{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,17]],"date-time":"2025-05-17T05:25:00Z","timestamp":1747459500735},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,8]]},"DOI":"10.1109\/eusipco.2016.7760501","type":"proceedings-article","created":{"date-parts":[[2016,12,19]],"date-time":"2016-12-19T16:08:29Z","timestamp":1482163709000},"page":"1513-1517","source":"Crossref","is-referenced-by-count":3,"title":["Toward privacy-preserving diffusion strategies for adaptation and learning over networks"],"prefix":"10.1109","author":[{"given":"Ibrahim","family":"El Khalil Harrane","sequence":"first","affiliation":[]},{"given":"Remi","family":"Flamary","sequence":"additional","affiliation":[]},{"given":"Cedric","family":"Richard","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2014.2333560"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2015.2412918"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2016.2518991"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/4236.968832"},{"journal-title":"Privacy Preserving Data Mining","year":"2011","author":"friedman","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335438"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/974121.974131"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2016.7472545"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-004-0173-6"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-010-0362-4"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2012.2192928"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2306253"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2008.2009515"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2015.06.006"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2007.896034"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.843546"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.2231991"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2012.2217338"},{"key":"ref1","first-page":"322","article-title":"Diffusion adaptation over networks","author":"sayed","year":"2014","journal-title":"Academic Press Library in Signal Processing"},{"key":"ref20","article-title":"Privacy preserving data classification with rotation perturbation","author":"chen","year":"2005","journal-title":"Proc IEEE ICDM"},{"article-title":"Differentially private online learning","year":"2011","author":"jain","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-70992-5_7"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2009.2033729"},{"key":"ref23","first-page":"933","article-title":"A differentially private stochastic gradient descent algorithm for multiparty classification","author":"rajkumar","year":"2012","journal-title":"International Conference on Artificial Intelligence and Statistics"},{"journal-title":"Fundamentals of Adaptive Filtering","year":"2003","author":"sayed","key":"ref26"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"359","DOI":"10.1007\/978-0-387-70992-5_15","article-title":"A survey of attack techniques on privacy-preserving data perturbation methods","author":"liu","year":"2008","journal-title":"Privacy-preserving data mining"}],"event":{"name":"2016 24th European Signal Processing Conference (EUSIPCO)","start":{"date-parts":[[2016,8,29]]},"location":"Budapest, Hungary","end":{"date-parts":[[2016,9,2]]}},"container-title":["2016 24th European Signal Processing Conference (EUSIPCO)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7740646\/7760191\/07760501.pdf?arnumber=7760501","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,16]],"date-time":"2019-09-16T14:41:59Z","timestamp":1568644919000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7760501\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/eusipco.2016.7760501","relation":{},"subject":[],"published":{"date-parts":[[2016,8]]}}}