{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:09:30Z","timestamp":1740100170826,"version":"3.37.3"},"reference-count":40,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,6,25]],"date-time":"2021-06-25T00:00:00Z","timestamp":1624579200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,6,25]],"date-time":"2021-06-25T00:00:00Z","timestamp":1624579200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,6,25]]},"DOI":"10.1109\/iwqos52092.2021.9521333","type":"proceedings-article","created":{"date-parts":[[2021,8,26]],"date-time":"2021-08-26T20:59:51Z","timestamp":1630011591000},"page":"1-10","source":"Crossref","is-referenced-by-count":4,"title":["Differential Privacy-Preserving User Linkage across Online Social Networks"],"prefix":"10.1109","author":[{"given":"Xin","family":"Yao","sequence":"first","affiliation":[{"name":"Central South University,School of Computer Science and Engineering,Changsha,Hunan,China,410082"}]},{"given":"Rui","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of Delaware,Department of Computer and Information Sciences,Newark,DE,USA,19716"}]},{"given":"Yanchao","family":"Zhang","sequence":"additional","affiliation":[{"name":"Arizona State University,School of Electrical, Computer and Energy Engineering,Tempe,AZ,USA,85287"}]}],"member":"263","reference":[{"key":"ref39","article-title":"PCKV: Locally Differentially Private Correlated Key-Value Data Collection with Optimized Utility","author":"gu","year":"2020","journal-title":"USENIX Security&#x2019;20 Virtual Conference"},{"key":"ref38","article-title":"Extremal mechanisms for local differential privacy","author":"kairouz","year":"2014","journal-title":"NIPS&#x2019;14"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22263-4_1"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2783268"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbef.2017.12.004"},{"journal-title":"The Laplace Distribution and Generalizations A Revisit With Applications to Communications Economics Engineering and Finance","year":"2012","author":"kotz","key":"ref30"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2016-0015"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2019.00063"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.2017.1389735"},{"key":"ref34","article-title":"Calibrating noise to sensitivity in private data analysis","author":"dwork","year":"2006","journal-title":"TCC&#x2019;06"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"ref40","first-page":"141","article-title":"Privacy-preserving data publishing: A survey on recent developments","volume":"42","author":"wang","year":"2010","journal-title":"ACM Computing Surveys"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2006.1"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2007.367856"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1137\/090756090"},{"key":"ref14","article-title":"Local privacy and statistical minimax rates","author":"duchi","year":"2013","journal-title":"FOCS&#x2019;1999"},{"key":"ref15","article-title":"Practical locally private heavy hitters","author":"bassily","year":"2017","journal-title":"NIPS&#x2019;17"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2016.7524461"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2018.00079"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2746539.2746632"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00035"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2016.7498241"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2788601"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660348"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623645"},{"key":"ref6","article-title":"Towards user personality profiling from multiple social networks","author":"buraya","year":"2017","journal-title":"AAAI&#x2019;17"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516735"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3110025.3110046"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8486242"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2342549.2342565"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2957755"},{"key":"ref9","article-title":"Personalized privacy-preserving social recommendation","author":"meng","year":"2018","journal-title":"AAAI&#x2019;18"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2012.184"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3183713.3196906"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978426"},{"key":"ref21","article-title":"Clustering algorithms for the centralized and local models","author":"nissim","year":"2018","journal-title":"ALT&#x2019;18"},{"key":"ref24","article-title":"N-gram-based text categorization","author":"cavnar","year":"1994","journal-title":"SDAIR&#x2019;94"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2018.2823272"},{"key":"ref26","article-title":"Regression model fitting under differential privacy and model inversion attack","author":"wang","year":"2015","journal-title":"IJCAI&#x2019;"},{"key":"ref25","article-title":"Simhash: Hash-based similarity detection","author":"sadowski","year":"2007","journal-title":"Google Tech Rep"}],"event":{"name":"2021 IEEE\/ACM 29th International Symposium on Quality of Service (IWQOS)","start":{"date-parts":[[2021,6,25]]},"location":"Tokyo, Japan","end":{"date-parts":[[2021,6,28]]}},"container-title":["2021 IEEE\/ACM 29th International Symposium on Quality of Service (IWQOS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9521186\/9521256\/09521333.pdf?arnumber=9521333","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,2]],"date-time":"2022-08-02T23:44:27Z","timestamp":1659483867000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9521333\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,25]]},"references-count":40,"URL":"https:\/\/doi.org\/10.1109\/iwqos52092.2021.9521333","relation":{},"subject":[],"published":{"date-parts":[[2021,6,25]]}}}