{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T07:03:15Z","timestamp":1773903795167,"version":"3.50.1"},"reference-count":88,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T00:00:00Z","timestamp":1738368000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T00:00:00Z","timestamp":1738368000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T00:00:00Z","timestamp":1738368000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["91546108"],"award-info":[{"award-number":["91546108"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["71490725"],"award-info":[{"award-number":["71490725"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Anhui Provincial Science and Technology","award":["201903a05020020"],"award-info":[{"award-number":["201903a05020020"]}]},{"DOI":"10.13039\/501100003995","name":"Natural Science Foundation of Anhui Province","doi-asserted-by":"publisher","award":["1908085QG298"],"award-info":[{"award-number":["1908085QG298"]}],"id":[{"id":"10.13039\/501100003995","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["PA2023IISL0093"],"award-info":[{"award-number":["PA2023IISL0093"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["JZ2019HGTA0053"],"award-info":[{"award-number":["JZ2019HGTA0053"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["JZ2019HGBZ0128"],"award-info":[{"award-number":["JZ2019HGBZ0128"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Open Research Fund Program of Key Laboratory of Process Optimization and Intelligent Decision-making, Ministry of Education"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Big Data"],"published-print":{"date-parts":[[2025,2]]},"DOI":"10.1109\/tbdata.2024.3366071","type":"journal-article","created":{"date-parts":[[2024,2,14]],"date-time":"2024-02-14T18:58:27Z","timestamp":1707937107000},"page":"21-34","source":"Crossref","is-referenced-by-count":11,"title":["Edge-DPSDG: An Edge-Based Differential Privacy Protection Model for Smart Healthcare"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-6066-2700","authenticated-orcid":false,"given":"Moli","family":"Lyu","sequence":"first","affiliation":[{"name":"School of Management, Hefei University of Technology, Hefei, Anhui, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3378-9779","authenticated-orcid":false,"given":"Zhiwei","family":"Ni","sequence":"additional","affiliation":[{"name":"School of Management, Hefei University of Technology, Hefei, Anhui, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3864-9783","authenticated-orcid":false,"given":"Qian","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Management, Hefei University of Technology, Hefei, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3941-2681","authenticated-orcid":false,"given":"Fenggang","family":"Li","sequence":"additional","affiliation":[{"name":"School of Management, Hefei University of Technology, Hefei, Anhui, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-2199-4_4"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2019.2918437"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/11787006_1"},{"issue":"12","key":"ref4","article-title":"A study on k-anonymity, l-diversity, and t-closeness techniques","volume":"17","author":"Rajendran","year":"2017","journal-title":"IJCSNS Int. J. Comput. Sci. Netw. Secur."},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3465084.3467482"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/5855745"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1038\/s41591-018-0272-7"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-021-00576-1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2022-0104"},{"key":"ref10","first-page":"1005","volume-title":"Treating Medical Data as a Durable Asset.","author":"A","year":"2020"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.iotcps.2022.04.001"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-021-00718-w"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3490237"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2022.3175071"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1038\/s43856-022-00179-4"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.3390\/healthcare8020133"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2012.12.003"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICEECCOT46775.2019.9114681"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3453176"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102353"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-60265-9_5"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICBAIE49996.2020.00027"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-2199-4_2"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1038\/s41746-020-00323-1"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.3390\/app112311191"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3501296"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/s41666-020-00082-4"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-021-01076-8"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3528580.3532845"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-0978-0_27"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/btaa038"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-08637-3_3"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/2320765.2320816"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-021-93030-0"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1038\/s42256-021-00337-8"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3453176"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3501813"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2021.3123936"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2020.2975749"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/BigData50022.2020.9377989"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-023-28481-8"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-019-00427-0"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/s11265-016-1198-2"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/SYSCO.2016.7831325"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/CCWC.2018.8301702"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3163591"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102552"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2016.7842173"},{"key":"ref50","doi-asserted-by":"crossref","DOI":"10.31219\/osf.io\/v2ms6","article-title":"Benchmarking differentially private residual networks for medical imagery","author":"Singh","year":"2020"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-022-19544-3"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1093\/jamia\/ocab135"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.21203\/rs.3.rs-1005694\/v1"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/2566468.2566474"},{"issue":"1","key":"ref55","first-page":"35","article-title":"Practicing differential privacy in health care: A review","volume":"6","author":"Dankar","year":"2013","journal-title":"Trans. Data Privacy"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom50675.2020.00188"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-19-1256-6_15"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/5564176"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.3390\/math10224338"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-021-01078-6"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.14778\/3447689.3447700"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8057062"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29420-4_3"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/DASC\/PiCom\/CBDCom\/CyberSciTech.2019.00169"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1007\/11761679_29"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40328-6_26"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.29012\/jpc.v1i2.570"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_14"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1145\/2488608.2488652"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1561\/9781601988195"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1145\/1810891.1810916"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i12.17333"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1016\/j.jmaa.2020.124762"},{"key":"ref74","first-page":"4768","volume-title":"A Unified Approach to Interpreting Model Predictions","author":"Lundberg","year":"2017"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1016\/j.isci.2020.101199"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.32614\/RJ-2017-016"},{"key":"ref77","first-page":"1287","article-title":"Explaining the explainer: A first theoretical analysis of lime","volume-title":"Proc. 23rd Int. Conf. Artif. Intell. Statist.","author":"Garreau"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-1866-6_41"},{"key":"ref79","volume-title":"Understanding Global Feature Contributions With Additive Importance Measures","author":"Covert","year":"2020"},{"key":"ref80","first-page":"2242","article-title":"Data shapley: Equitable valuation of data for machine learning","volume-title":"Proc. 36th Int. Conf. Mach. Learn.","author":"Ghorbani"},{"key":"ref81","first-page":"12","volume-title":"Entropy, Relative Entropy and Mutual Inf.","author":"Thomas"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.3390\/e21121170"},{"key":"ref83","first-page":"1963","article-title":"Research progress on privacy measurement for cloud data","volume":"29","author":"Xiong","year":"2018","journal-title":"Ruan Jian Xue Bao\/J. Softw."},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1103\/PRXQuantum.3.020355"},{"key":"ref85","first-page":"9269","article-title":"The many shapley values for model explanation","volume-title":"Proc. 37th Int. Conf. Mach. Learn.","author":"Sundararajan"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/ITA.2016.7888175"},{"key":"ref87","article-title":"Diffprivlib: The IBM differential privacy library","author":"Holohan","year":"2019"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560687"}],"container-title":["IEEE Transactions on Big Data"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6687317\/10843063\/10436156.pdf?arnumber=10436156","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T19:02:39Z","timestamp":1737399759000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10436156\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2]]},"references-count":88,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tbdata.2024.3366071","relation":{},"ISSN":["2332-7790","2372-2096"],"issn-type":[{"value":"2332-7790","type":"electronic"},{"value":"2372-2096","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,2]]}}}