{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T18:36:09Z","timestamp":1775154969627,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,9,12]],"date-time":"2017-09-12T00:00:00Z","timestamp":1505174400000},"content-version":"vor","delay-in-days":365,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000002","name":"National Institutes of Health","doi-asserted-by":"publisher","award":["R01CA190329,R01MD010362,R01DA035502,U54EB020404"],"award-info":[{"award-number":["R01CA190329,R01MD010362,R01DA035502,U54EB020404"]}],"id":[{"id":"10.13039\/100000002","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1212901,IIS-1231754"],"award-info":[{"award-number":["CNS-1212901,IIS-1231754"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,9,12]]},"DOI":"10.1145\/2971648.2971753","type":"proceedings-article","created":{"date-parts":[[2016,9,9]],"date-time":"2016-09-09T10:28:57Z","timestamp":1473416937000},"page":"706-717","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":36,"title":["mSieve"],"prefix":"10.1145","author":[{"given":"Nazir","family":"Saleheen","sequence":"first","affiliation":[{"name":"University of Memphis"}]},{"given":"Supriyo","family":"Chakraborty","sequence":"additional","affiliation":[{"name":"IBM T. J. Watson Research Center"}]},{"given":"Nasir","family":"Ali","sequence":"additional","affiliation":[{"name":"University of Memphis"}]},{"given":"Md Mahbubur","family":"Rahman","sequence":"additional","affiliation":[{"name":"Nokia Research"}]},{"given":"Syed Monowar","family":"Hossain","sequence":"additional","affiliation":[{"name":"University of Memphis"}]},{"given":"Rummana","family":"Bari","sequence":"additional","affiliation":[{"name":"University of Memphis"}]},{"given":"Eugene","family":"Buder","sequence":"additional","affiliation":[{"name":"University of Memphis"}]},{"given":"Mani","family":"Srivastava","sequence":"additional","affiliation":[{"name":"University of California"}]},{"given":"Santosh","family":"Kumar","sequence":"additional","affiliation":[{"name":"University of Memphis"}]}],"member":"320","published-online":{"date-parts":[[2016,9,12]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/375551.375602"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/335191.335438"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2185677.2185741"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/BSN.2010.23"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.15420\/usc.2004.1.1.17"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1835804.1835869"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/19.930458"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.39"},{"key":"e_1_3_2_1_9_1","unstructured":"Chakraborty S. Balancing Behavioral Privacy and Information Utility in Sensory Data Flows. PhD thesis University of California Los Angeles 2014."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2444776.2444791"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/2616448.2616463"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.14778\/3402707.3402744"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/1213221"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/772862.772867"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/773153.773173"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/508171.508174"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/1791834.1791836"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_14"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536467"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2003.09.001"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1835804.1835868"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2213836.2213870"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.14778\/1920841.1920970"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1989284.1989304"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/2602339.2602348"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2750858.2807526"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2007.367856"},{"key":"e_1_3_2_1_28_1","volume-title":"Provably private data anonymization: Or, k-anonymity meets differential privacy. Arxiv preprint","author":"Li N.","year":"2011","unstructured":"Li, N., Qardaji, W. H., and Su, D. Provably private data anonymization: Or, k-anonymity meets differential privacy. Arxiv preprint (2011)."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.5555\/646765.704129"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1217299.1217302"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1161\/01.CIR.95.6.1441"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594368.2594379"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/772862.772865"},{"key":"e_1_3_2_1_34_1","volume-title":"Information Processing in Sensor Networks (IPSN), 2011 10th International Conference on, IEEE","author":"Plarre K.","year":"2011","unstructured":"Plarre, K., Raij, A., Hossain, S. M., Ali, A. A., Nakajima, M., al'Absi, M., Ertin, E., Kamarck, T., Kumar, S., Scott, M., et al. Continuous inference of psychological stress from sensory measurements collected in the natural environment. In Information Processing in Sensor Networks (IPSN), 2011 10th International Conference on, IEEE (2011), 97--108."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2077546.2077557"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2649387.2649433"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806689.1806794"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2750858.2806897"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2750858.2807545"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/775047.775142"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.5555\/1889159.1889173"}],"event":{"name":"UbiComp '16: The 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing","location":"Heidelberg Germany","acronym":"UbiComp '16","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2971648.2971753","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2971648.2971753","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2971648.2971753","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:17:40Z","timestamp":1763457460000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2971648.2971753"}},"subtitle":["differential behavioral privacy in time series of mobile sensor data"],"short-title":[],"issued":{"date-parts":[[2016,9,12]]},"references-count":42,"alternative-id":["10.1145\/2971648.2971753","10.1145\/2971648"],"URL":"https:\/\/doi.org\/10.1145\/2971648.2971753","relation":{},"subject":[],"published":{"date-parts":[[2016,9,12]]},"assertion":[{"value":"2016-09-12","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}