{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T04:52:43Z","timestamp":1755838363218,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,1]]},"DOI":"10.1109\/comsnets.2014.6734877","type":"proceedings-article","created":{"date-parts":[[2014,2,13]],"date-time":"2014-02-13T16:08:18Z","timestamp":1392307698000},"page":"1-8","source":"Crossref","is-referenced-by-count":8,"title":["Loki: A privacy-conscious platform for crowdsourced surveys"],"prefix":"10.1109","author":[{"given":"Thivya","family":"Kandappu","sequence":"first","affiliation":[]},{"given":"Vijay","family":"Sivaraman","sequence":"additional","affiliation":[]},{"given":"Arik","family":"Friedman","sequence":"additional","affiliation":[]},{"given":"Roksana","family":"Boreli","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/773153.773174"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/375551.375602"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/775079.775080"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/1401890.1401926"},{"journal-title":"Simple Demographics Often Identify People Uniquely","year":"2000","author":"sweeney","key":"16"},{"key":"13","article-title":"Protecting privacy when disclosing information: K-anonymity and its enforcement through generalization and suppression","author":"samarati","year":"1998","journal-title":"CS Laboratory SRI International"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2006.1"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335438"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1965.10480775"},{"key":"21","article-title":"Calibrating noise to sensitivity in private data analysis","author":"dwork","year":"2006","journal-title":"TCC"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2003.1250908"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79228-4_1"},{"key":"23","article-title":"Our data, ourselves: Privacy via distributed noise generation","author":"dwork","year":"2006","journal-title":"Eurocrypt"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1145\/1807167.1807247"},{"key":"25","article-title":"Adnostic: Privacy preserving targeted advertising","author":"toubiana","year":"2010","journal-title":"NDSS"},{"journal-title":"Controlling Privacy Loss in Crowdsourcing Platforms One Question at A Time","year":"2013","author":"kandappu","key":"26"},{"journal-title":"Google Consumer Surveys","year":"0","key":"3"},{"journal-title":"Experimental Psychology The Roar of the Crowd","year":"2012","key":"2"},{"key":"10","article-title":"Analyzing privacy in enterprise packet trace anonymization","author":"ribeiro","year":"2008","journal-title":"NDSS"},{"journal-title":"Amazon Mechanical Turk","year":"0","key":"1"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/2070562.2070575"},{"key":"6","article-title":"Take it or leave it: Running a survey when privacy comes at a cost","author":"ligett","year":"2012","journal-title":"WINE"},{"key":"5","article-title":"Privad: Practical privacy in online advertising","author":"guha","year":"2011","journal-title":"NSDI"},{"key":"4","article-title":"Towards statistical queries over distributed private user data","author":"chen","year":"2012","journal-title":"NSDI"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.33"},{"key":"8","first-page":"7749","volume":"1","year":"0","journal-title":"A Face Is Exposed for AOL Searcher"}],"event":{"name":"2014 Sixth International Conference on Communication Systems and Networks (COMSNETS)","start":{"date-parts":[[2014,1,6]]},"location":"Bangalore, India","end":{"date-parts":[[2014,1,10]]}},"container-title":["2014 Sixth International Conference on Communication Systems and Networks (COMSNETS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6720258\/6734849\/06734877.pdf?arnumber=6734877","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T19:41:58Z","timestamp":1490298118000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6734877\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,1]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/comsnets.2014.6734877","relation":{},"subject":[],"published":{"date-parts":[[2014,1]]}}}