1242572.1242595.","DOI":"10.1145\/1242572.1242595"},{"key":"1346_CR6","doi-asserted-by":"publisher","unstructured":"Brin S, Motwani R, Silverstein C. Beyond market baskets: Generalizing association rules to correlations. In Proc. the 1997 ACM SIGMOD International Conference on Management of Data, Jun. 1997, pp.265\u2013276. https:\/\/doi.org\/10.1145\/253260.253327.","DOI":"10.1145\/253260.253327"},{"key":"1346_CR7","doi-asserted-by":"publisher","unstructured":"Dwork C. Differential privacy: A survey of results. In Proc. the 5th International Conference on Theory and Applications of Models of Computation, Apr. 2008. https:\/\/doi.org\/10.1007\/978-3-540-79228-4_1.","DOI":"10.1007\/978-3-540-79228-4_1"},{"key":"1346_CR8","doi-asserted-by":"publisher","unstructured":"Dwork C, McSherry F, Nissim K, Smith A. Calibrating noise to sensitivity in private data analysis. In Proc. the 3rd Theory of Cryptography Conference, Mar. 2006, pp.265\u2013284. https:\/\/doi.org\/10.1007\/11681878_14.","DOI":"10.1007\/11681878_14"},{"key":"1346_CR9","doi-asserted-by":"publisher","unstructured":"Wang S W, Huang L S, Nie Y W, Wang P Z, Xu H L, Yang W. PrivSet: Set-valued data analyses with locale differential privacy. In Proc. the 2018 IEEE Conference on Computer Communications, Apr. 2018, pp.1088\u20131096. https:\/\/doi.org\/10.1109\/INFOCOM.2018.8486234.","DOI":"10.1109\/INFOCOM.2018.8486234"},{"issue":"7","key":"1346_CR10","doi-asserted-by":"publisher","first-page":"1875","DOI":"10.1109\/TKDE.2015.2399310","volume":"27","author":"S Su","year":"2015","unstructured":"Su S, Xu S Z, Cheng X, Li Z Y, Yang F C. Differentially private frequent itemset mining via transaction splitting. IEEE Trans. Knowledge and Data Engineering, 2015, 27(7): 1875\u20131891. https:\/\/doi.org\/10.1109\/TKDE.2015.2399310.","journal-title":"IEEE Trans. Knowledge and Data Engineering"},{"key":"1346_CR11","doi-asserted-by":"publisher","unstructured":"Qin Z, Yang Y, Yu T, Khalil I, Xiao X K, Ren K. Heavy hitter estimation over set-valued data with local differential privacy. In Proc. the 2016 ACM SIGSAC Conference on Computer and Communications Security, Oct. 2016, pp.192\u2013203. https:\/\/doi.org\/10.1145\/2976749.2978409.","DOI":"10.1145\/2976749.2978409"},{"key":"1346_CR12","doi-asserted-by":"publisher","unstructured":"Cormode G, Jha S, Kulkarni T, Li N H, Srivastava D, Wang T H. Privacy at scale: Local differential privacy in practice. In Proc. the 2018 International Conference on Management of Data, May 2018, pp.1655\u20131658. https:\/\/doi.org\/10.1145\/3183713.3197390.","DOI":"10.1145\/3183713.3197390"},{"key":"1346_CR13","doi-asserted-by":"publisher","unstructured":"Zeng C, Naughton J F, Cai J Y. On differentially private frequent itemset mining. Proceedings of the VLDB Endowment, 2012, 6(1): 25\u201336. https:\/\/doi.org\/10.14778\/2428536.2428539.","DOI":"10.14778\/2428536.2428539"},{"key":"1346_CR14","doi-asserted-by":"publisher","unstructured":"Vadhan S. The complexity of differential privacy. In Tutorials on the Foundations of Cryptography, Lindell Y (ed.), Springer, 2017, pp.347\u2013450. https:\/\/doi.org\/10.1007\/978-3-319-57048-8_7.","DOI":"10.1007\/978-3-319-57048-8_7"},{"issue":"4","key":"1346_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-031-02350-7","volume":"8","author":"NH Li","year":"2016","unstructured":"Li N H, Lyu M, Su D, Yang W N. Differential privacy: From theory to practice. Synthesis Lectures on Information Security, Privacy, & Trust, 2016, 8(4): 1\u2013138. https:\/\/doi.org\/10.1007\/978-3-031-02350-7.","journal-title":"Synthesis Lectures on Information Security, Privacy, & Trust"},{"key":"1346_CR16","unstructured":"Papernot N, Song S, Mironov I, Raghunathan A, Talwar K, Erlingsson \u00da. Scalable private learning with PATE. arXiv: 1802.08908, 2018. https:\/\/arxiv.org\/abs\/1802.08908, Dec. 2023."},{"key":"1346_CR17","unstructured":"Kulkarni T, Cormode G, Srivastava D. Marginal release under local differential privacy. arXiv: 1711.02952, 2017. https:\/\/arxiv.org\/abs\/1711.02952, Dec. 2023."},{"key":"1346_CR18","unstructured":"Nguy\u00ean T T, Xiao X K, Yang Y, Hui S C, Shin H, Shin J. Collecting and analyzing data from smart device users with local differential privacy. arXiv: 1606.05053, 2016. https:\/\/arxiv.org\/abs\/1606.05053, Dec. 2023."