{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T15:04:47Z","timestamp":1774364687073,"version":"3.50.1"},"reference-count":41,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U22B2026"],"award-info":[{"award-number":["U22B2026"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computers &amp; Security"],"published-print":{"date-parts":[[2026,6]]},"DOI":"10.1016\/j.cose.2026.104867","type":"journal-article","created":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T00:13:51Z","timestamp":1771460031000},"page":"104867","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Personalized differential privacy for high-dimensional data: A random sampling and pruning privacy tree approach"],"prefix":"10.1016","volume":"165","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7887-7203","authenticated-orcid":false,"given":"Zhongyuan","family":"Qin","sequence":"first","affiliation":[]},{"given":"Kefei","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Yuchuan","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Liquan","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Yubo","family":"Song","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.cose.2026.104867_bib0011","series-title":"Proceedings of the 2016 ACM SIGSAC conference on computer and communications security","first-page":"308","article-title":"Deep learning with differential privacy","author":"Abadi","year":"2016"},{"key":"10.1016\/j.cose.2026.104867_bib0008","series-title":"Proceedings of the 24th ACM SIGKDD international conference on knowledge discovery & data mining","first-page":"2867","article-title":"The us census bureau adopts differential privacy","author":"Abowd","year":"2018"},{"key":"10.1016\/j.cose.2026.104867_bib0026","unstructured":"Alaggan, M., Gambs, S., Kermarrec,A., Heterogeneous differential privacy, arXiv preprint arXiv:1504.06998 (2015)."},{"issue":"10","key":"10.1016\/j.cose.2026.104867_bib0014","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3559540","article-title":"Generative adversarial networks in time series: a systematic literature review","volume":"55","author":"Brophy","year":"2023","journal-title":"ACM Comput. Surv."},{"key":"10.1016\/j.cose.2026.104867_bib0001","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.ins.2022.09.004","article-title":"A decision-support framework for data anonymization with application to machine learning processes","volume":"613","author":"Caruccio","year":"2022","journal-title":"Inf. Sci."},{"issue":"2","key":"10.1016\/j.cose.2026.104867_bib0018","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3606017","article-title":"Privacy and fairness in federated learning: on the perspective of tradeoff","volume":"56","author":"Chen","year":"2023","journal-title":"ACM Comput. Surv."},{"key":"10.1016\/j.cose.2026.104867_bib0019","doi-asserted-by":"crossref","first-page":"4422","DOI":"10.1109\/TIFS.2023.3293961","article-title":"Differentially private deep learning with dynamic privacy budget allocation and adaptive optimization","volume":"18","author":"Chen","year":"2023","journal-title":"IEEE Trans. Inf. Forensic Secur."},{"issue":"1","key":"10.1016\/j.cose.2026.104867_bib0039","article-title":"Aldp-fl for adaptive local differential privacy in federated learning","volume":"15","author":"Cui","year":"2025","journal-title":"Sci. Rep."},{"key":"10.1016\/j.cose.2026.104867_bib0034","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.pmcj.2018.06.005","article-title":"Personalized-location differentially private data analysis on trajectory databases[J]","volume":"49","author":"Deldar","year":"2018","journal-title":"Pervasive and Mobile Comput."},{"key":"10.1016\/j.cose.2026.104867_bib0035","unstructured":"Dua, D., Graff, C., Uci machine learning repository, 2017."