{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T21:26:37Z","timestamp":1740173197344,"version":"3.37.3"},"reference-count":54,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"15","license":[{"start":{"date-parts":[[2024,8,1]],"date-time":"2024-08-01T00:00:00Z","timestamp":1722470400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,8,1]],"date-time":"2024-08-01T00:00:00Z","timestamp":1722470400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,8,1]],"date-time":"2024-08-01T00:00:00Z","timestamp":1722470400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62202450"],"award-info":[{"award-number":["62202450"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"Huawei","doi-asserted-by":"publisher","award":["TC20201119008"],"award-info":[{"award-number":["TC20201119008"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Postdoctoral Exchange Program","award":["YJ20210185"],"award-info":[{"award-number":["YJ20210185"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2024,8,1]]},"DOI":"10.1109\/jiot.2024.3397908","type":"journal-article","created":{"date-parts":[[2024,5,8]],"date-time":"2024-05-08T17:37:55Z","timestamp":1715189875000},"page":"25950-25967","source":"Crossref","is-referenced-by-count":0,"title":["Streaming Data Collection With a Private Sketch-Based Protocol"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3296-5005","authenticated-orcid":false,"given":"Ying","family":"Li","sequence":"first","affiliation":[{"name":"Laboratory for Internet Infrastructure, Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China"}]},{"given":"Xiaodong","family":"Lee","sequence":"additional","affiliation":[{"name":"Laboratory for Internet Infrastructure, Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China"}]},{"given":"Botao","family":"Peng","sequence":"additional","affiliation":[{"name":"Laboratory for Internet Infrastructure, Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8031-0265","authenticated-orcid":false,"given":"Themis","family":"Palpanas","sequence":"additional","affiliation":[{"name":"LIPADE, Universit&#x00E9; Paris Cit&#x00E9;, Paris, France"}]},{"given":"Jingan","family":"Xue","sequence":"additional","affiliation":[{"name":"Central Research Institute, 2012 Labs, Huawei Technologies, Shenzhen, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-39847-6_10"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3082576"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2021.3140174"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848076"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.052213.00046"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2015.11.016"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2584679"},{"volume-title":"General data protection regulation","year":"2018","key":"ref8"},{"volume-title":"Personal information protection law of the people\u2019s Republic of China","year":"2021","key":"ref9"},{"volume":"1","issue":"8","volume-title":"Learning with privacy at scale","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660348"},{"key":"ref12","first-page":"3574","article-title":"Collecting telemetry data privately","volume-title":"Proc. NIPS","volume":"30","author":"Ding"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484750"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2019.00063"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978409"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8486234"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.14778\/3389133.3389140"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.jalgor.2003.12.001"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_14"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2013.53"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1559845.1559850"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.2307\/2283137"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.2017.1389735"},{"key":"ref24","article-title":"Collecting and analyzing data from smart device users with local differential privacy","author":"Nguy\u00ean","year":"2016","journal-title":"arXiv:1606.05053"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1017\/9781108769938"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.14778\/3476249.3476261"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2022.07.003"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00035"},{"key":"ref29","first-page":"729","article-title":"Locally differentially private protocols for frequency estimation","volume-title":"Proc. USENIX Security Symp.","author":"Wang"},{"key":"ref30","first-page":"63","article-title":"A fast APRIORI implementation","volume-title":"Proc. FIMI","volume":"3","author":"Bodon"},{"volume-title":"AOL search log.","year":"2007","author":"Dudek","key":"ref31"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2927695"},{"key":"ref33","first-page":"1","article-title":"Practical locally private heavy hitters","volume-title":"Proc. NIPS","volume":"30","author":"Bassily"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31680-7_8"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/1989284.1989290"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-020-01746-0"},{"key":"ref37","article-title":"Efficient private statistics with succinct sketches","author":"Melis","year":"2015","journal-title":"arXiv:1508.06110"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0047"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484557"},{"volume-title":"DAMS: Meta-estimation of private sketch data structures for differentially private COVID-19 contact tracing","year":"2023","author":"Vepakomma","key":"ref40"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/s11761-021-00315-3"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833635"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.3390\/s20247030"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/3318464.3389700"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-17653-2_13"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611975482.151"},{"key":"ref47","first-page":"747","article-title":"BLENDER: Enabling local search with a hybrid differential privacy model","volume-title":"Proc. USENIX Security","author":"Avent"},{"key":"ref48","article-title":"Metric-based local differential privacy for statistical applications","author":"Alvim","year":"2018","journal-title":"arXiv:1805.01456"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2949041"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39077-7_5"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2016.7498248"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2018.2841360"},{"key":"ref53","first-page":"1","article-title":"Utility-optimized local differential privacy mechanisms for distribution estimation","volume-title":"Proc. USENIX Security Symp.","author":"Murakami"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE48307.2020.00050"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/10607832\/10523009.pdf?arnumber=10523009","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,24]],"date-time":"2024-07-24T18:40:51Z","timestamp":1721846451000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10523009\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,1]]},"references-count":54,"journal-issue":{"issue":"15"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2024.3397908","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"type":"electronic","value":"2327-4662"},{"type":"electronic","value":"2372-2541"}],"subject":[],"published":{"date-parts":[[2024,8,1]]}}}