{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T13:37:06Z","timestamp":1730209026823,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,5]]},"DOI":"10.1109\/cns.2018.8433174","type":"proceedings-article","created":{"date-parts":[[2018,8,13]],"date-time":"2018-08-13T22:09:06Z","timestamp":1534198146000},"page":"1-9","source":"Crossref","is-referenced-by-count":0,"title":["PSCluster: Differentially Private Spatial Cluster Detection for Mobile Crowdsourcing Applications"],"prefix":"10.1109","author":[{"given":"Boyang","family":"Hu","sequence":"first","affiliation":[]},{"given":"Baojian","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Qiben","family":"Yan","sequence":"additional","affiliation":[]},{"given":"Adil","family":"Alim","sequence":"additional","affiliation":[]},{"given":"Feng","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Huacheng","family":"Zeng","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"265","article-title":"Calibrating noise to sensitivity in private data analysis","author":"dwork","year":"2006","journal-title":"Graph Theory, Proceedings of the Conference on Graph Theory"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.14778\/2732977.2732989"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.41"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/79.543975"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.jfranklin.2011.01.005"},{"key":"ref15","first-page":"4","article-title":"The prize collecting steiner tree problem: theory and practice","volume":"1","author":"johnson","year":"2000","journal-title":"SODA"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2015.2457939"},{"key":"ref17","first-page":"928","article-title":"A nearly-linear time framework for graph-structured sparsity","author":"hegde","year":"2015","journal-title":"Proc of ICML"},{"key":"ref18","article-title":"A generalized matching pursuit approach for graph-structured sparsity","author":"chen","year":"2016","journal-title":"Proceedings of the 25th International Joint Conference on Artificial Intelligence (IJCAI&#x2019;16)"},{"key":"ref19","volume":"32","author":"nishizeki","year":"1988","journal-title":"Planar Graphs Theory and Algorithms"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijforecast.2008.12.002"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2013.66"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1014052.1014082"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623361"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1186\/1476-072X-8-20"},{"year":"0","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2016.7524458"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-9868.2011.01014.x"},{"key":"ref9","first-page":"1","article-title":"Differential privacy","author":"dwork","year":"2006","journal-title":"Proc of ICALP"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7060488"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623674"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1111\/j.0016-7363.2006.00679.x"},{"key":"ref21","first-page":"1028","article-title":"Sparsistency of the edge lasso over graphs","volume":"22","author":"sharpnack","year":"2012","journal-title":"AISTATS"},{"journal-title":"New york city dataset","year":"0","author":"donovan","key":"ref24"},{"key":"ref23","first-page":"144","article-title":"Evaluating disease outbreak detection methods: Benchmark data and power calculations","volume":"53","author":"kulldorff","year":"2004","journal-title":"Morbidity and Mortality Weekly Report"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2809695.2809719"},{"key":"ref25","first-page":"39","article-title":"SPPEAR: Security & privacy-preserving architecture for participatory-sensing applications","author":"gisdakis","year":"2014","journal-title":"Proc of WiSec"}],"event":{"name":"2018 IEEE Conference on Communications and Network Security (CNS)","start":{"date-parts":[[2018,5,30]]},"location":"Beijing","end":{"date-parts":[[2018,6,1]]}},"container-title":["2018 IEEE Conference on Communications and Network Security (CNS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8410986\/8433121\/08433174.pdf?arnumber=8433174","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T12:43:24Z","timestamp":1643201004000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8433174\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/cns.2018.8433174","relation":{},"subject":[],"published":{"date-parts":[[2018,5]]}}}