},{"key":"1346_CR19","doi-asserted-by":"publisher","unstructured":"Wang T H, Blocki J, Li N H, Jha S. Locally differentially private protocols for frequency estimation. In Proc. the 26th USENIX Conference on Security Symposium, Aug. 2017, pp.729\u2013745. https:\/\/doi.org\/10.5555\/3241189.3241247.","DOI":"10.5555\/3241189.3241247"},{"key":"1346_CR20","doi-asserted-by":"publisher","unstructured":"Bassily R, Smith A. Local, private, efficient protocols for succinct histograms. In Proc. the 47th Annual ACM Symposium on Theory of Computing, Jun. 2015, pp.127\u2013135. https:\/\/doi.org\/10.1145\/2746539.2746632.","DOI":"10.1145\/2746539.2746632"},{"issue":"2","key":"1346_CR21","doi-asserted-by":"publisher","first-page":"982","DOI":"10.1109\/TDSC.2019.2927695","volume":"18","author":"TH Wang","year":"2021","unstructured":"Wang T H, Li N H, Jha S. Locally differentially private heavy hitter identification. IEEE Trans. Dependable and Secure Computing, 2021, 18(2): 982\u2013993. https:\/\/doi.org\/10.1109\/TDSC.2019.2927695.","journal-title":"IEEE Trans. Dependable and Secure Computing"},{"key":"1346_CR22","doi-asserted-by":"publisher","unstructured":"Duchi J C, Wainwright M J, Jordan M I. Local privacy and minimax bounds: Sharp rates for probability estimation. In Proc. the 26th International Conference on Neural Information Processing Systems, Dec. 2013, pp.1529\u20131537. https:\/\/doi.org\/10.5555\/2999611.2999782.","DOI":"10.5555\/2999611.2999782"},{"key":"1346_CR23","doi-asserted-by":"publisher","unstructured":"Ye Q Q, Hu H B, Meng X F, Zheng H D. PrivKV: Keyvalue data collection with local differential privacy. In Proc. the 2019 IEEE Symposium on Security and Privacy (SP), May 2019, pp.317\u2013331. https:\/\/doi.org\/10.1109\/SP.2019.00018.","DOI":"10.1109\/SP.2019.00018"},{"key":"1346_CR24","doi-asserted-by":"publisher","unstructured":"Gu X L, Li M, Cheng Y Q, Xiong L, Cao Y. PCKV: Locally differentially private correlated key-value data collection with optimized utility. In Proc. the 29th USENIX Conference on Security Symposium, Aug. 2020, pp.967\u2013984. https:\/\/doi.org\/10.5555\/3489212.3489267.","DOI":"10.5555\/3489212.3489267"},{"key":"1346_CR25","doi-asserted-by":"publisher","unstructured":"Erlingsson \u00da, Feldman V, Mironov I, Raghunathan A, Talwar K, Thakurta A. Amplification by shuffling: From local to central differential privacy via anonymity. In Proc. the 30th Annual ACM-SIAM Symposium on Discrete Algorithms, Jan. 2019, pp.2468\u20132479. https:\/\/doi.org\/10.1137\/1.9781611975482.151.","DOI":"10.1137\/1.9781611975482.151"},{"issue":"521","key":"1346_CR26","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1080\/01621459.2017.1389735","volume":"113","author":"JC Duchi","year":"2018","unstructured":"Duchi J C, Jordan M I, Wainwright M J. Minimax optimal procedures for locally private estimation. Journal of the American Statistical Association, 2018, 113(521): 182\u2013201. https:\/\/doi.org\/10.1080\/01621459.2017.1389735.","journal-title":"Journal of the American Statistical Association"},{"key":"1346_CR27","doi-asserted-by":"publisher","unstructured":"Wang N, Xiao X K, Yang Y, Zhao J, Hui S C, Shin H, Shin J, Yu G. Collecting and analyzing multidimensional data with local differential privacy. In Proc. the 35th International Conference on Data Engineering (ICDE), Apr. 2019, pp.638\u2013649. https:\/\/doi.org\/10.1109\/ICDE.2019.00063.","DOI":"10.1109\/ICDE.2019.00063"},{"key":"1346_CR28","doi-asserted-by":"publisher","unstructured":"Liu R X, Cao Y, Chen H, Guo R Y, Yoshikawa M. FLAME: Differentially private federated learning in the shuffle model. In Proc. the AAAI Conference on Artificial Intelligence, May 2021, pp.8688\u20138696. https:\/\/doi.org\/10.1609\/aaai.v35i10.17053.","DOI":"10.1609\/aaai.v35i10.17053"},{"key":"1346_CR29","doi-asserted-by":"publisher","unstructured":"Chen R, Li H R, Qin A K, Kasiviswanathan S P, Jin H. Private spatial data aggregation in the local setting. In Proc. the 32nd IEEE International Conference on Data Engineering (ICDE), May 2016, pp.289\u2013300. https:\/\/doi.org\/10.1109\/ICDE.2016.7498248.","DOI":"10.1109\/ICDE.2016.7498248"},{"issue":"5","key":"1346_CR30","doi-asserted-by":"publisher","first-page":"2365","DOI":"10.1109\/TDSC.2019.2949041","volume":"18","author":"ME