},{"key":"10.1016\/j.cose.2026.104867_bib0002","series-title":"Differential privacy, International colloquium on automata, languages, and programming","first-page":"1","author":"Dwork","year":"2006"},{"key":"10.1016\/j.cose.2026.104867_bib0003","series-title":"Differential privacy: a survey of results, International conference on theory and applications of models of computation","first-page":"1","author":"Dwork","year":"2008"},{"key":"10.1016\/j.cose.2026.104867_bib0009","series-title":"Proceedings of the 2014 ACM SIGSAC conference on computer and communications security","first-page":"1054","article-title":"Rappor: randomized aggregatable privacy-preserving ordinal response","author":"Erlingsson","year":"2014"},{"key":"10.1016\/j.cose.2026.104867_bib0016","series-title":"Differentially private federated learning: a client level perspective","author":"Geyer","year":"2017"},{"issue":"1","key":"10.1016\/j.cose.2026.104867_bib0007","doi-asserted-by":"crossref","first-page":"186","DOI":"10.1038\/s41746-023-00927-3","article-title":"Harnessing the power of synthetic data in healthcare: innovation, application, and privacy","volume":"6","author":"Giuffr\u00e8","year":"2023","journal-title":"NPJ Digit. Med."},{"key":"10.1016\/j.cose.2026.104867_bib0028","series-title":"Dk-personalization: publishing network statistics with personalized differential privacy","first-page":"194","author":"Iftikhar","year":"2022"},{"key":"10.1016\/j.cose.2026.104867_bib0025","series-title":"2015 IEEE 31St international conference on data engineering","first-page":"1023","article-title":"Conservative or liberal? Personalized differential privacy","author":"Jorgensen","year":"2015"},{"issue":"1\u20132","key":"10.1016\/j.cose.2026.104867_bib0017","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1561\/2200000083","article-title":"Advances and open problems in federated learning","volume":"14","author":"Kairouz","year":"2021","journal-title":"Foundations and Trends\u00ae in Machine Learning"},{"key":"10.1016\/j.cose.2026.104867_bib0022","doi-asserted-by":"crossref","first-page":"1196","DOI":"10.1109\/TIFS.2022.3231786","article-title":"Dplanner: a privacy budgeting system for utility","volume":"18","author":"L","year":"2023","journal-title":"IEEE Trans. Inf. Forensic Secur."},{"key":"10.1016\/j.cose.2026.104867_bib0013","series-title":"Differentially private deep learning with direct feedback alignment","author":"Lee","year":"2020"},{"key":"10.1016\/j.cose.2026.104867_bib0033","series-title":"Advances in Knowledge Discovery and Data Mining: 21st Pacific-Asia Conference, PAKDD 2017, Jeju, South Korea, May 23-26, 2017, Proceedings, Part I 21","first-page":"615","article-title":"Partitioning-based mechanisms under personalized differential privacy","author":"Li","year":"2017"},{"issue":"9","key":"10.1016\/j.cose.2026.104867_bib0032","doi-asserted-by":"crossref","DOI":"10.1145\/3555803","article-title":"Trustworthy ai: from principles to practices","volume":"55","author":"Li","year":"2023","journal-title":"ACM Comput. Surv."},{"issue":"4","key":"10.1016\/j.cose.2026.104867_bib0027","doi-asserted-by":"crossref","first-page":"828","DOI":"10.14778\/3503585.3503592","article-title":"Projected federated averaging with heterogeneous differential privacy, Proc","volume":"15","author":"Liu","year":"2021","journal-title":"VLDB Endow"},{"key":"10.1016\/j.cose.2026.104867_bib0004","unstructured":"Lu, Y., Shen, M., Wang, H., Wang, X., van Rechem, C., Fu, T., Wei, W., Machine learning for synthetic data generation: a review, arXiv preprint arXiv:2302.04062 (2023)."},{"key":"10.1016\/j.cose.2026.104867_bib0021","doi-asserted-by":"crossref","first-page":"5359","DOI":"10.1109\/TIFS.2023.3306159","article-title":"Grafting laplace and gaussian distributions: a new noise mechanism for differential privacy","volume":"18","author":"M","year":"2023","journal-title":"IEEE Trans. Inf. Forensic Secur."},{"key":"10.1016\/j.cose.2026.104867_bib0015","series-title":"Learning differentially private recurrent language models","author":"Mcmahan","year":"2017"},{"key":"10.1016\/j.cose.2026.104867_bib0031","series-title":"IEEE INFOCOM 2021-IEEE conference on computer communications","first-page":"1","article-title":"Adapdp: adaptive personalized differential privacy","author":"Niu","year":"2021"},{"key":"10.1016\/j.cose.2026.104867_bib0012","series-title":"Scalable private learning with pate","author":"Papernot","year":"2018"},{"key":"10.1016\/j.cose.2026.104867_bib0023","doi-asserted-by":"crossref","first-page":"2394","DOI":"10.1109\/TIFS.2022.3185770","article-title":"Offset-symmetric gaussians for differential privacy","volume":"17","author":"S","year":"2022","journal-title":"IEEE Trans. Inf. Forensic Secur."