{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,9]],"date-time":"2026-05-09T16:32:09Z","timestamp":1778344329284,"version":"3.51.4"},"reference-count":30,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"11","license":[{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61572031"],"award-info":[{"award-number":["61572031"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61572001"],"award-info":[{"award-number":["61572001"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["11301002"],"award-info":[{"award-number":["11301002"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Natural Science Foundation for the Higher Education Institutions of Anhui Province of China","award":["KJ2018A0017"],"award-info":[{"award-number":["KJ2018A0017"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61872001"],"award-info":[{"award-number":["61872001"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2019,11]]},"DOI":"10.1109\/tifs.2019.2908070","type":"journal-article","created":{"date-parts":[[2019,3,28]],"date-time":"2019-03-28T18:41:40Z","timestamp":1553798500000},"page":"2805-2818","source":"Crossref","is-referenced-by-count":37,"title":["Differentially Private Double Spectrum Auction With Approximate Social Welfare Maximization"],"prefix":"10.1109","volume":"14","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2231-3652","authenticated-orcid":false,"given":"Zhili","family":"Chen","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9705-0888","authenticated-orcid":false,"given":"Tianjiao","family":"Ni","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Hong","family":"Zhong","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3439-5579","authenticated-orcid":false,"given":"Shun","family":"Zhang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7258-3418","authenticated-orcid":false,"given":"Jie","family":"Cui","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2016.2615278"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2015.7218463"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2007.66"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5062011"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1530748.1530751"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5935115"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2010.241"},{"key":"ref16","first-page":"873","article-title":"Truthful spectrum auction design for secondary networks","author":"zhu","year":"2012","journal-title":"Proc IEEE InfoCom"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2491288.2491313"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"866","DOI":"10.1109\/JSAC.2011.110417","article-title":"Purging the back-room dealing: Secure spectrum auction leveraging paillier cryptosystem","volume":"29","author":"pan","year":"2011","journal-title":"IEEE J Sel Areas Commun"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2014.2322104"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1561\/0400000042","article-title":"The algorithmic foundations of differential privacy","volume":"9","author":"dwork","year":"2014","journal-title":"Found Trends Theor Comput Sci"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2942358.2947400"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611973075.90"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2014.2315200"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/IWQoS.2017.7969153"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.2200\/S00735ED1V01Y201609SPT018"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848057"},{"key":"ref8","first-page":"1","article-title":"Differential privacy","volume":"4052","author":"dwork","year":"2006","journal-title":"Proc 33rd Int Colloq Automata Lang Program (ICALP)"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79228-4_1"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6566870"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2632951.2632974"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2006.05.001"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2850330"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CIC.2017.00023"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2012.36"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-015-0955-7"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2808347"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511800481"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.4108\/icst.crowncom.2011.245807"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/8747549\/08676063.pdf?arnumber=8676063","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T20:54:09Z","timestamp":1657745649000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8676063\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11]]},"references-count":30,"journal-issue":{"issue":"11"},"URL":"https:\/\/doi.org\/10.1109\/tifs.2019.2908070","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,11]]}}}