{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T13:09:46Z","timestamp":1775912986582,"version":"3.50.1"},"reference-count":64,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T00:00:00Z","timestamp":1730419200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Key R&#x0026;D Program of China","award":["2023YFB3001900"],"award-info":[{"award-number":["2023YFB3001900"]}]},{"name":"Shenzhen Science and Technology Program","award":["KJZD20230923113901004"],"award-info":[{"award-number":["KJZD20230923113901004"]}]},{"DOI":"10.13039\/501100012245","name":"Science and Technology Planning Project of Guangdong Province","doi-asserted-by":"publisher","award":["2023A0505020006"],"award-info":[{"award-number":["2023A0505020006"]}],"id":[{"id":"10.13039\/501100012245","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Science and Technology Development Fund, Macau SAR","award":["0008\/2022\/AGJ"],"award-info":[{"award-number":["0008\/2022\/AGJ"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U2001209"],"award-info":[{"award-number":["U2001209"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072486"],"award-info":[{"award-number":["62072486"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002402","name":"Sun Yat-sen University","doi-asserted-by":"publisher","award":["23ptpy115"],"award-info":[{"award-number":["23ptpy115"]}],"id":[{"id":"10.13039\/501100002402","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002402","name":"Sun Yat-sen University","doi-asserted-by":"publisher","award":["24lgqb020"],"award-info":[{"award-number":["24lgqb020"]}],"id":[{"id":"10.13039\/501100002402","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Serv. Comput."],"published-print":{"date-parts":[[2024,11]]},"DOI":"10.1109\/tsc.2024.3451187","type":"journal-article","created":{"date-parts":[[2024,8,28]],"date-time":"2024-08-28T18:56:48Z","timestamp":1724871408000},"page":"3773-3788","source":"Crossref","is-referenced-by-count":5,"title":["History-Aware Privacy Budget Allocation for Model Training on Evolving Data-Sharing Platforms"],"prefix":"10.1109","volume":"17","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6428-4888","authenticated-orcid":false,"given":"Linchang","family":"Xiao","sequence":"first","affiliation":[{"name":"School of Computer Science and Engineering, Guangdong Key Laboratory of Big Data Analysis and Processing, Sun Yat-sen University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2332-7941","authenticated-orcid":false,"given":"Xianzhi","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Guangdong Key Laboratory of Big Data Analysis and Processing, Sun Yat-sen University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9433-7725","authenticated-orcid":false,"given":"Di","family":"Wu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Guangdong Key Laboratory of Big Data Analysis and Processing, Sun Yat-sen University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1518-002X","authenticated-orcid":false,"given":"Miao","family":"Hu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Guangdong Key Laboratory of Big Data Analysis and Processing, Sun Yat-sen University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1533-0865","authenticated-orcid":false,"given":"Yipeng","family":"Zhou","sequence":"additional","affiliation":[{"name":"School of Computing, FSE, Macquarie University, Macquarie Park, NSW, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4485-6743","authenticated-orcid":false,"given":"Shui","family":"Yu","sequence":"additional","affiliation":[{"name":"School of Computer Science, University of Technology Sydney, Ultimo, NSW, Australia"}]}],"member":"263","reference":[{"key":"ref1","article-title":"AI training dataset market size, share and trends analysis report, by type (text, image\/video, audio), by vertical (IT, automotive, government, healthcare, BFSI), by regions, and segment forecasts, 2023\u20132030","year":"2023"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataCongress.2015.48"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2023.3242338"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737571"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3572751.3572755"},{"key":"ref6","article-title":"Building a secure data market on blockchain","volume-title":"Proc. USENIX Enigma","author":"Johnson"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2021.3073740"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2020.3038836"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2022.3172136"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2021.3110828"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2023.3270580"},{"key":"ref12","first-page":"14 747","article-title":"Deep Leakage from Gradients","volume-title":"Proc. Annu. Conf. Neural Inf. Process. Syst.","author":"Zhu"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_14"},{"key":"ref14","first-page":"297","article-title":"Airavat: Security and privacy for MapReduce","volume-title":"Proc. 7th USENIX Symp. Netw. Syst. Des. Implementation","author":"Roy"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2213836.2213876"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3341301.3359639"},{"key":"ref17","first-page":"55","article-title":"Privacy budget scheduling","volume-title":"Proc. 15th USENIX Symp. Operating Syst. Des. Implementation","author":"Luo"},{"key":"ref18","article-title":"Packing privacy budget