{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:14:03Z","timestamp":1740100443971,"version":"3.37.3"},"reference-count":35,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,12,13]],"date-time":"2021-12-13T00:00:00Z","timestamp":1639353600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,12,13]],"date-time":"2021-12-13T00:00:00Z","timestamp":1639353600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,12,13]],"date-time":"2021-12-13T00:00:00Z","timestamp":1639353600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100006228","name":"Oak Ridge National Laboratory","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006228","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000993","name":"Battelle","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000993","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000015","name":"U.S. Department of Energy","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000015","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,12,13]]},"DOI":"10.1109\/pst52912.2021.9647839","type":"proceedings-article","created":{"date-parts":[[2021,12,21]],"date-time":"2021-12-21T21:08:01Z","timestamp":1640120881000},"page":"1-10","source":"Crossref","is-referenced-by-count":2,"title":["Measurement of Local Differential Privacy Techniques for IoT-based Streaming Data"],"prefix":"10.1109","author":[{"given":"Sharmin","family":"Afrose","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Danfeng Daphne","family":"Yao","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Olivera","family":"Kotevska","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23535"},{"journal-title":"Learning With Privacy at Scale","year":"2021","key":"ref32"},{"journal-title":"Count sketch","year":"2021","key":"ref31"},{"key":"ref30","article-title":"Differentially private linear algebra in the streaming model","author":"upadhyay","year":"2014","journal-title":"arXiv preprint arXiv 1409 5414"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.3390\/s20247030"},{"key":"ref34","article-title":"Local differential privacy and its applications: A comprehensive survey","author":"yang","year":"2020","journal-title":"arXiv preprint arXiv 2008 06439"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2019.04.012"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1038\/s41560-017-0074-z"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1559845.1559850"},{"key":"ref13","volume":"1","author":"near","year":"2021","journal-title":"Programming Differential Privacy"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.5753\/sbrc.2020.12308"},{"key":"ref15","article-title":"Privacy for free: Communication-efficient learning with differential privacy using sketches","volume":"abs 1911 972","author":"li","year":"2019","journal-title":"CoRR"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2746539.2746632"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s00450-016-0310-y"},{"key":"ref18","first-page":"1375","author":"chen","year":"2017","journal-title":"PeGaSus Data-Adaptive Differentially Private Stream Processing"},{"key":"ref19","article-title":"Continuous release of data streams under both centralized and local differential privacy","volume":"abs 2005 11753","author":"wang","year":"2020","journal-title":"ArXiv"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-9129-7_11"},{"key":"ref4","article-title":"A survey of privacy attacks in machine learning","author":"rigaki","year":"2020","journal-title":"arXiv preprint arXiv 2007 09948"},{"key":"ref27","first-page":"659","article-title":"Privapprox: Privacy-preserving stream analytics","author":"quoc","year":"2017","journal-title":"Proceedings of the 2017 USENIX Conference on Usenix Annual Technical Conference"},{"key":"ref3","first-page":"17","article-title":"Privacy in pharmacogenetics: An end-to-end case study of personalized warfarin dosing","author":"fredrikson","year":"2014","journal-title":"23rd USENIX Security Symposium ( USENIX Security 14)"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/11787006_1"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.2017.1389735"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79228-4_1"},{"key":"ref8","first-page":"729","author":"wang","year":"2017","journal-title":"Locally differentially private protocols for frequency estimation"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660348"},{"key":"ref2","article-title":"Knock knock, who&#x2019;s there? membership inference on aggregate location data","author":"pyrgelis","year":"2017","journal-title":"arXiv preprint arXiv 1708 04782"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1146\/annurev-statistics-060116-054123"},{"journal-title":"Local differential privacy for evolving data","year":"2018","author":"joseph","key":"ref9"},{"journal-title":"Kullback&#x2013;Leibler Divergence","year":"2021","key":"ref20"},{"journal-title":"Jensen-shannon divergence","year":"2021","key":"ref22"},{"journal-title":"mutual info score","year":"2021","key":"ref21"},{"key":"ref24","article-title":"Privacy preserving smart meter data","author":"thorve","year":"2018","journal-title":"Proceedings of The 7th International Workshop on Urban Computing (UrbComp&#x2019;18)"},{"journal-title":"Welcome to the ibm differential privacy library","year":"2021","key":"ref23"},{"key":"ref26","article-title":"Building a rappor with the unknown: Privacy-preserving learning of associations and data dictionaries","volume":"2016","author":"fanti","year":"2015","journal-title":"Proceedings on Privacy Enhancing Technologies"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/DASC-PICom-CBDCom-CyberSciTech49142.2020.00102"}],"event":{"name":"2021 18th International Conference on Privacy, Security and Trust (PST)","start":{"date-parts":[[2021,12,13]]},"location":"Auckland, New Zealand","end":{"date-parts":[[2021,12,15]]}},"container-title":["2021 18th International Conference on Privacy, Security and Trust (PST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9647713\/9647738\/09647839.pdf?arnumber=9647839","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T16:59:51Z","timestamp":1652201991000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9647839\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,13]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/pst52912.2021.9647839","relation":{},"subject":[],"published":{"date-parts":[[2021,12,13]]}}}