},{"key":"10.1016\/j.cose.2026.104867_bib0005","series-title":"2021 IEEE 37th international conference on data engineering (ICDE)","first-page":"169","article-title":"P3gm: private high-dimensional data release via privacy preserving phased generative model","author":"Takagi","year":"2021"},{"issue":"9","key":"10.1016\/j.cose.2026.104867_bib0020","doi-asserted-by":"crossref","first-page":"3388","DOI":"10.1109\/TMC.2021.3056991","article-title":"User-level privacy-preserving federated learning: analysis and performance optimization","volume":"21","author":"Wei","year":"2021","journal-title":"IEEE. Trans. Mob. Comput."},{"key":"10.1016\/j.cose.2026.104867_bib0030","doi-asserted-by":"crossref","first-page":"4488","DOI":"10.1109\/TIFS.2023.3293417","article-title":"Personalized federated learning with differential privacy and convergence guarantee","volume":"18","author":"Wei","year":"2023","journal-title":"IEEE Trans. Inf. Forensic Secur."},{"key":"10.1016\/j.cose.2026.104867_bib0038","unstructured":"Xie, L., Lin, K., Wang, S., Wang, F., Zhou, J., Differentially private generative adversarial network, arXiv preprint arXiv:1802.06739 (2018)."},{"key":"10.1016\/j.cose.2026.104867_bib0024","doi-asserted-by":"crossref","first-page":"2524","DOI":"10.1109\/TIFS.2022.3189532","article-title":"K-means clustering with local d\u1d6a-privacy for privacy-preserving data analysis","volume":"17","author":"Y","year":"2022","journal-title":"IEEE Trans. Inf. Forensic Secur."},{"key":"10.1016\/j.cose.2026.104867_bib0029","first-page":"72181","article-title":"Dynamic personalized federated learning with adaptive differential privacy","volume":"36","author":"Yang","year":"2023","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"10.1016\/j.cose.2026.104867_bib0040","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2025.111139","article-title":"Differential private federated learning with per-sample adaptive clipping and layer-wise gradient perturbation","volume":"261","author":"Yuan","year":"2025","journal-title":"Comput. Netw."},{"issue":"6","key":"10.1016\/j.cose.2026.104867_bib0042","doi-asserted-by":"crossref","first-page":"5569","DOI":"10.1109\/TMC.2025.3533090","article-title":"Adapldp-fl: an adaptive local differential privacy for federated learning","volume":"24","author":"Yue","year":"2025","journal-title":"IEEE. Trans. Mob. Comput."},{"issue":"4","key":"10.1016\/j.cose.2026.104867_bib0037","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3134428","article-title":"Privbayes: private data release via bayesian networks","volume":"42","author":"Zhang","year":"2017","journal-title":"ACM Trans. Database Syst. (TODS)"},{"key":"10.1016\/j.cose.2026.104867_bib0036","series-title":"{Privsyn}: differentially private data synthesis, 30th USENIX Security Symposium (USENIX Security 21)","first-page":"929","author":"Zhang","year":"2021"},{"issue":"1","key":"10.1016\/j.cose.2026.104867_bib0041","doi-asserted-by":"crossref","first-page":"278","DOI":"10.1109\/TC.2024.3477971","article-title":"Balancing privacy and accuracy using significant gradient protection in federated learning","volume":"74","author":"Zhang","year":"2025","journal-title":"IEEE Trans. Comput."},{"issue":"5","key":"10.1016\/j.cose.2026.104867_bib0006","first-page":"700","article-title":"Privacy-preserving methods for streaming data in wearable medical devices based on local differential privacy[J]","volume":"25","author":"Zhao","year":"2025","journal-title":"Netinfo Security"}],"container-title":["Computers &amp; Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S016740482600043X?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S016740482600043X?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T14:19:22Z","timestamp":1774361962000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S016740482600043X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,6]]},"references-count":41,"alternative-id":["S016740482600043X"],"URL":"https:\/\/doi.org\/10.1016\/j.cose.2026.104867","relation":{},"ISSN":["0167-4048"],"issn-type":[{"value":"0167-4048","type":"print"}],"subject":[],"published":{"date-parts":[[2026,6]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Personalized differential privacy for high-dimensional data: A random sampling and pruning privacy tree approach","name":"articletitle","label":"Article Title"},{"value":"Computers & Security","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.cose.2026.104867","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier Ltd. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"104867"}}