{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T13:10:55Z","timestamp":1775913055294,"version":"3.50.1"},"reference-count":37,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"12","license":[{"start":{"date-parts":[[2017,12,1]],"date-time":"2017-12-01T00:00:00Z","timestamp":1512086400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2017,12,1]],"date-time":"2017-12-01T00:00:00Z","timestamp":1512086400000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2017,12,1]],"date-time":"2017-12-01T00:00:00Z","timestamp":1512086400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2017,12,1]],"date-time":"2017-12-01T00:00:00Z","timestamp":1512086400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100003392","name":"Natural Science Foundation Project of Fujian Province of China","doi-asserted-by":"publisher","award":["2015J01271"],"award-info":[{"award-number":["2015J01271"]}],"id":[{"id":"10.13039\/501100003392","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003410","name":"Young, Middle-aged Scientific Research Project in the Department of Education of Fujian Province of China","doi-asserted-by":"publisher","award":["JAT160469"],"award-info":[{"award-number":["JAT160469"]}],"id":[{"id":"10.13039\/501100003410","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002822","name":"Innovation-Driven Project of Central South University","doi-asserted-by":"publisher","award":["2016CXS013"],"award-info":[{"award-number":["2016CXS013"]}],"id":[{"id":"10.13039\/501100002822","id-type":"DOI","asserted-by":"publisher"}]},{"name":"International Science & Technology Cooperation Program of China","award":["2013DFB10070"],"award-info":[{"award-number":["2013DFB10070"]}]},{"name":"China Hunan Provincial Science & Technology Program","award":["2012GK4106"],"award-info":[{"award-number":["2012GK4106"]}]},{"DOI":"10.13039\/501100002822","name":"Innovation Foundation for Postgraduate of Central South University","doi-asserted-by":"publisher","award":["2016zzts057"],"award-info":[{"award-number":["2016zzts057"]}],"id":[{"id":"10.13039\/501100002822","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"U.S. National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1262277"],"award-info":[{"award-number":["CNS-1262277"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1109\/tifs.2017.2737966","type":"journal-article","created":{"date-parts":[[2017,8,9]],"date-time":"2017-08-09T18:09:00Z","timestamp":1502302140000},"page":"3081-3093","source":"Crossref","is-referenced-by-count":96,"title":["DPPro: Differentially Private High-Dimensional Data Release via Random Projection"],"prefix":"10.1109","volume":"12","author":[{"given":"Chugui","family":"Xu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2782-183X","authenticated-orcid":false,"given":"Ju","family":"Ren","sequence":"additional","affiliation":[]},{"given":"Yaoxue","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Zhan","family":"Qin","sequence":"additional","affiliation":[]},{"given":"Kui","family":"Ren","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/SFFCS.1999.814637"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1002\/rsa.10073"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1090\/conm\/026\/737400","article-title":"Extensions of Lipshitz mapping into Hilbert space","volume":"26","author":"johnson","year":"1984","journal-title":"Contemp Math"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/1374376.1374464"},{"key":"ref37","doi-asserted-by":"crossref","first-page":"1302","DOI":"10.1214\/aos\/1015957395","article-title":"Adaptive estimation of a quadratic functional by model selection","volume":"28","author":"laurent","year":"2000","journal-title":"Ann Statist"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2003.814350"},{"key":"ref35","doi-asserted-by":"crossref","first-page":"65","DOI":"10.29012\/jpc.v4i1.612","article-title":"Learning in a large function space: Privacy-preserving mechanisms for SVM learning","volume":"4","author":"rubinstein","year":"2012","journal-title":"J Privacy Confidentiality"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/276698.276876"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1989323.1989347"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2020408.2020487"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2012.135"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2012.80"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2274576.2274608"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-014-0351-4"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2015.11.002"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2012.67"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"39","DOI":"10.29012\/jpc.v5i1.625","article-title":"Privacy via the Johnson-Lindenstrauss transform","volume":"5","author":"kenthapadi","year":"2013","journal-title":"J Privacy Confidentiality"},{"key":"ref19","first-page":"1","article-title":"Differentially private ordinary least squares: $T$ -values, confidence intervals and rejecting null-hypotheses","author":"sheffet","year":"2016","journal-title":"Proc TPDPS"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2010.12"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2007.66"},{"key":"ref27","first-page":"486","article-title":"Our data, ourselves: Privacy via distributed noise generation","author":"dwork","year":"2006","journal-title":"Proc Int Conf Theory Appl Cryptographic Techn"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79228-4_1"},{"key":"ref6","first-page":"475","article-title":"Differentially private synthesization of multi-dimensional data using copula functions","author":"li","year":"2014","journal-title":"Proc Int Conf Extending Database Technol"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/1807085.1807104"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2783379"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2588555.2588573"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2588555.2588575"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1007\/11681878_14","article-title":"Calibrating noise to sensitivity in private data analysis","author":"dwork","year":"2006","journal-title":"Proc Conf Theory of Cryptography"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1265530.1265569"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1749603.1749605"},{"key":"ref20","first-page":"1","article-title":"Private approximations of the 2nd-moment matrix using existing techniques in linear regression","author":"sheffet","year":"2015","journal-title":"Proc NIPS Workshop Learn Privacy"},{"key":"ref22","author":"upadhyay","year":"2016","journal-title":"Fast and space-optimal low-rank factorization in the streaming model with application in differential privacy"},{"key":"ref21","author":"upadhyay","year":"2016","journal-title":"On low-space differentially private low-rank factorization in the spectral norm"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2016.7498241"},{"key":"ref23","author":"upadhyay","year":"2014","journal-title":"Randomness efficient fast-Johnson-Lindenstrauss transform with applications in differential privacy and compressed sensing"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"451","DOI":"10.1145\/2714576.2714621","article-title":"Differentially private publishing of high-dimensional data using sensitivity control","author":"day","year":"2015","journal-title":"Proc 10th ACM Symp Inf Comput Commun Secur"},{"key":"ref25","first-page":"2451","article-title":"Probabilistic inference and differential privacy","volume":"23","author":"williams","year":"2010","journal-title":"Proc Adv Neural Inf Process Syst"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/ieeexplore.ieee.org\/ielaam\/10206\/8017695\/8006304-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/8017695\/08006304.pdf?arnumber=8006304","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,31]],"date-time":"2022-07-31T23:00:52Z","timestamp":1659308452000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8006304\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12]]},"references-count":37,"journal-issue":{"issue":"12"},"URL":"https:\/\/doi.org\/10.1109\/tifs.2017.2737966","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,12]]}}}