{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T07:34:05Z","timestamp":1761896045544,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":47,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,4,14]],"date-time":"2015-04-14T00:00:00Z","timestamp":1428969600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Singapore's Agency for Science, Technology, and Research (A*STAR)","award":["the Human Sixth Sense Programme"],"award-info":[{"award-number":["the Human Sixth Sense Programme"]}]},{"name":"U.S. National Science Foundation","award":["CNS-0963715"],"award-info":[{"award-number":["CNS-0963715"]}]},{"name":"S'pore Ministry of Education","award":["SUTD-ZJU-RES-01-2013 and SRG-ISTD-2013-060"],"award-info":[{"award-number":["SUTD-ZJU-RES-01-2013 and SRG-ISTD-2013-060"]}]},{"name":"National Natural Science Foundation of China (NSFC)","award":["61429301"],"award-info":[{"award-number":["61429301"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,4,14]]},"DOI":"10.1145\/2714576.2714577","type":"proceedings-article","created":{"date-parts":[[2015,4,3]],"date-time":"2015-04-03T16:27:14Z","timestamp":1428078434000},"page":"427-438","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["On Information-theoretic Measures for Quantifying Privacy Protection of Time-series Data"],"prefix":"10.1145","author":[{"given":"Chris Y.T.","family":"Ma","sequence":"first","affiliation":[{"name":"Advanced Digital Sciences Center, Singapore, Singapore"}]},{"given":"David K.Y.","family":"Yau","sequence":"additional","affiliation":[{"name":"Singapore University of Technology and Design, Advanced Digital Sciences Center, Singapore, Singapore"}]}],"member":"320","published-online":{"date-parts":[[2015,4,14]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proc. of IH","author":"\u00c1cs G.","year":"2011","unstructured":"G. \u00c1cs and C. Castelluccia . I have a DREAM!: differentially private smart metering . In Proc. of IH , May 2011 . G. \u00c1cs and C. Castelluccia. I have a DREAM!: differentially private smart metering. In Proc. of IH, May 2011."},{"key":"e_1_3_2_1_2_1","volume-title":"On Measures of Information and Their Characterizations","author":"Aczel J.","year":"1975","unstructured":"J. Aczel and Z. Daroczy . On Measures of Information and Their Characterizations . Academic Press , 1975 . J. Aczel and Z. Daroczy. On Measures of Information and Their Characterizations. Academic Press, 1975."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1214\/aop\/1176991794"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2367580.2367586"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2003.1186725"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1013759724438"},{"key":"e_1_3_2_1_8_1","volume-title":"Operational parameters affecting use of anonymous cell phone tracking for generating traffic information","author":"Cayford R.","year":"2003","unstructured":"R. Cayford and T. Johnson . Operational parameters affecting use of anonymous cell phone tracking for generating traffic information . Institute of transportation studies for the 82th TRB Annual Meeting, 1(3), January 2003 . R. Cayford and T. Johnson. Operational parameters affecting use of anonymous cell phone tracking for generating traffic information. Institute of transportation studies for the 82th TRB Annual Meeting, 1(3), January 2003."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32946-3_15"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1002\/9781118532843"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2020408.2020450"},{"key":"e_1_3_2_1_12_1","volume-title":"Elements of Information Theory","author":"Cover T.","year":"2006","unstructured":"T. Cover and J. Thomas . Elements of Information Theory , 2 nd Edn. Wiley , New York , 2006 . T. Cover and J. Thomas. Elements of Information Theory, 2nd Edn. Wiley, New York, 2006.","edition":"2"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1038\/srep01376"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/11428572_10"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/11787006_1"},{"key":"e_1_3_2_1_16_1","volume-title":"Proc. of TAMC","author":"Dwork C.","year":"2008","unstructured":"C. Dwork . Differential privacy : A survey of results . In Proc. of TAMC , April 2008 . C. Dwork. Differential privacy: A survey of results. In Proc. of TAMC, April 2008."