{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,17]],"date-time":"2026-01-17T22:05:50Z","timestamp":1768687550476,"version":"3.49.0"},"reference-count":50,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2021,3,1]],"date-time":"2021-03-01T00:00:00Z","timestamp":1614556800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61872045"],"award-info":[{"award-number":["61872045"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"BUPT Excellent Ph.D. Students Foundation","award":["CX2016301"],"award-info":[{"award-number":["CX2016301"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2021,3,1]]},"DOI":"10.1109\/tdsc.2019.2905237","type":"journal-article","created":{"date-parts":[[2019,3,15]],"date-time":"2019-03-15T23:46:13Z","timestamp":1552693573000},"page":"780-795","source":"Crossref","is-referenced-by-count":19,"title":["Differentially Private Publication of Vertically Partitioned Data"],"prefix":"10.1109","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1304-8401","authenticated-orcid":false,"given":"Peng","family":"Tang","sequence":"first","affiliation":[]},{"given":"Xiang","family":"Cheng","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4266-7527","authenticated-orcid":false,"given":"Sen","family":"Su","sequence":"additional","affiliation":[]},{"given":"Rui","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Huaxi","family":"Shao","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/1807167.1807247"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/2457317.2457343"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2008.27"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-013-5393-0"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/b13794"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"ref37","first-page":"104","article-title":"On private scalar product computation for privacy-preserving data mining","author":"goethals","year":"2004","journal-title":"Proc Int Conf Inf Secur Cryptology"},{"key":"ref36","author":"apostol","year":"1974","journal-title":"Mathematical Analysis Second Edition"},{"key":"ref35","first-page":"577","article-title":"Discovering structure in high-dimensional data through correlation explanation","author":"steeg","year":"2014","journal-title":"Proc Int Conf Neural Inf Process"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85174-5_25"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/1559845.1559850"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2007.66"},{"key":"ref29","first-page":"90","article-title":"Sharing decryption in the context of voting or lotteries","author":"fouque","year":"2000","journal-title":"Proc Int Conf Financial Cryptography"},{"key":"ref2","first-page":"149","article-title":"DJoin: Differentially private join queries over distributed databases","author":"narayan","year":"2012","journal-title":"Proc 10th USENIX Conf Operating Syst Des Implementation"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-010-0214-6"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31680-7_8"},{"key":"ref22","first-page":"169","article-title":"Towards statistical queries over distributed private user data","author":"chen","year":"2012","journal-title":"Proc 9th USENIX Symp Netw Syst Des Implementation"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382266"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2484326"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23128"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134030"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3064176.3064218"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/2414456.2414474"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2588555.2588573"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2783379"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/11761679_29"},{"key":"ref12","first-page":"230","article-title":"Hierarchical latent class models for cluster analysis","author":"zhang","year":"2002","journal-title":"Proc 18th Nat Conf Artif Intell"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03007-9_13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1857947.1857950"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2013.18"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31680-7_7"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2014.2369034"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2016.7498241"},{"key":"ref19","first-page":"118","article-title":"I have a DREAM! differentially private smart metering","author":"acs","year":"2011","journal-title":"Proc Int Workshop Inf Hiding"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-006-0008-z"},{"key":"ref6","first-page":"543","article-title":"Minimality attack in privacy preserving data publishing","author":"wong","year":"2007","journal-title":"Proc Int Conf On Very Large Data Bases"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1559845.1559861"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2013.22"},{"key":"ref7","first-page":"265","article-title":"Calibrating noise to sensitivity in private data analysis","author":"dwork","year":"2006","journal-title":"Cryptography"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2014.04.012"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315306"},{"key":"ref46","first-page":"3796","article-title":"Personalized privacy-preserving social recommendation","author":"meng","year":"2018","journal-title":"Proc 32nd AAAI Conf Artif Intell"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2016.7498248"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/1142473.1142500"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2015.7113353"},{"key":"ref42","author":"goldreich","year":"2004","journal-title":"The Foundations of Cryptography - Volume 2 Basic Applications"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.2307\/2683252"},{"key":"ref44","year":"0"},{"key":"ref43","year":"2013"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8858\/9372344\/08667703.pdf?arnumber=8667703","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:05:31Z","timestamp":1642003531000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8667703\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,1]]},"references-count":50,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2019.2905237","relation":{},"ISSN":["1545-5971","1941-0018","2160-9209"],"issn-type":[{"value":"1545-5971","type":"print"},{"value":"1941-0018","type":"electronic"},{"value":"2160-9209","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,3,1]]}}}