{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T16:50:25Z","timestamp":1774630225762,"version":"3.50.1"},"reference-count":31,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,6,26]],"date-time":"2024-06-26T00:00:00Z","timestamp":1719360000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,6,26]],"date-time":"2024-06-26T00:00:00Z","timestamp":1719360000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,6,26]]},"DOI":"10.1109\/iscc61673.2024.10733730","type":"proceedings-article","created":{"date-parts":[[2024,10,31]],"date-time":"2024-10-31T17:32:28Z","timestamp":1730395948000},"page":"1-8","source":"Crossref","is-referenced-by-count":2,"title":["Privacy-Optimized Randomized Response for Sharing Multi-Attribute Data"],"prefix":"10.1109","author":[{"given":"Akito","family":"Yamamoto","sequence":"first","affiliation":[{"name":"The University of Tokyo,Human Genome Center, The Institute of Medical Science,Tokyo,Japan"}]},{"given":"Tetsuo","family":"Shibuya","sequence":"additional","affiliation":[{"name":"The University of Tokyo,Human Genome Center, The Institute of Medical Science,Tokyo,Japan"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"ref2","first-page":"1120","article-title":"Hadamard response: Estimating distributions privately, efficiently, and with little communication","volume-title":"Proceedings of the Twenty-Second International Conference on Artificial Intelligence and Statistics","volume":"89","author":"Acharya"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1186\/s40064-015-1481-x"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/btz837"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICHI52183.2021.00044"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1093\/bib\/bbx139"},{"key":"ref7","author":"Cummings","year":"2018","journal-title":"The role of differential privacy in GDPR compliance"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2014.11.011"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/11787006_1"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_14"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1561\/0400000042"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660348"},{"key":"ref13","volume-title":"European Commission: Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46\/EC","year":"2016"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1835804.1835868"},{"key":"ref15","first-page":"1626","article-title":"Local private hypothesis testing: Chi-square tests","volume-title":"Proceedings of the 35th International Conference on Machine Learning","volume":"80","author":"Gaboardi"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2718487"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2014.35"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.2017.1389735"},{"key":"ref19","first-page":"2436","article-title":"Discrete distribution estimation under local privacy","volume-title":"Proceedings of the 33rd International Conference on Machine Learning","volume":"48","author":"Kairouz"},{"issue":"1","key":"ref20","first-page":"492","article-title":"Extremal mechanisms for local differential privacy","volume":"17","author":"Kairouz","year":"2016","journal-title":"J. Mach. Learn. Res."},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2414456.2414474"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2020.101648"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2007.66"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2812146"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2019.00063"},{"key":"ref26","first-page":"729","article-title":"Locally differentially private protocols for frequency estimation","volume-title":"Proceedings of the 26th USENIX Conference on Security Symposium","author":"Wang"},{"key":"ref27","first-page":"1558","article-title":"Using randomized response for differential privacy preserving data collection","volume-title":"Proceedings of the Workshops of the EDBT\/ICDT 2016 Joint Conference, EDBT\/ICDT Workshops 2016","author":"Wang"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.2307\/2283137"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.5220\/0011665600003414"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-37586-6_3"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3508398.3511519"}],"event":{"name":"2024 IEEE Symposium on Computers and Communications (ISCC)","location":"Paris, France","start":{"date-parts":[[2024,6,26]]},"end":{"date-parts":[[2024,6,29]]}},"container-title":["2024 IEEE Symposium on Computers and Communications (ISCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10733347\/10733557\/10733730.pdf?arnumber=10733730","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T04:52:56Z","timestamp":1732683176000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10733730\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,26]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/iscc61673.2024.10733730","relation":{},"subject":[],"published":{"date-parts":[[2024,6,26]]}}}