{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T23:20:41Z","timestamp":1771024841844,"version":"3.50.1"},"reference-count":74,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"7","license":[{"start":{"date-parts":[[2024,7,1]],"date-time":"2024-07-01T00:00:00Z","timestamp":1719792000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,7,1]],"date-time":"2024-07-01T00:00:00Z","timestamp":1719792000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,7,1]],"date-time":"2024-07-01T00:00:00Z","timestamp":1719792000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62102334"],"award-info":[{"award-number":["62102334"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["92270123"],"award-info":[{"award-number":["92270123"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62372122"],"award-info":[{"award-number":["62372122"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Research Grants Council, Hong Kong SAR, China","award":["15226221"],"award-info":[{"award-number":["15226221"]}]},{"name":"Research Grants Council, Hong Kong SAR, China","award":["15225921"],"award-info":[{"award-number":["15225921"]}]},{"name":"Research Grants Council, Hong Kong SAR, China","award":["15209922"],"award-info":[{"award-number":["15209922"]}]},{"name":"Research Grants Council, Hong Kong SAR, China","award":["15208923"],"award-info":[{"award-number":["15208923"]}]},{"name":"Research Grants Council, Hong Kong SAR, China","award":["15210023"],"award-info":[{"award-number":["15210023"]}]},{"name":"General Research Grants","award":["FRG-24-027-FIE"],"award-info":[{"award-number":["FRG-24-027-FIE"]}]},{"name":"MUST Faculty Research Grants"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Knowl. Data Eng."],"published-print":{"date-parts":[[2024,7]]},"DOI":"10.1109\/tkde.2024.3358909","type":"journal-article","created":{"date-parts":[[2024,1,26]],"date-time":"2024-01-26T19:00:03Z","timestamp":1706295603000},"page":"3195-3209","source":"Crossref","is-referenced-by-count":22,"title":["LDPGuard: Defenses Against Data Poisoning Attacks to Local Differential Privacy Protocols"],"prefix":"10.1109","volume":"36","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3385-6417","authenticated-orcid":false,"given":"Kai","family":"Huang","sequence":"first","affiliation":[{"name":"School of Computer Science and Engineering, Faculty of Innovation Engineering, Macau University of Science and Technology, Taipa, Macau"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-1758-537X","authenticated-orcid":false,"given":"Gaoya","family":"Ouyang","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Hong Kong University of Science and Technology, Kowloon, Hong Kong"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1547-2847","authenticated-orcid":false,"given":"Qingqing","family":"Ye","sequence":"additional","affiliation":[{"name":"Department of Electronic and Information Engineering, Hong Kong Polytechnic University, Kowloon, Hong Kong"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9008-2112","authenticated-orcid":false,"given":"Haibo","family":"Hu","sequence":"additional","affiliation":[{"name":"Department of Electronic and Information Engineering, Hong Kong Polytechnic University, Kowloon, Hong Kong"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8639-4570","authenticated-orcid":false,"given":"Bolong","family":"Zheng","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan, China"}]},{"given":"Xi","family":"Zhao","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Hong Kong University of Science and Technology, Kowloon, Hong Kong"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2022-7387","authenticated-orcid":false,"given":"Ruiyuan","family":"Zhang","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Hong Kong University of Science and Technology, Kowloon, Hong Kong"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6343-1455","authenticated-orcid":false,"given":"Xiaofang","family":"Zhou","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Hong Kong University of Science and Technology, Kowloon, Hong Kong"}]}],"member":"263","reference":[{"key":"ref1","first-page":"1","article-title":"LDPGuard: Defenses against data poisoning attacks to local differential privacy protocols","author":"Huang","year":"2023"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.29012\/jpc.680"},{"key":"ref3","first-page":"2285","article-title":"Practical locally private heavy hitters","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","author":"Bassily"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2746539.2746632"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3183713.3196906"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2013.53"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660348"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737527"},{"key":"ref9","first-page":"2436","article-title":"Discrete distribution estimation under local privacy","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Kairouz"},{"key":"ref10","first-page":"2879","article-title":"Extremal mechanisms for local differential privacy","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","author":"Kairouz"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978409"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2812146"},{"key":"ref13","first-page":"729","article-title":"Locally differentially private protocols for frequency estimation","volume-title":"Proc. USENIX Secur. Conf.","author":"Wang"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3299869.3319891"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00035"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2927695"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24157"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3107512"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243742"},{"key":"ref20","article-title":"Learning with privacy at scale","year":"2017"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00018"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2020.3047124"},{"key":"ref23","first-page":"3574","article-title":"Collecting