{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T13:59:26Z","timestamp":1773669566194,"version":"3.50.1"},"reference-count":40,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"9","license":[{"start":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T00:00:00Z","timestamp":1693526400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T00:00:00Z","timestamp":1693526400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,9,1]],"date-time":"2023-09-01T00:00:00Z","timestamp":1693526400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072278"],"award-info":[{"award-number":["62072278"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62122042"],"award-info":[{"award-number":["62122042"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62272256"],"award-info":[{"award-number":["62272256"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007129","name":"Natural Science Foundation of Shandong Province","doi-asserted-by":"publisher","award":["ZR2022LZH010"],"award-info":[{"award-number":["ZR2022LZH010"]}],"id":[{"id":"10.13039\/501100007129","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007129","name":"Natural Science Foundation of Shandong Province","doi-asserted-by":"publisher","award":["ZR2022ZD02"],"award-info":[{"award-number":["ZR2022ZD02"]}],"id":[{"id":"10.13039\/501100007129","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007129","name":"Natural Science Foundation of Shandong Province","doi-asserted-by":"publisher","award":["ZR2022ZD03"],"award-info":[{"award-number":["ZR2022ZD03"]}],"id":[{"id":"10.13039\/501100007129","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Pilot Project for Integrated Innovation of Science"},{"name":"Education and Industry of the Qilu University of Technology","award":["2022XD001"],"award-info":[{"award-number":["2022XD001"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Knowl. Data Eng."],"published-print":{"date-parts":[[2023,9,1]]},"DOI":"10.1109\/tkde.2023.3241442","type":"journal-article","created":{"date-parts":[[2023,2,2]],"date-time":"2023-02-02T20:07:56Z","timestamp":1675368476000},"page":"9547-9561","source":"Crossref","is-referenced-by-count":7,"title":["A Distributed Privacy-Preserving Learning Dynamics in General Social Networks"],"prefix":"10.1109","volume":"35","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6750-1190","authenticated-orcid":false,"given":"Youming","family":"Tao","sequence":"first","affiliation":[{"name":"School of Computer Science and Technology, Shandong University, Qingdao, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1686-8245","authenticated-orcid":false,"given":"Shuzhen","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Shandong University, Qingdao, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3746-2132","authenticated-orcid":false,"given":"Feng","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Shandong University, Qingdao, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6835-5981","authenticated-orcid":false,"given":"Dongxiao","family":"Yu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Shandong University, Qingdao, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6451-1158","authenticated-orcid":false,"given":"Jiguo","family":"Yu","sequence":"additional","affiliation":[{"name":"Big Data Institute, Qilu University of Technology, Jinan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2811-8962","authenticated-orcid":false,"given":"Hao","family":"Sheng","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Software Development Environment, School of Computer Science and Engineering, Beihang University, Beijing, China"}]}],"member":"263","reference":[{"key":"ref1","first-page":"974","article-title":"Portfolio choices with orthogonal bandit learning","volume-title":"Proc. 24th Int. Conf. Artif. Intell.","author":"Shen"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32650-9_10"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s002650050536"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3087801.3087820"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3322205.3311082"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1137\/090756090"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2013.53"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813687"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2988575"},{"key":"ref11","first-page":"387","article-title":"Corrupt bandits for preserving local privacy","volume-title":"Proc. 29th Algorithmic Learn. Theory","author":"Gajane"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3383313.3412254"},{"key":"ref13","article-title":"Multi-armed bandits with local differential privacy","author":"Ren","year":"2020"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1970.1054427"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3219617.3219653"},{"key":"ref16","first-page":"213","article-title":"Social-learning theory of identificatory processes","volume":"43","author":"Bandura","year":"1969","journal-title":"Handbook Socialization Theory Res."},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313679"},{"issue":"2","key":"ref18","first-page":"426","article-title":"Culture and evolutionary process","volume":"19","author":"Boyd","year":"1985","journal-title":"Amer. J. Sociol."},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1525\/aa.2001.103.4.992"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1098\/rstb.2008.0131"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.2307\/2118512"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1111\/1468-2354.00071"},{"key":"ref23","article-title":"Human collective intelligence as distributed Bayesian inference","author":"Krafft","year":"2016"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3436755"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.12"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133982"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-19129-4_3"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2018.2819673"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1561\/9781601988195"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1137\/110857714"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2018.2824328"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2022.23054"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363201"},{"key":"ref34","article-title":"Prediction poisoning: Towards defenses against DNN model stealing attacks","volume-title":"Proc. 8th Int. Conf. Learn. Representations","author":"Orekondy"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2021.3056991"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1090\/mbk\/107"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511581274"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2019.00060"},{"key":"ref39","first-page":"394","article-title":"Improving the Gaussian mechanism for differential privacy: Analytical calibration and optimal denoising","volume-title":"Proc. 35th Int. Conf. Mach. Learn.","author":"Balle"},{"key":"ref40","first-page":"89","article-title":"Tight analysis of privacy and utility tradeoff in approximate differential privacy","volume-title":"Proc. 23th Int. Conf. Artif. Intell. Statist.","author":"Geng"}],"container-title":["IEEE Transactions on Knowledge and Data Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/69\/10210449\/10035414.pdf?arnumber=10035414","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,2]],"date-time":"2024-03-02T17:25:32Z","timestamp":1709400332000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10035414\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,1]]},"references-count":40,"journal-issue":{"issue":"9"},"URL":"https:\/\/doi.org\/10.1109\/tkde.2023.3241442","relation":{},"ISSN":["1041-4347","1558-2191","2326-3865"],"issn-type":[{"value":"1041-4347","type":"print"},{"value":"1558-2191","type":"electronic"},{"value":"2326-3865","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,9,1]]}}}