{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,28]],"date-time":"2026-01-28T22:32:04Z","timestamp":1769639524430,"version":"3.49.0"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,5]]},"DOI":"10.1109\/icde.2016.7498243","type":"proceedings-article","created":{"date-parts":[[2016,6,25]],"date-time":"2016-06-25T07:36:34Z","timestamp":1466840194000},"page":"229-240","source":"Crossref","is-referenced-by-count":20,"title":["Differentially private frequent subgraph mining"],"prefix":"10.1109","author":[{"given":"Shengzhi","family":"Xu","sequence":"first","affiliation":[]},{"given":"Sen","family":"Su","sequence":"additional","affiliation":[]},{"given":"Li","family":"Xiong","sequence":"additional","affiliation":[]},{"given":"Xiang","family":"Cheng","sequence":"additional","affiliation":[]},{"given":"Ke","family":"Xiao","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Fast algorithms for mining association rules","author":"agrawal","year":"1994","journal-title":"VLDB"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2015.2399310"},{"key":"ref12","article-title":"Private analysis of graph structure","author":"karwa","year":"2011","journal-title":"VLDB"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2463676.2465304"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.14778\/2732296.2732300"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2723372.2737785"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1835804.1835869"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.12.005"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335372"},{"key":"ref19","article-title":"Differentially private synthesization of multi-dimensional data using copula functions","author":"li","year":"2014","journal-title":"EDBT"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1561\/0400000042"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2487575.2487601"},{"key":"ref27","year":"0"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2006.1"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.14778\/2350229.2350251"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2007.66"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2015.7113354"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.14778\/2428536.2428539"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"ref9","article-title":"Calibrating noise to sensitivity in private data analysis","author":"dwork","year":"2006","journal-title":"TCC"},{"key":"ref1","article-title":"Differential privacy","author":"dwork","year":"2006","journal-title":"ICALP"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623723"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2505515.2505553"},{"key":"ref21","author":"chen","year":"2015","journal-title":"On the privacy properties of variants on the sparse vector technique"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2004.33"},{"key":"ref23","article-title":"Differentially private maximal frequent sequence mining","author":"xiang","year":"2015","journal-title":"Computers & Security"},{"key":"ref26","year":"0"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24777-7"}],"event":{"name":"2016 IEEE 32nd International Conference on Data Engineering (ICDE)","location":"Helsinki, Finland","start":{"date-parts":[[2016,5,16]]},"end":{"date-parts":[[2016,5,20]]}},"container-title":["2016 IEEE 32nd International Conference on Data Engineering (ICDE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7491900\/7498210\/07498243.pdf?arnumber=7498243","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,9,29]],"date-time":"2016-09-29T20:21:50Z","timestamp":1475180510000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7498243\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/icde.2016.7498243","relation":{},"subject":[],"published":{"date-parts":[[2016,5]]}}}