{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,19]],"date-time":"2025-08-19T10:19:25Z","timestamp":1755598765096,"version":"3.37.3"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,5,23]],"date-time":"2022-05-23T00:00:00Z","timestamp":1653264000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,5,23]],"date-time":"2022-05-23T00:00:00Z","timestamp":1653264000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,5,23]]},"DOI":"10.1109\/icassp43922.2022.9747678","type":"proceedings-article","created":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T19:50:34Z","timestamp":1651089034000},"page":"2974-2978","source":"Crossref","is-referenced-by-count":2,"title":["Fldp: Flexible Strategy For Local Differential Privacy"],"prefix":"10.1109","author":[{"given":"Dan","family":"Zhao","sequence":"first","affiliation":[{"name":"Renmin University,Key Laboratory of Data Engineering and Knowledge Engineering of Ministry of Education,Beijing,China,100872"}]},{"given":"Hong","family":"Chen","sequence":"additional","affiliation":[{"name":"Renmin University,Key Laboratory of Data Engineering and Knowledge Engineering of Ministry of Education,Beijing,China,100872"}]},{"given":"Suyun","family":"Zhao","sequence":"additional","affiliation":[{"name":"Renmin University,Key Laboratory of Data Engineering and Knowledge Engineering of Ministry of Education,Beijing,China,100872"}]},{"given":"Ruixuan","family":"Liu","sequence":"additional","affiliation":[{"name":"Renmin University,Key Laboratory of Data Engineering and Knowledge Engineering of Ministry of Education,Beijing,China,100872"}]},{"given":"Cuiping","family":"Li","sequence":"additional","affiliation":[{"name":"Renmin University,Key Laboratory of Data Engineering and Knowledge Engineering of Ministry of Education,Beijing,China,100872"}]},{"given":"Xiaoying","family":"Zhang","sequence":"additional","affiliation":[{"name":"Renmin University,Key Laboratory of Data Engineering and Knowledge Engineering of Ministry of Education,Beijing,China,100872"}]}],"member":"263","reference":[{"key":"ref10","first-page":"3571","article-title":"Collecting telemetry data privately","author":"ding","year":"2017","journal-title":"Advances in neural information processing systems"},{"key":"ref11","first-page":"729","article-title":"Locally differentially private protocols for frequency estimation","author":"wang","year":"2017","journal-title":"Proc of the 26th USENIX Security Symposium"},{"key":"ref12","first-page":"729","article-title":"Locally differentially private protocols for frequency estimation","author":"wang","year":"2017","journal-title":"26th USENIX Security Symposium ( USENIX Security 17)"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2016.7498248"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2949041"},{"key":"ref15","first-page":"1877","article-title":"Utility-optimized local differential privacy mechanisms for distribution estimation","author":"murakami","year":"2019","journal-title":"28th USENIX Security Symposium ( USENIX Security 19)"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE48307.2020.00050"},{"key":"ref17","first-page":"2288","article-title":"Practical locally private heavy hitters","author":"bassily","year":"2017","journal-title":"Advances in neural information processing systems"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3196959.3196981"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79228-4_1"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.2200\/S00735ED1V01Y201609SPT018"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-57048-8_7"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660348"},{"article-title":"Scalable private learning with pate","year":"2018","author":"papernot","key":"ref5"},{"article-title":"Flame: Differentially private federated learning in the shuffle model","year":"2020","author":"liu","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3318464.3389700"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1561\/0400000042","article-title":"The algorithmic foundations of differential privacy","volume":"9","author":"dwork","year":"2014","journal-title":"Foundations and Trends\ufffd in Theoretical Computer Science"},{"key":"ref1","first-page":"265","article-title":"Calibrating noise to sensitivity in private data analysis","author":"dwork","year":"2006","journal-title":"Theory of Cryptography Conference"},{"key":"ref9","article-title":"Learning with privacy at scale","volume":"1","author":"team","year":"2017","journal-title":"Mach Learn Appl"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3183713.3197390"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00035"},{"key":"ref21","first-page":"655","article-title":"A utility-optimized framework for personalized private histogram estimation","volume":"31","author":"yiwen","year":"2018","journal-title":"IEEE Transactions on Knowledge and Data Engineering"}],"event":{"name":"ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","start":{"date-parts":[[2022,5,23]]},"location":"Singapore, Singapore","end":{"date-parts":[[2022,5,27]]}},"container-title":["ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9745891\/9746004\/09747678.pdf?arnumber=9747678","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,22]],"date-time":"2022-08-22T20:14:36Z","timestamp":1661199276000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9747678\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,23]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/icassp43922.2022.9747678","relation":{},"subject":[],"published":{"date-parts":[[2022,5,23]]}}}