{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,28]],"date-time":"2026-01-28T20:46:52Z","timestamp":1769633212192,"version":"3.49.0"},"reference-count":63,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,5,1]],"date-time":"2022-05-01T00:00:00Z","timestamp":1651363200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-009"},{"start":{"date-parts":[[2022,5,1]],"date-time":"2022-05-01T00:00:00Z","timestamp":1651363200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-001"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,5]]},"DOI":"10.1109\/sp46214.2022.9833635","type":"proceedings-article","created":{"date-parts":[[2022,7,27]],"date-time":"2022-07-27T15:28:05Z","timestamp":1658935685000},"page":"422-439","source":"Crossref","is-referenced-by-count":23,"title":["Locally Differentially Private Sparse Vector Aggregation"],"prefix":"10.1109","author":[{"given":"Mingxun","family":"Zhou","sequence":"first","affiliation":[{"name":"Carnegie Mellon University"}]},{"given":"Tianhao","family":"Wang","sequence":"additional","affiliation":[{"name":"University of Virginia"}]},{"given":"T-H. Hubert","family":"Chan","sequence":"additional","affiliation":[{"name":"The University of Hong Kong"}]},{"given":"Giulia","family":"Fanti","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University"}]},{"given":"Elaine","family":"Shi","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University"}]}],"member":"263","reference":[{"key":"ref13","first-page":"947","article-title":"Data poisoning attacks to local differential privacy protocols","author":"cao","year":"2021","journal-title":"30th USENIX Security Symposium (USENIX Security 21)"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/1553374.1553516"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3196959.3196981"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.2307\/2283137"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32946-3_15"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00018"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2043621.2043626"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2018.2809790"},{"key":"ref53","article-title":"Mutual information optimally local private discrete distribution estimation","volume":"abs 1607 8025","author":"wang","year":"2016","journal-title":"CoRR"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2019.00063"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00048"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00035"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133982"},{"key":"ref54","first-page":"729","author":"wang","year":"2017","journal-title":"Locally differentially private protocols for frequency estimation"},{"key":"ref17","article-title":"Differentially private empirical risk minimization","volume":"12","author":"chaudhuri","year":"0","journal-title":"J Mach Learn Res"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45465-9_59"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3183713.3196906"},{"key":"ref18","article-title":"Breaking the communication- privacy-accuracy trilemma","author":"chen","year":"2020","journal-title":"Advances in Neural Information Processing Systems 33 Annual Conference on Neural Information Processing Systems 2020 NeurIPS 2020"},{"key":"ref51","author":"team","year":"0","journal-title":"Learning With Privacy at Scale"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/686151"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978409"},{"key":"ref45","author":"pooh","year":"2017","journal-title":"Movie rating data"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813687"},{"key":"ref47","article-title":"Privacypreserving aggregation of time-series data","author":"shi","year":"2011","journal-title":"Network and Distributed System Security Symposium (NDSS)"},{"key":"ref42","author":"misra","year":"0","journal-title":"Clothing fit dataset for size recommendation"},{"key":"ref41","doi-asserted-by":"crossref","first-page":"126","DOI":"10.1007\/978-3-642-03356-8_8","article-title":"Computational differential privacy","volume":"5677","author":"mironov","year":"2009","journal-title":"Advances in Cryptology - CRYPTO 2009 29th Annual International Cryptology Conference"},{"key":"ref44","author":"nicapotato","year":"0","journal-title":"Women&#x2019;s E-Commerce Clothing Reviews"},{"key":"ref43","article-title":"Collecting and analyzing data from smart device users with local differential privacy","author":"nguyen","year":"2016","journal-title":"arXiv preprint arXiv 1606 05053"},{"key":"ref49","first-page":"5946","article-title":"Compressing gradient optimizers via count-sketches","author":"spring","year":"2019","journal-title":"International Conference on Machine Learning"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2746539.2746632"},{"key":"ref7","first-page":"2285","article-title":"Practical locally private heavy hitters","author":"bassily","year":"2017","journal-title":"Proceedings of the 31st International Conference on Neural Information Processing Systems ser