{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T19:03:28Z","timestamp":1771700608509,"version":"3.50.1"},"reference-count":61,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100000038","name":"Natural Sciences and Engineering Research Council of Canada","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"U.S. NSF","doi-asserted-by":"publisher","award":["CNS-1731164"],"award-info":[{"award-number":["CNS-1731164"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2022]]},"DOI":"10.1109\/tifs.2022.3152361","type":"journal-article","created":{"date-parts":[[2022,2,16]],"date-time":"2022-02-16T20:28:40Z","timestamp":1645043320000},"page":"849-864","source":"Crossref","is-referenced-by-count":19,"title":["Privacy-Preserving Aggregate Mobility Data Release: An Information-Theoretic Deep Reinforcement Learning Approach"],"prefix":"10.1109","volume":"17","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3066-7186","authenticated-orcid":false,"given":"Wenjing","family":"Zhang","sequence":"first","affiliation":[{"name":"School of Computer Science, University of Guelph, Guelph, ON, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4341-2032","authenticated-orcid":false,"given":"Bo","family":"Jiang","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Arizona, Tucson, AZ, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4073-0273","authenticated-orcid":false,"given":"Ming","family":"Li","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Arizona, Tucson, AZ, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8916-6645","authenticated-orcid":false,"given":"Xiaodong","family":"Lin","sequence":"additional","affiliation":[{"name":"School of Computer Science, University of Guelph, Guelph, ON, Canada"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3013200"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2015.2504972"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134004"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1126\/science.abb8021"},{"key":"ref5","volume-title":"European Mobile Operators Share Data for Coronavirus Fight","author":"Pollina","year":"2020"},{"key":"ref6","volume-title":"Apple Makes Mobility Data Available to Aid COVID-19 Efforts","year":"2020"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ITSC.2010.5625282"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01516-8_26"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3393691.3394200"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3340412"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.envsoft.2016.02.019"},{"key":"ref14","volume-title":"Consumer Protection Principles: Consumer-Authorized Financial Data Sharing and Aggregation","year":"2017"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052620"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2017-0043"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23183"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79228-4_1"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1806689.1806787"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2043621.2043626"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2071880.2071884"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623361"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.3390\/e19120656"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2018.8433200"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2848659"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2013.31"},{"key":"ref27","first-page":"2180","article-title":"InfoGAN: Interpretable representation learning by information maximizing generative adversarial nets","volume-title":"Proc. 30th Int. Conf. Neural Inf. Process. Syst.","author":"Chen"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3087350"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516735"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813610"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/JSAIT.2021.3062755"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/2665943.2665946"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3009908"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.18"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/Allerton.2012.6483382"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2253320"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2019.2962804"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ITW48936.2021.9611424"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2018.2809005"},{"key":"ref40","first-page":"1779","article-title":"CLUB: A contrastive log-ratio upper bound of mutual information","volume-title":"Proc. 37th Int. Conf. Mach. Learn.","author":"Cheng"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/2396761.2398595"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/2424321.2424384"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046781"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/2996913.2996971"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/2213836.2213870"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813640"},{"key":"ref47","volume-title":"A Brief Introduction to Reinforcement Learning","author":"Murphy","year":"1998"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/S0004-3702(98)00023-X"},{"key":"ref49","volume-title":"University College London Course on Reinforcement Learning","author":"Silver","year":"2015"},{"key":"ref50","first-page":"1928","article-title":"Asynchronous methods for deep reinforcement learning","volume-title":"Proc. 33rd Int. Conf. Mach. Learn.","author":"Mnih"},{"key":"ref51","volume-title":"Reinforcement Learning: An Introduction","author":"Sutton","year":"2018"},{"key":"ref52","article-title":"Lecture 6.5-rmsprop: Divide the gradient by a running average of its recent magnitude","volume-title":"COURSERA: Neural Networks for Machine Learning","author":"Tieleman"},{"key":"ref53","article-title":"TensorFlow: Large-scale machine learning on heterogeneous distributed systems","author":"Abadi","year":"2016","journal-title":"arXiv:1603.04467"},{"key":"ref54","article-title":"OpenAI gym","author":"Brockman","year":"2016","journal-title":"arXiv:1606.01540"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/2020408.2020579"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2853105"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2960336"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33090-2_25"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.3041733"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.3390\/e19120656"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2019.8919758"},{"key":"ref62","first-page":"531","article-title":"Mutual information neural estimation","volume-title":"Proc. 35th Int. Conf. Mach. Learn.","author":"Belghazi"},{"key":"ref63","article-title":"Privacy-constrained policies via mutual information regularized policy gradients","author":"Cundy","year":"2020","journal-title":"arXiv:2012.15019"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/10206\/9652463\/9715086-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/9652463\/09715086.pdf?arnumber=9715086","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,17]],"date-time":"2024-01-17T23:49:19Z","timestamp":1705535359000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9715086\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"references-count":61,"URL":"https:\/\/doi.org\/10.1109\/tifs.2022.3152361","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]}}}