{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T10:16:46Z","timestamp":1740133006516,"version":"3.37.3"},"reference-count":45,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Knowl. Data Eng."],"published-print":{"date-parts":[[2022]]},"DOI":"10.1109\/tkde.2022.3186907","type":"journal-article","created":{"date-parts":[[2022,7,1]],"date-time":"2022-07-01T19:34:31Z","timestamp":1656704071000},"page":"1-14","source":"Crossref","is-referenced-by-count":1,"title":["Collecting Preference Rankings under Local Differential Privacy"],"prefix":"10.1109","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6556-2264","authenticated-orcid":false,"given":"Xiang","family":"Cheng","sequence":"first","affiliation":[{"name":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"given":"Jianyu","family":"Yang","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"given":"Yufei","family":"Wang","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"given":"Rui","family":"Chen","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Harbin Engineering University, Harbin, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4266-7527","authenticated-orcid":false,"given":"Sen","family":"Su","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"given":"Yuejia","family":"Li","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31594-7_39"},{"key":"ref35","doi-asserted-by":"crossref","first-page":"5827","DOI":"10.1109\/JIOT.2019.2952146","article-title":"Local differential privacy for deep learning","volume":"7","author":"chamikara","year":"2020","journal-title":"IEEE Internet of Things Journal"},{"key":"ref12","first-page":"2436","article-title":"Discrete distribution estimation under local privacy","author":"kairouz","year":"2016","journal-title":"Proc Int Conf Mach Learn"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3378679.3394533"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3196959.3196981"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2019.00151"},{"key":"ref14","first-page":"2288","article-title":"Practical locally private heavy hitters","author":"bassily","year":"2017","journal-title":"Proc Int Conf Neural Inform Process Syst"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2897005"},{"key":"ref31","first-page":"3571","article-title":"Collecting telemetry data privately","author":"ding","year":"2017","journal-title":"Proc Int Conf Neural Inform Process Syst"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2985524"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2016-0015"},{"key":"ref33","first-page":"2381","article-title":"Local differential privacy for evolving data","author":"joseph","year":"2018","journal-title":"Proc Int Conf Neural Inform Process Syst"},{"key":"ref10","first-page":"729","article-title":"Locally differentially private protocols for frequency estimation","author":"wang","year":"2017","journal-title":"Proc 26th USENIX Conf Secur Symp"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2016.7472065"},{"key":"ref2","article-title":"Privacy loss in apple&#x2019;s implementation of differential privacy on macOS 10.12","volume":"abs 1709 2753","author":"tang","year":"2017","journal-title":"CoRR"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660348"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00035"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/1559845.1559850"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978409"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1111\/j.2517-6161.1996.tb02080.x"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2812146"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2018.00079"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2949041"},{"key":"ref23","first-page":"2879","article-title":"Extremal mechanisms for local differential privacy","author":"kairouz","year":"2014","journal-title":"Proc Int Conf Neural Inform Process Syst"},{"year":"0","key":"ref45","article-title":"Source code of safari"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00018"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2016.7498248"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3183713.3196906"},{"year":"2016","key":"ref42","article-title":"Sushi data"},{"year":"2022","key":"ref41","article-title":"safari"},{"key":"ref22","first-page":"429","article-title":"Local privacy and statistical minimax rates","author":"duchi","year":"2013","journal-title":"Proc IEEE Annu Foundations Comput Sci"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/b13794"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243742"},{"year":"2001","key":"ref43","article-title":"Jester data"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134086"},{"key":"ref27","first-page":"967","article-title":"PCKV: Locally differentially private correlated key-value data collection with optimized utility","author":"gu","year":"2020","journal-title":"Proc 29th USENIX Conf Secur Symp"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354253"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.2307\/2283137"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2008.27"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2746539.2746632"},{"key":"ref4","first-page":"799","article-title":"Riffled independence for ranked data","author":"huang","year":"2009","journal-title":"Proc Adv Neural Informat Process Syst"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_14"},{"key":"ref6","article-title":"Collecting and analyzing data from smart device users with local differential privacy","author":"nguy\u00ean","year":"2016","journal-title":"CoRR"},{"key":"ref5","first-page":"455","article-title":"Learning hierarchical riffle independent groupings from rankings","author":"huang","year":"2010","journal-title":"Proc Int Conf Mach Learn"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1214\/009053604000000067"}],"container-title":["IEEE Transactions on Knowledge and Data Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/69\/4358933\/09813492.pdf?arnumber=9813492","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,7]],"date-time":"2023-06-07T00:35:48Z","timestamp":1686098148000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9813492\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"references-count":45,"URL":"https:\/\/doi.org\/10.1109\/tkde.2022.3186907","relation":{},"ISSN":["1041-4347","1558-2191","2326-3865"],"issn-type":[{"type":"print","value":"1041-4347"},{"type":"electronic","value":"1558-2191"},{"type":"electronic","value":"2326-3865"}],"subject":[],"published":{"date-parts":[[2022]]}}}