NIPS'17"},{"key":"ref9","author":"bhowmick","year":"2019","journal-title":"Protection against reconstruction and its applications in private federated learning"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484735"},{"key":"ref3","article-title":"Communication complexity in locally private distribution estimation and heavy hitters","volume":"abs 1905 11888","author":"acharya","year":"2019","journal-title":"CoRR"},{"key":"ref6","first-page":"394","article-title":"Improving the gaussian mechanism for differential privacy: Analytical calibration and optimal denoising","author":"balle","year":"2018","journal-title":"International Conference on Machine Learning"},{"key":"ref5","article-title":"Towards sparse federated analytics: Location heatmaps under distributed differential privacy with secure aggregation","author":"bagdasaryan","year":"2021","journal-title":"arXiv preprint arXiv 2111 02269"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2017.11"},{"key":"ref35","article-title":"Federated learning: Strategies for improving communication efficiency","author":"konecny","year":"2016","journal-title":"arXiv preprint arXiv 1610 05492"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1137\/090756090"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3318464.3389700"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526733"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2010.85"},{"key":"ref30","first-page":"967","article-title":"Pckv: Locally differentially private correlated key-value data collection with optimized utility","author":"gu","year":"2020","journal-title":"29th USENIX Security Symposium"},{"key":"ref33","first-page":"1376","article-title":"The composition theorem for differential privacy","author":"kairouz","year":"2015","journal-title":"International Conference on Machine Learning"},{"key":"ref32","article-title":"The distributed discrete gaussian mechanism for federated learning with secure aggregation","author":"kairouz","year":"2021","journal-title":"arXiv preprint arXiv 2102 00813"},{"key":"ref2","article-title":"Hadamard response: Estimating distributions privately, efficiently, and with little communication","author":"acharya","year":"2018","journal-title":"AISTATS"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-43948-7_71"},{"key":"ref38","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","author":"mcmahan","year":"2017","journal-title":"Artificial Intelligence and Statistics"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.2017.1389735"},{"key":"ref23","first-page":"1161","article-title":"Lower bounds for locally private estimation via communication complexity","volume":"99","author":"duchi","year":"2019","journal-title":"Proceedings of the Thirty-Second Conference on Learning Theory"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1561\/0400000042"},{"key":"ref25","first-page":"265","article-title":"Calibrating noise to sensitivity in private data analysis","author":"dwork","year":"2006","journal-title":"Theory of Cryptography Conference"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2274576.2274608"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/3514221.3526160"},{"key":"ref22","article-title":"Collecting telemetry data privately","author":"ding","year":"2017","journal-title":"arXiv preprint arXiv 1712 01524"},{"key":"ref21","first-page":"259","article-title":"Prio: Private, robust, and scalable computation of aggregate statistics","author":"corrigan-gibbs","year":"2017","journal-title":"14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17)"},{"key":"ref28","article-title":"Building a rappor with the unknown: Privacy-preserving learning of associations and data dictionaries","author":"fanti","year":"2015","journal-title":"arXiv preprint arXiv 1503"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660348"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2018.00056"},{"key":"ref60","article-title":"Privkvm*: Revisiting key-value statistics estimation with local differential privacy","author":"ye","year":"2021","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3037194"},{"key":"ref61","first-page":"835","article-title":"Practical, label private deep learning training based on secure multiparty computation and differential privacy","author":"yuan","year":"2021","journal-title":"IACR Cryptol ePrint Arch"}],"event":{"name":"2022 IEEE Symposium on Security and Privacy (SP)","location":"San Francisco, CA, USA","start":{"date-parts":[[2022,5,22]]},"end":{"date-parts":[[2022,5,26]]}},"container-title":["2022 IEEE Symposium on Security and Privacy (SP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9833550\/9833558\/09833635.pdf?arnumber=9833635","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,8]],"date-time":"2023-11-08T18:17:13Z","timestamp":1699467433000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9833635\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5]]},"references-count":63,"URL":"https:\/\/doi.org\/10.1109\/sp46214.2022.9833635","relation":{},"subject":[],"published":{"date-parts":[[2022,5]]}}}