{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,25]],"date-time":"2025-09-25T15:01:09Z","timestamp":1758812469342,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,10,20]],"date-time":"2020-10-20T00:00:00Z","timestamp":1603152000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,10,20]],"date-time":"2020-10-20T00:00:00Z","timestamp":1603152000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,10,20]],"date-time":"2020-10-20T00:00:00Z","timestamp":1603152000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,10,20]]},"DOI":"10.1109\/isncc49221.2020.9297254","type":"proceedings-article","created":{"date-parts":[[2020,12,25]],"date-time":"2020-12-25T22:06:21Z","timestamp":1608933981000},"page":"1-7","source":"Crossref","is-referenced-by-count":1,"title":["Utility Analysis of Horizontally Merged Multi-Party Synthetic Data with Differential Privacy"],"prefix":"10.1109","author":[{"given":"Bingyue","family":"Su","sequence":"first","affiliation":[]},{"given":"Fang","family":"Liu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"article-title":"Differentially private federated learning: A client level perspective","year":"2017","author":"geyer","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1561\/0400000042"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330765"},{"article-title":"Learning privately over distributed features: An admm sharing approach","year":"2019","author":"hu","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1214\/19-STS742"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1198\/jasa.2009.tm08651"},{"article-title":"Bounds on the expectation of the maximum of samples from a gaussian","year":"2015","author":"kamath","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1214\/ECP.v17-2210"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/9.362841"},{"year":"0","key":"ref19","article-title":"Medical cost personal datasets: Insurance forecast by using linear regression"},{"key":"ref4","first-page":"555","article-title":"Learning privately from multiparty data","author":"hamm","year":"2016","journal-title":"International Conference on Machine Learning"},{"key":"ref3","first-page":"1876","article-title":"Multiparty differential privacy via aggregation of locally trained classifiers","author":"pathak","year":"2010","journal-title":"Advances in Neural Information Processing Systems 23"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2996758.2996762"},{"key":"ref5","first-page":"3226","article-title":"Differentially private bayesian learning on distributed data","author":"heikkil\u00e4","year":"2017","journal-title":"Advances in neural information processing systems"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2855169"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2607691"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1559845.1559850"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_14"},{"key":"ref9","first-page":"5791","article-title":"Improving the privacy and accuracy of admm-based distributed algorithms","author":"zhang","year":"2018","journal-title":"International Conference on Machine Learning"},{"year":"0","key":"ref20","article-title":"Social network ads: A categorical dataset to determine whether a user purchased a particular product"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2008.4497436"},{"key":"ref21","first-page":"486","article-title":"Our data, ourselves: Privacy via distriuted noise generation","author":"dwork","year":"2006","journal-title":"Annual International Conference on the Theory and Applications of Cryptographic Techniques"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2018.2845388"},{"key":"ref23","first-page":"211","article-title":"The algorithmic foundations of differential privacy","volume":"9","author":"dwork","year":"2013","journal-title":"Theoretical Computer Science"}],"event":{"name":"2020 International Symposium on Networks, Computers and Communications (ISNCC)","start":{"date-parts":[[2020,10,20]]},"location":"Montreal, QC, Canada","end":{"date-parts":[[2020,10,22]]}},"container-title":["2020 International Symposium on Networks, Computers and Communications (ISNCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9297148\/9297168\/09297254.pdf?arnumber=9297254","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T21:55:04Z","timestamp":1656453304000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9297254\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,20]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/isncc49221.2020.9297254","relation":{},"subject":[],"published":{"date-parts":[[2020,10,20]]}}}