{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T13:10:42Z","timestamp":1767705042971,"version":"3.37.3"},"reference-count":51,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2019,3,1]],"date-time":"2019-03-01T00:00:00Z","timestamp":1551398400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,3,1]],"date-time":"2019-03-01T00:00:00Z","timestamp":1551398400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,3,1]],"date-time":"2019-03-01T00:00:00Z","timestamp":1551398400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61672395","61401169"],"award-info":[{"award-number":["61672395","61401169"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Multimedia"],"published-print":{"date-parts":[[2019,3]]},"DOI":"10.1109\/tmm.2018.2885509","type":"journal-article","created":{"date-parts":[[2018,12,10]],"date-time":"2018-12-10T19:25:19Z","timestamp":1544469919000},"page":"539-554","source":"Crossref","is-referenced-by-count":44,"title":["Differentially-Private and Trustworthy Online Social Multimedia Big Data Retrieval in Edge Computing"],"prefix":"10.1109","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8896-030X","authenticated-orcid":false,"given":"Pan","family":"Zhou","sequence":"first","affiliation":[]},{"given":"Kehao","family":"Wang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0515-1647","authenticated-orcid":false,"given":"Jie","family":"Xu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1755-0183","authenticated-orcid":false,"given":"Dapeng","family":"Wu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2769878"},{"key":"ref38","first-page":"571","article-title":"A privacy-preserving framework for personalized, social recommendations","author":"jorgensen","year":"0","journal-title":"Proc Intl Conf Extending Database Technology"},{"key":"ref33","article-title":"Lightweight fine-grained search over encrypted data in fog computing","author":"miao","year":"2018","journal-title":"IEEE Trans Services Comput"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/1401890.1401904"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/2554850.2554924"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2014.6766086"},{"article-title":"How to break anonymity of the Netflix prize dataset","year":"2006","author":"narayanan","key":"ref37"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2018.1700274"},{"key":"ref35","article-title":"Differential privacy preserving of training model in wireless big data with edge computing","author":"du","year":"2018","journal-title":"IEEE Trans Big Data"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2817523"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2014.2299517"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/Allerton.2013.6736696"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1023\/A:1013689704352"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2750180"},{"year":"0","key":"ref1"},{"key":"ref20","first-page":"121","article-title":"A bandit approach for intelligent IoT service composition across heterogeneous smart spaces","author":"wanigasekara","year":"0","journal-title":"Proc Int Conf Internet of Things"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2007.66"},{"key":"ref21","first-page":"265","article-title":"Calibrating noise to sensitivity in private data analysis","author":"dwork","year":"0","journal-title":"Proc Conf Theory of Cryptography"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2318835"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2014.2365795"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2013.6761049"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/FiCloudW.2017.72"},{"key":"ref50","article-title":"The new data and new challenges in multimedia research","volume":"1","author":"thomee","year":"2015","journal-title":"arXiv preprint arXiv 1503"},{"article-title":"Differentially-Private and Trustworthy Online Social Multimedia Big Data Retrieval in Edge Computing","year":"2018","author":"zhou","key":"ref51"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.73.2.296"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2018.1700317"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2017.17"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2839915"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1700360"},{"key":"ref14","article-title":"Content retrieval at the edge: A social-aware and named data cooperative framework","author":"pu","year":"2018","journal-title":"IEEE Trans Emerg Topics Comput"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2561839"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2775739"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2018.2879674"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2018.2869948"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2876417"},{"key":"ref4","article-title":"Privacy by the Numbers: A New Approach to Safeguarding Data","volume":"10","year":"2012","journal-title":"Quanta Mag"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2016.7565185"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2018.8406877"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1561\/0400000042"},{"key":"ref8","first-page":"287","article-title":"Internet of Things: A context-awareness perspective","author":"preuveneers","year":"2008","journal-title":"The Internet of Things From RFID to The Next-Generation Pervasive Networked Systems"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.042313.00197"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/2043621.2043626"},{"key":"ref9","first-page":"679","article-title":"Contextual bandits with similarity informatio","author":"slivkins","year":"0","journal-title":"Proc Assoc Comput Linguistics"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-85820-3_7"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511546921"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/1806689.1806787"},{"key":"ref47","first-page":"1557","article-title":"Online stochastic optimization under correlated bandit feedback","author":"azar","year":"0","journal-title":"Proc 31st Int Conf Mach Learn"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/SocialCom-PASSAT.2012.115"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2018.8406900"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8057106"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2014.2382576"}],"container-title":["IEEE Transactions on Multimedia"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6046\/8649843\/08571248.pdf?arnumber=8571248","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T21:06:35Z","timestamp":1657746395000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8571248\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3]]},"references-count":51,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tmm.2018.2885509","relation":{},"ISSN":["1520-9210","1941-0077"],"issn-type":[{"type":"print","value":"1520-9210"},{"type":"electronic","value":"1941-0077"}],"subject":[],"published":{"date-parts":[[2019,3]]}}}