{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T09:01:41Z","timestamp":1775638901485,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,10,24]],"date-time":"2016-10-24T00:00:00Z","timestamp":1477267200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"MOE Singapore","award":["ARC19\/14"],"award-info":[{"award-number":["ARC19\/14"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,10,24]]},"DOI":"10.1145\/2976749.2978409","type":"proceedings-article","created":{"date-parts":[[2016,10,25]],"date-time":"2016-10-25T12:46:35Z","timestamp":1477399595000},"page":"192-203","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":247,"title":["Heavy Hitter Estimation over Set-Valued Data with Local Differential Privacy"],"prefix":"10.1145","author":[{"given":"Zhan","family":"Qin","sequence":"first","affiliation":[{"name":"Qatar Computing Research Institute, HBKU, Doha, Qatar"}]},{"given":"Yin","family":"Yang","sequence":"additional","affiliation":[{"name":"Hamad Bin Khalifa University, Doha, Qatar"}]},{"given":"Ting","family":"Yu","sequence":"additional","affiliation":[{"name":"Qatar Computing Research Institute, HBKU, Doha, Qatar"}]},{"given":"Issa","family":"Khalil","sequence":"additional","affiliation":[{"name":"Qatar Computing Research Institute, HBKU, Doha, Qatar"}]},{"given":"Xiaokui","family":"Xiao","sequence":"additional","affiliation":[{"name":"Nanyang Technological University, Singapore, Singapore"}]},{"given":"Kui","family":"Ren","sequence":"additional","affiliation":[{"name":"State University of New York at Buffalo, Buffalo, Qatar"}]}],"member":"320","published-online":{"date-parts":[[2016,10,24]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Aol search log. http:\/\/www.gregsadetsky.com\/aol-data\/.  Aol search log. http:\/\/www.gregsadetsky.com\/aol-data\/."},{"key":"e_1_3_2_1_2_1","unstructured":"Spmf: An open-source data mining library. http:\/\/www.philippe-fournier-viger.com\/spmf.  Spmf: An open-source data mining library. http:\/\/www.philippe-fournier-viger.com\/spmf."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2746539.2746632"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1835804.1835869"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2450142.2450148"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102351.1102363"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.14778\/3402707.3402744"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2666468"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2013.53"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/1791834.1791836"},{"key":"e_1_3_2_1_11_1","first-page":"66","volume-title":"ICS","author":"Dwork C.","year":"2010","unstructured":"C. Dwork , M. Naor , T. Pitassi , G. N. Rothblum , and S. Yekhanin . Pan-private streaming algorithms . In ICS , pages 66 -- 80 , 2010 . C. Dwork, M. Naor, T. Pitassi, G. N. Rothblum, and S. Yekhanin. Pan-private streaming algorithms. In ICS, pages 66--80, 2010."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660348"},{"key":"e_1_3_2_1_13_1","first-page":"2016","article-title":"Building a rappor with the unknown: Privacy-preserving learning of associations and data dictionaries","volume":"3","author":"Fanti G.","year":"2016","unstructured":"G. Fanti Building a rappor with the unknown: Privacy-preserving learning of associations and data dictionaries . PoPETS, issue 3 , 2016 , 2016 . G. Fanti et al. Building a rappor with the unknown: Privacy-preserving learning of associations and data dictionaries. PoPETS, issue 3, 2016, 2016.","journal-title":"PoPETS, issue"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1137\/110857714"},{"key":"e_1_3_2_1_15_1","first-page":"C4","article-title":"Aol removes search data on vast group of web users","volume":"8","author":"Hansell S.","year":"2006","unstructured":"S. Hansell . Aol removes search data on vast group of web users . New York Times , 8 : C4 , 2006 . S. Hansell. Aol removes search data on vast group of web users. New York Times, 8:C4, 2006.","journal-title":"New York Times"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806689.1806786"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.14778\/1920841.1920970"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2588555.2588581"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31594-7_39"},{"key":"e_1_3_2_1_20_1","volume-title":"Extensions of lipschitz mappings into a hilbert space. Contemporary mathematics, 26(189--206):1","author":"Johnson W. B.","year":"1984","unstructured":"W. B. Johnson and J. Lindenstrauss . Extensions of lipschitz mappings into a hilbert space. Contemporary mathematics, 26(189--206):1 , 1984 . W. B. Johnson and J. Lindenstrauss. Extensions of lipschitz mappings into a hilbert space. Contemporary mathematics, 26(189--206):1, 1984."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/258533.258660"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1137\/090756090"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1807085.1807104"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2806416.2806441"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.14778\/2350229.2350251"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1559845.1559850"},{"key":"e_1_3_2_1_27_1","volume-title":"Collecting and analyzing data from smart device users with local differential privacy. arXiv preprint arXiv:1606.05053","author":"Nguy\u00ean T. T.","year":"2016","unstructured":"T. T. Nguy\u00ean Collecting and analyzing data from smart device users with local differential privacy. arXiv preprint arXiv:1606.05053 , 2016 . T. T. Nguy\u00ean et al. Collecting and analyzing data from smart device users with local differential privacy. arXiv preprint arXiv:1606.05053, 2016."},{"issue":"309","key":"e_1_3_2_1_28_1","first-page":"63","article-title":"A survey technique for eliminating evasive answer bias","volume":"60","author":"Warner S. L.","year":"1965","unstructured":"S. L. Warner . Randomized response : A survey technique for eliminating evasive answer bias . Journal of the ASA , 60 ( 309 ): 63 -- 69 , 1965 . S. L. Warner. Randomized response: A survey technique for eliminating evasive answer bias. Journal of the ASA, 60(309):63--69, 1965.","journal-title":"Journal of the ASA"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.14778\/1687627.1687719"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2010.247"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-013-0309-y"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-68880-8_32"}],"event":{"name":"CCS'16: 2016 ACM SIGSAC Conference on Computer and Communications Security","location":"Vienna Austria","acronym":"CCS'16","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2976749.2978409","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2976749.2978409","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:40:15Z","timestamp":1750218015000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2976749.2978409"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,24]]},"references-count":32,"alternative-id":["10.1145\/2976749.2978409","10.1145\/2976749"],"URL":"https:\/\/doi.org\/10.1145\/2976749.2978409","relation":{},"subject":[],"published":{"date-parts":[[2016,10,24]]},"assertion":[{"value":"2016-10-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}