{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T23:52:43Z","timestamp":1762041163070,"version":"build-2065373602"},"reference-count":29,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,6,1]],"date-time":"2021-06-01T00:00:00Z","timestamp":1622505600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,6,1]],"date-time":"2021-06-01T00:00:00Z","timestamp":1622505600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,6]]},"DOI":"10.1109\/icc42927.2021.9500401","type":"proceedings-article","created":{"date-parts":[[2021,8,6]],"date-time":"2021-08-06T20:49:21Z","timestamp":1628282961000},"page":"1-7","source":"Crossref","is-referenced-by-count":4,"title":["Information Leakage Metrics for Adversaries with Incomplete Information: Binary Privacy Mechanism"],"prefix":"10.1109","author":[{"given":"Shahnewaz Karim","family":"Sakib","sequence":"first","affiliation":[{"name":"Iowa State University,USA"}]},{"given":"George T","family":"Amariucai","sequence":"additional","affiliation":[{"name":"Kansas State University,USA"}]},{"given":"Yong","family":"Guan","sequence":"additional","affiliation":[{"name":"Iowa State University,USA"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/ISIT.2017.8006632"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/TIT.2019.2934414"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/TIT.2016.2584610"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1145\/2976749.2978308"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1007\/978-3-319-68711-7_23"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1007\/978-3-642-00596-1_21"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1016\/j.entcs.2009.07.085"},{"key":"ref17","article-title":"On measures of entropy and information","author":"r\u00e9nyi","year":"1961","journal-title":"Proceedings of the Fourth Berkeley Symposium on Mathematical Statistics and Probability Volume 1 Contributions to the Theory of Statistics"},{"key":"ref18","first-page":"265","article-title":"Measuring information leakage using generalized gain functions","author":"m\u2019rio","year":"2012","journal-title":"2012 IEEE 25th Computer Security Foundations Symposium"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1561\/0400000042","article-title":"The algorithmic foundations of differential privacy","volume":"9","author":"dwork","year":"2014","journal-title":"Foundations and Trends\ufffd in Theoretical Computer Science"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1145\/3009908"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/TKDE.2009.190"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1145\/2382196.2382261"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/ISIT.2008.4594958"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/TIT.2018.2809005"},{"year":"2012","author":"qiu","article-title":"Iterative solutions of linear systems","key":"ref29"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/TIFS.2013.2253320"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1007\/978-981-15-0493-8_1"},{"key":"ref7","first-page":"39","article-title":"Differential privacy: on the trade-off between utility and information leakage","author":"alvim","year":"2011","journal-title":"International Workshop on Formal Aspects in Security and Trust"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/CSF.2011.20"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1007\/11681878_14"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/CISS.2016.7460507"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/FOCS.2010.13"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1145\/1807085.1807105"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1137\/09076828X"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1109\/TIFS.2018.2831619"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1145\/1807085.1807104"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1515\/popets-2015-0024"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1109\/CWIT.2019.8929901"}],"event":{"name":"ICC 2021 - IEEE International Conference on Communications","start":{"date-parts":[[2021,6,14]]},"location":"Montreal, QC, Canada","end":{"date-parts":[[2021,6,23]]}},"container-title":["ICC 2021 - IEEE International Conference on Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9500243\/9500244\/09500401.pdf?arnumber=9500401","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,3]],"date-time":"2022-08-03T00:08:52Z","timestamp":1659485332000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9500401\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/icc42927.2021.9500401","relation":{},"subject":[],"published":{"date-parts":[[2021,6]]}}}