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2005.48"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1066116.1189037"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/977405.978630"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315266"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTGRID.2010.5622047"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/951949.952160"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33167-1_20"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2007.367856"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2012.2208983"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2006.1"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046720"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2007.41"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2010.2050156"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1614320.1614358"},{"key":"e_1_3_2_1_31_1","volume-title":"Proc. of UbiComp","author":"Patel S. N.","year":"2007","unstructured":"S. N. Patel , T. Robertson , J. A. Kientz , M. S. Reynolds , and G. D. Abowd . At the flick of a switch: detecting and classifying unique electrical events on the residential power line . In Proc. of UbiComp , September 2007 . S. N. Patel, T. Robertson, J. A. Kientz, M. S. Reynolds, and G. D. Abowd. At the flick of a switch: detecting and classifying unique electrical events on the residential power line. In Proc. of UbiComp, September 2007."},{"key":"e_1_3_2_1_32_1","volume-title":"Existing law and competing policies. A report for the Colorado Public Utilities Commission","author":"Quinn E. L.","year":"2009","unstructured":"E. L. Quinn . Smart metering and privacy : Existing law and competing policies. A report for the Colorado Public Utilities Commission , 2009 . E. L. Quinn. Smart metering and privacy: Existing law and competing policies. A report for the Colorado Public Utilities Commission, 2009."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2011.6102315"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1807167.1807247"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-012-0182-5"},{"key":"e_1_3_2_1_36_1","volume-title":"One-Minute Resolution Domestic Electricity Use Data","author":"Richardson I.","year":"2008","unstructured":"I. Richardson and M. Thomson . One-Minute Resolution Domestic Electricity Use Data , 2008 -2009 {computer file}. Colchester, Essex : UK Data Archive {distributor}, October 2010. SN : 6583, http:\/\/dx.doi.org\/10.5255\/UKDA-SN-6583-1. http:\/\/discover.ukdataservice.ac.uk\/catalogue?sn=6583. 10.5255\/UKDA-SN-6583-1 I. Richardson and M. Thomson. One-Minute Resolution Domestic Electricity Use Data, 2008-2009 {computer file}. Colchester, Essex: UK Data Archive {distributor}, October 2010. SN: 6583, http:\/\/dx.doi.org\/10.5255\/UKDA-SN-6583-1. http:\/\/discover.ukdataservice.ac.uk\/catalogue?sn=6583."},{"key":"e_1_3_2_1_37_1","volume-title":"Domestic electricity use: A high-resolution energy demand model. Energy and Buildings, 42(10)","author":"Richardson I.","year":"2010","unstructured":"I. Richardson , M. Thomson , D. Infield , and C. Clifford . Domestic electricity use: A high-resolution energy demand model. Energy and Buildings, 42(10) , 2010 . I. Richardson, M. Thomson, D. Infield, and C. Clifford. Domestic electricity use: A high-resolution energy demand model. Energy and Buildings, 42(10), 2010."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"e_1_3_2_1_39_1","volume-title":"Proc. of NDSS","author":"Shi E.","year":"2011","unstructured":"E. Shi , R. Chow , T.-H. Chan , D. Song , and E. Rieffel . Privacy-preserving aggregation of time-series data . In Proc. of NDSS , February 2011 . E. Shi, R. Chow, T.-H. Chan, D. Song, and E. Rieffel. Privacy-preserving aggregation of time-series data. In Proc. of NDSS, February 2011."},{"key":"e_1_3_2_1_40_1","volume-title":"Department of Geography","author":"Steiniger S.","year":"2006","unstructured":"S. Steiniger , M. Neun , and A. Edwardes . Foundations of Location Based Services. Lecture Notes on LBS , Department of Geography , University of Zurich , 2006 . S. Steiniger, M. Neun, and A. Edwardes. Foundations of Location Based Services. Lecture Notes on LBS, Department of Geography, University of Zurich, 2006."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2011.5946886"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/PerCom.2012.6199866"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/WOWMOM.2006.91"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1247480.1247556"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382242"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.2011.5960144"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2008.4497459"}],"event":{"name":"ASIA CCS '15: 10th ACM Symposium on Information, Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Singapore Republic of Singapore","acronym":"ASIA CCS '15"},"container-title":["Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2714576.2714577","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2714576.2714577","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T18:56:14Z","timestamp":1750272974000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2714576.2714577"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,4,14]]},"references-count":47,"alternative-id":["10.1145\/2714576.2714577","10.1145\/2714576"],"URL":"https:\/\/doi.org\/10.1145\/2714576.2714577","relation":{},"subject":[],"published":{"date-parts":[[2015,4,14]]},"assertion":[{"value":"2015-04-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}