{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T16:16:46Z","timestamp":1761581806085},"reference-count":13,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,1]]},"DOI":"10.1109\/ccnc.2019.8651689","type":"proceedings-article","created":{"date-parts":[[2019,2,28]],"date-time":"2019-02-28T23:40:01Z","timestamp":1551397201000},"source":"Crossref","is-referenced-by-count":15,"title":["Sharing Social Networks Using a Novel Differentially Private Graph Model"],"prefix":"10.1109","author":[{"given":"Tianchong","family":"Gao","sequence":"first","affiliation":[]},{"given":"Feng","family":"Li","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068825"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6567099"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2008.4497459"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.14778\/1687627.1687734"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2016.7524585"},{"key":"ref3","first-page":"265","article-title":"Calibrating noise to sensitivity in private data analysis","author":"dwork","year":"2006","journal-title":"Theory Cryptogr Conf"},{"key":"ref6","first-page":"94","article-title":"Mechanism design via differential privacy. In Foundations of Computer Science","author":"mcsherry","year":"2007","journal-title":"2007 FOCS&#x2019;07 48th Annual IEEE Symposium on"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1151659.1159930"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SECON.2012.6275831"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.22"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-5906-5_752"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0010012"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2016.7524578"}],"event":{"name":"2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)","location":"Las Vegas, NV, USA","start":{"date-parts":[[2019,1,11]]},"end":{"date-parts":[[2019,1,14]]}},"container-title":["2019 16th IEEE Annual Consumer Communications &amp; Networking Conference (CCNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8648166\/8651666\/08651689.pdf?arnumber=8651689","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,15]],"date-time":"2022-07-15T03:09:11Z","timestamp":1657854551000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8651689\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/ccnc.2019.8651689","relation":{},"subject":[],"published":{"date-parts":[[2019,1]]}}}