efficiently","author":"Tholoniat","year":"2022"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM42981.2021.9488920"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3231786"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1367497.1367747"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2591796.2591810"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s00453-021-00801-2"},{"key":"ref24","article-title":"iDLG: Improved deep leakage from gradients","author":"Zhao","year":"2020"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2012.48"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"ref27","first-page":"1","article-title":"Learning differentially private recurrent language models","volume-title":"Proc. 6th Int. Conf. Learn. Representations","author":"McMahan"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00019"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2988575"},{"key":"ref30","article-title":"TensorFlow privacy","year":"2020"},{"key":"ref31","article-title":"Opacus","year":"2020"},{"key":"ref32","article-title":"Diffprivlib","year":"2020"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1561\/0400000042"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2017.2685505"},{"key":"ref35","article-title":"Cohere: Privacy management in large scale systems","author":"K\u00fcchler","year":"2023"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/1559845.1559850"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.14778\/2732296.2732300"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM53939.2023.10228953"},{"key":"ref39","first-page":"2633","article-title":"Extracting training data from large language models","volume-title":"Proc. 30th USENIX Secur. Symp.","author":"Carlini"},{"issue":"8","key":"ref40","article-title":"Language models are unsupervised multitask learners","volume":"1","author":"Radford","year":"2019","journal-title":"OpenAI Blog"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.41"},{"key":"ref42","first-page":"267","article-title":"The secret sharer: Evaluating and testing unintended memorization in neural networks","volume-title":"Proc. 28th USENIX Secur. Symp.","author":"Carlini"},{"key":"ref43","volume-title":"Online Computation and Competitive Analysis","author":"Borodin","year":"2005"},{"key":"ref44","volume-title":"Beyond the Worst-case Analysis of Algorithms","author":"Roughgarden","year":"2021"},{"key":"ref45","first-page":"638","article-title":"A simple O(log log(rank))-competitive algorithm for the matroid secretary problem","volume-title":"Proc. ACM-SIAM Symp. Discrete Algorithms","author":"Feldman"},{"key":"ref46","first-page":"1638","article-title":"Online and random-order load balancing simultaneously","volume-title":"Proc. ACM-SIAM Symp. Discrete Algorithms","author":"Molinaro"},{"key":"ref47","first-page":"303","article-title":"Primal beats dual on online packing LPs in the random-order model","volume-title":"Proc. 46th Annu. ACM Symp. Theory Comput.","author":"Kesselheim"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611973099.134"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10841-9_34"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40328-6_2"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611975994.128"},{"key":"ref52","volume-title":"Theory of Linear and Integer Programming","author":"Schrijver","year":"1998"},{"key":"ref53","article-title":"User\u2019s manual for CPLEX","year":"2022"},{"key":"ref54","article-title":"Gurobi optimizer reference manual","year":"2021"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1017\/9781108637435.015"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1007\/b100325"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1989.63499"},{"key":"ref58","article-title":"Faster dynamic matrix inverse for faster LPs","author":"Jiang","year":"2020"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/3424305"},{"key":"ref60","first-page":"945","article-title":"MLaaS in the wild: Workload analysis and scheduling in large-scale heterogeneous GPU clusters","volume-title":"Proc. 19th USENIX Symp. Netw. Syst. Des. Implementation","author":"Weng"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2017.7966217"},{"issue":"1","key":"ref62","first-page":"2909","article-title":"CVXPY: A Python-embedded modeling language for convex optimization","volume":"17","author":"Diamond","year":"2016","journal-title":"J. Mach. Learn. Res."},{"key":"ref63","first-page":"21 428","article-title":"Geometric dataset distances via optimal transport","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Alvarez-Melis"},{"key":"ref64","first-page":"219","article-title":"Dataset dynamics via gradient flows in probability space","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Alvarez-Melis"}],"container-title":["IEEE Transactions on Services Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/4629386\/10818968\/10654304.pdf?arnumber=10654304","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,3]],"date-time":"2025-01-03T04:34:49Z","timestamp":1735878889000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10654304\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11]]},"references-count":64,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/tsc.2024.3451187","relation":{},"ISSN":["1939-1374","2372-0204"],"issn-type":[{"value":"1939-1374","type":"electronic"},{"value":"2372-0204","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11]]}}}