{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T18:02:08Z","timestamp":1773511328995,"version":"3.50.1"},"reference-count":42,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2016]]},"DOI":"10.1109\/tdsc.2016.2599873","type":"journal-article","created":{"date-parts":[[2016,8,12]],"date-time":"2016-08-12T19:43:46Z","timestamp":1471031026000},"page":"1-1","source":"Crossref","is-referenced-by-count":73,"title":["Real-time and Spatio-temporal Crowd-sourced Social Network Data Publishing with Differential Privacy"],"prefix":"10.1109","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8967-8525","authenticated-orcid":false,"given":"Qian","family":"Wang","sequence":"first","affiliation":[]},{"given":"Yan","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Xiao","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Zhibo","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Zhan","family":"Qin","sequence":"additional","affiliation":[]},{"given":"Kui","family":"Ren","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.59.2229"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022699029236"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/1807167.1807247"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526733"},{"key":"ref31","first-page":"1","article-title":"Differentially private\n publication of sparse data","author":"cormode","year":"2012","journal-title":"Proc International Conference on Database Theory"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-013-0309-y"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1115\/1.3662552"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/1807085.1807106"},{"key":"ref35","author":"king","year":"2010","journal-title":"Process Control A Practical Approach"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/1559845.1559850"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2030613.2030630"},{"key":"ref40","year":"0"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1868470.1868479"},{"key":"ref12","first-page":"1","article-title":"Differential privacy","author":"dwork","year":"0","journal-title":"Proc 33rd Int Colloquium Automata Languages Programming"},{"key":"ref13","first-page":"265","article-title":"Calibrating noise to sensitivity in\n private data analysis","author":"dwork","year":"0","journal-title":"Proc Conf Theory of Cryptography"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1989323.1989348"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-013-0309-y"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.14778\/1920841.1920970"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.14778\/2732977.2732989"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2013.96"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2043621.2043626"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/1645953.1646146"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2015.2401003"},{"key":"ref27","first-page":"1","article-title":"User 4xxxxx9: Anonymizing query logs","author":"adar","year":"0","journal-title":"Proc Query Log Anal Workshop"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.36"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2015.2427155"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"520","DOI":"10.1109\/TKDE.2011.26","article-title":"Publishing\n search logs-a comparative study of privacy guarantees","volume":"24","author":"machanavajjhala","year":"2012","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2016.2568460"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2016.2593444"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2016.2595573"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2632951.2632953"},{"key":"ref9","doi-asserted-by":"crossref","DOI":"10.1038\/srep01376","article-title":"Unique in the crowd: The\n privacy bounds of human mobility","volume":"3","author":"de montjoye","year":"2013","journal-title":"Scientific Reports"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2016.7524458"},{"key":"ref20","first-page":"140","article-title":"Differentially private continual monitoring\n of heavy hitters from distributed streams","author":"chan","year":"0","journal-title":"Proc 12th Int Conf Privacy Enhancing Technol"},{"key":"ref22","first-page":"33","article-title":"Differentially private\n multi-dimensional time series release for traffic monitoring","author":"fan","year":"0","journal-title":"Proc 27th Annu IFIP WG 11 3 Conf Data Appl Secur Privacy"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1806689.1806787"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1023\/A:1015231126594"},{"key":"ref24","article-title":"A face is\n exposed for AOL searcher no. 4417749","volume":"9","author":"barbaro","year":"2006","journal-title":"New York Times"},{"key":"ref41","year":"0"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623361"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2031331.2031335"},{"key":"ref25","first-page":"390","article-title":"On the anonymity of home\/work location pairs","author":"golle","year":"0","journal-title":"Proc 7th Int Conf Pervasive Comput"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8858\/4358699\/07542581.pdf?arnumber=7542581","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,8]],"date-time":"2022-04-08T18:51:28Z","timestamp":1649443888000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7542581\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"references-count":42,"URL":"https:\/\/doi.org\/10.1109\/tdsc.2016.2599873","relation":{},"ISSN":["1545-5971"],"issn-type":[{"value":"1545-5971","type":"print"}],"subject":[],"published":{"date-parts":[[2016]]}}}