telemetry data privately","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","author":"Ding"},{"key":"ref24","article-title":"Collecting and analyzing data from smart device users with local differential privacy","author":"Nguy\u00ean","year":"2016"},{"key":"ref25","first-page":"947","article-title":"Data poisoning attacks to local differential privacy protocols","volume-title":"Proc. USENIX Secur. Conf.","author":"Cao"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"ref27","first-page":"24","article-title":"L-diversity: Privacy beyond k-anonymity","volume-title":"Proc. Int. Conf. Data Eng.","author":"Ashwin"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2007.367856"},{"key":"ref29","first-page":"199","article-title":"Privacy preserving subgraph matching on large graphs in cloud","volume-title":"Proc. Int. Conf. Manage. Data","author":"Zhao"},{"key":"ref30","first-page":"265","volume-title":"Proc. Theory Cryptogr. Conf.","author":"Dwork"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM42981.2021.9488899"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-021-00706-0"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1561\/9781601988195"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.2200\/S00735ED1V01Y201609SPT018"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.2307\/2283137"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1137\/090756090"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31594-7_39"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2016-0015"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00001"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.5555\/3016100.3016102"},{"key":"ref41","first-page":"1467","article-title":"Poisoning attacks against support vector machines","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Biggio"},{"key":"ref42","first-page":"1605","article-title":"Local model poisoning attacks to byzantine robust federated learning","volume-title":"Proc. USENIX Secur. Conf.","author":"Fang"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00057"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2909068"},{"key":"ref45","first-page":"6106","article-title":"Poison frogs! Targeted clean-label poisoning attacks on neural networks","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","author":"Shafahi"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23291"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380072"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274706"},{"key":"ref49","first-page":"1893","article-title":"Data poisoning attacks on factorization-based collaborative filtering","volume-title":"Proc. Int. Conf. Neural Inf. Process. Syst.","author":"Li"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23020"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2014.2344095"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660269"},{"key":"ref53","first-page":"1","article-title":"Sybilinfer: Detecting sybil nodes using social networks","volume-title":"Proc. Annu. Netw. Distrib. Syst. Secur. Symp.","author":"Danezis"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2316975"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920263"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23226"},{"key":"ref57","first-page":"241","article-title":"You are how you click: Clickstream analysis for sybil detection","volume-title":"Proc. USENIX Secur. Conf.","author":"Wang"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/1159913.1159945"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363198"},{"key":"ref60","article-title":"xxHash: Extremely fast hash algorithm","author":"Collet","year":"2016"},{"key":"ref61","first-page":"195","article-title":"Trafficking fraudulent accounts: The role of the underground market in twitter spam and abuse","volume-title":"Proc. USENIX Secur. Conf.","author":"Thomas"},{"key":"ref62","article-title":"IPUMS USA: Version 9.0 [dataset]","author":"Steven","year":"2019"},{"key":"ref63","article-title":"San francisco fire department calls for service","year":"2019"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1063\/1.3047921"},{"key":"ref65","first-page":"3629","article-title":"PoisonedEncoder: Poisoning the unlabeled pre-training data in contrastive","volume-title":"Proc. USENIX Secur. Symp.","author":"Liu"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1145\/3514221.3526190"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560636"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833635"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.14778\/3603581.3603597"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.14778\/3594512.3594520"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1145\/3639285"},{"key":"ref72","first-page":"1739","article-title":"Fine-grained poisoning attack to local differential privacy protocols for mean and variance estimation","volume-title":"Proc. USENIX Secur. Symp.","author":"Li"},{"key":"ref73","first-page":"519","article-title":"Poisoning attacks to local differential privacy protocols for key-value data","volume-title":"Proc. USENIX Secur. Conf.","author":"Wu"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179336"}],"container-title":["IEEE Transactions on Knowledge and Data Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/69\/10549876\/10415225.pdf?arnumber=10415225","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,26]],"date-time":"2024-06-26T13:23:25Z","timestamp":1719408205000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10415225\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7]]},"references-count":74,"journal-issue":{"issue":"7"},"URL":"https:\/\/doi.org\/10.1109\/tkde.2024.3358909","relation":{},"ISSN":["1041-4347","1558-2191","2326-3865"],"issn-type":[{"value":"1041-4347","type":"print"},{"value":"1558-2191","type":"electronic"},{"value":"2326-3865","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,7]]}}}