Gursoy","year":"2021","unstructured":"Gursoy M E, Tamersoy A, Truex S, Wei W Q, Liu L. Secure and utility-aware data collection with condensed local differential privacy. IEEE Trans. Dependable and Secure Computing, 2021, 18(5): 2365\u20132378. https:\/\/doi.org\/10.1109\/TDSC.2019.2949041.","journal-title":"IEEE Trans. Dependable and Secure Computing"},{"key":"1346_CR31","doi-asserted-by":"publisher","unstructured":"Murakami T, Kawamoto Y. Utility-optimized local differential privacy mechanisms for distribution estimation. In Proc. the 28th USENIX Conference on Security Symposium, Aug. 2019, pp.1877\u20131894. https:\/\/doi.org\/10.5555\/3361338.3361468.","DOI":"10.5555\/3361338.3361468"},{"key":"1346_CR32","doi-asserted-by":"publisher","unstructured":"Gu X L, Li M, Xiong L, Cao Y. Providing input-discriminative protection for local differential privacy. In Proc. the 36th IEEE International Conference on Data Engineering (ICDE), Apr. 2020, pp.505\u2013516. https:\/\/doi.org\/10.1109\/ICDE48307.2020.00050.","DOI":"10.1109\/ICDE48307.2020.00050"},{"key":"1346_CR33","doi-asserted-by":"publisher","unstructured":"Han X, Wang M, Zhang X J, Meng X F. Differentially private top-k query over mapreduce. In Proc. the 4th International Workshop on Cloud Data Management, Oct. 2012, pp.25\u201332. https:\/\/doi.org\/10.1145\/2390021.2390027.","DOI":"10.1145\/2390021.2390027"},{"key":"1346_CR34","doi-asserted-by":"publisher","unstructured":"Evfimievski A, Gehrke J, Srikant R. Limiting privacy breaches in privacy preserving data mining. In Proc. the 22nd ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, Jun. 2003, pp.211\u2013222. https:\/\/doi.org\/10.1145\/773153.773174.","DOI":"10.1145\/773153.773174"},{"key":"1346_CR35","doi-asserted-by":"publisher","unstructured":"Bassily R, Nissim K, Stemmer U, Thakurta A. Practical locally private heavy hitters. In Proc. the 31st International Conference on Neural Information Processing Systems, Dec. 2017, pp.2288\u20132296. https:\/\/doi.org\/10.5555\/3294771.3294989.","DOI":"10.5555\/3294771.3294989"},{"key":"1346_CR36","doi-asserted-by":"publisher","unstructured":"Bun M, Nelson J, Stemmer U. Heavy hitters and the structure of local privacy. In Proc. the 35th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems, May 2018, pp.435\u2013447. https:\/\/doi.org\/10.1145\/3196959.3196981.","DOI":"10.1145\/3196959.3196981"},{"key":"1346_CR37","unstructured":"Acharya J, Sun Z T, Zhang H. Hadamard response: Estimating distributions privately, efficiently, and with little communication. arXiv: 1802.04705, 2018. https:\/\/arxiv.org\/abs\/1802.04705, Dec. 2023."},{"key":"1346_CR38","unstructured":"Liu Y H, Suresh A T, Yu F, Kumar S, Riley M. Learning discrete distributions: User vs item-level privacy. arXiv: 2007.13660, 2020. https:\/\/arxiv.org\/abs\/2007.13660, Dec. 2023."},{"key":"1346_CR39","doi-asserted-by":"publisher","unstructured":"Kairouz P, Oh S, Viswanath P. Extremal mechanisms for local differential privacy. In Proc. the 27th International Conference on Neural Information Processing Systems, Dec. 2014, pp.2879\u20132887. https:\/\/doi.org\/10.5555\/2969033.2969148.","DOI":"10.5555\/2969033.2969148"}],"container-title":["Journal of Computer Science and Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11390-023-1346-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11390-023-1346-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11390-023-1346-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,31]],"date-time":"2024-01-31T13:21:27Z","timestamp":1706707287000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11390-023-1346-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,30]]},"references-count":39,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2023,12]]}},"alternative-id":["1346"],"URL":"https:\/\/doi.org\/10.1007\/s11390-023-1346-7","relation":{},"ISSN":["1000-9000","1860-4749"],"issn-type":[{"type":"print","value":"1000-9000"},{"type":"electronic","value":"1860-4749"}],"subject":[],"published":{"date-parts":[[2023,11,30]]},"assertion":[{"value":"31 January 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 February 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 November 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}