{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:49:40Z","timestamp":1750308580214,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T00:00:00Z","timestamp":1490313600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100004351","name":"Cisco Systems","doi-asserted-by":"publisher","award":["593780"],"award-info":[{"award-number":["593780"]}],"id":[{"id":"10.13039\/100004351","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,3,24]]},"DOI":"10.1145\/3041008.3041017","type":"proceedings-article","created":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T14:54:21Z","timestamp":1490367261000},"page":"1-9","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Non-interactive (t, n)-Incidence Counting from Differentially Private Indicator Vectors"],"prefix":"10.1145","author":[{"given":"Mohammad","family":"Alaggan","sequence":"first","affiliation":[{"name":"Inria, Lyon, France"}]},{"given":"Mathieu","family":"Cunche","sequence":"additional","affiliation":[{"name":"INSA Lyon, Lyon, France"}]},{"given":"Marine","family":"Minier","sequence":"additional","affiliation":[{"name":"LORIA, Vandoeuvre-l\u00e8s-Nancy, France"}]}],"member":"320","published-online":{"date-parts":[[2017,3,24]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_1_1_1","DOI":"10.1007\/978-3-642-33536-5_20"},{"key":"e_1_3_2_1_2_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1007\/978-3-319-20810-7_15","volume-title":"Data and Applications Security and Privacy XXIX - 29th Annual IFIP WG 11.3 Working Conference, DBSec","author":"Alaggan M.","year":"2015","unstructured":"M. Alaggan , S. Gambs , S. Matwin , and M. Tuhin . Sanitization of Call Detail Records via Differentially-Private Bloom Filters . In P. Samarati, editor, Data and Applications Security and Privacy XXIX - 29th Annual IFIP WG 11.3 Working Conference, DBSec 2015 , Fairfax, VA , USA, July 13-15, 2015, Proceedings, volume 9149 of Lecture Notes in Computer Science , pages 223 -- 230 . Springer , 2015. M. Alaggan, S. Gambs, S. Matwin, and M. Tuhin. Sanitization of Call Detail Records via Differentially-Private Bloom Filters. In P. Samarati, editor, Data and Applications Security and Privacy XXIX - 29th Annual IFIP WG 11.3 Working Conference, DBSec 2015, Fairfax, VA, USA, July 13-15, 2015, Proceedings, volume 9149 of Lecture Notes in Computer Science, pages 223--230. Springer, 2015."},{"key":"e_1_3_2_1_3_1","first-page":"146","volume-title":"ESORICS","author":"Balu R.","year":"2014","unstructured":"R. Balu , T. Furon , and S. Gambs . Challenging Differential Privacy: The Case of Non-Interactive Mechanisms . In ESORICS , pages 146 -- 164 , 2014 . R. Balu, T. Furon, and S. Gambs. Challenging Differential Privacy: The Case of Non-Interactive Mechanisms. In ESORICS, pages 146--164, 2014."},{"key":"e_1_3_2_1_4_1","volume-title":"Sept.","author":"Barbera M. V.","year":"2013","unstructured":"M. V. Barbera , A. Epasto , A. Mei , S. Kosta , V. C. Perta , and J. Stefa . CRAWDAD dataset sapienza\/probe-requests (v. 2013-09-10). Downloaded from http:\/\/crawdad.org\/sapienza\/probe-requests\/20130910 , Sept. 2013 . M. V. Barbera, A. Epasto, A. Mei, S. Kosta, V. C. Perta, and J. Stefa. CRAWDAD dataset sapienza\/probe-requests (v. 2013-09-10). Downloaded from http:\/\/crawdad.org\/sapienza\/probe-requests\/20130910, Sept. 2013."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.1007\/978-1-4471-3675-0"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1145\/1562764.1562789"},{"key":"e_1_3_2_1_7_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"323","DOI":"10.1007\/3-540-45749-6_31","volume-title":"Proceedings of the 10th Annual European Symposium on Algorithms (ESA'02)","author":"Datar M.","year":"2002","unstructured":"M. Datar and S. Muthukrishnan . Estimating Rarity and Similarity over Data Stream Windows . In R. H. Mohring and R. Raman, editors, Proceedings of the 10th Annual European Symposium on Algorithms (ESA'02) , volume 2461 of Lecture Notes in Computer Science , pages 323 -- 334 , Rome, Italy, Sept . 2002 . Springer . M. Datar and S. Muthukrishnan. Estimating Rarity and Similarity over Data Stream Windows. In R. H. Mohring and R. Raman, editors, Proceedings of the 10th Annual European Symposium on Algorithms (ESA'02), volume 2461 of Lecture Notes in Computer Science, pages 323--334, Rome, Italy, Sept. 2002. Springer."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1007\/11787006_1"},{"key":"e_1_3_2_1_9_1","first-page":"66","volume-title":"Proceedings of the 1st Symposium on Innovations in Computer Science (ICS'10)","author":"Dwork C.","year":"2010","unstructured":"C. Dwork , M. Naor , T. Pitassi , G. N. Rothblum , and S. Yekhanin . Pan-Private Streaming Algorithms. In A. C. Yao, editor , Proceedings of the 1st Symposium on Innovations in Computer Science (ICS'10) , pages 66 -- 80 , Tsinghua University, Beijing, China , 2010 . Tsinghua University Press. C. Dwork, M. Naor, T. Pitassi, G. N. Rothblum, and S. Yekhanin. Pan-Private Streaming Algorithms. In A. C. Yao, editor, Proceedings of the 1st Symposium on Innovations in Computer Science (ICS'10), pages 66--80, Tsinghua University, Beijing, China, 2010. Tsinghua University Press."},{"key":"e_1_3_2_1_10_1","volume-title":"Concrete Mathematics: A Foundation for Computer Science","author":"Graham R. L.","year":"1994","unstructured":"R. L. Graham , D. E. Knuth , and O. Patashnik . Concrete Mathematics: A Foundation for Computer Science . Addison-Wesley Longman Publishing Co., Inc. , Boston, MA, USA , 2 nd edition, 1994 . R. L. Graham, D. E. Knuth, and O. Patashnik. Concrete Mathematics: A Foundation for Computer Science. Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA, 2nd edition, 1994.","edition":"2"},{"key":"e_1_3_2_1_11_1","first-page":"106","volume":"18","author":"McGregor A.","year":"2011","unstructured":"A. McGregor , I. Mironov , T. Pitassi , O. Reingold , K. Talwar , and S. P. Vadhan . The Limits of Two-Party Differential Privacy. Electronic Colloquium on Computational Complexity (ECCC) , 18 : 106 , 2011 . A. McGregor, I. Mironov, T. Pitassi, O. Reingold, K. Talwar, and S. P. Vadhan. The Limits of Two-Party Differential Privacy. Electronic Colloquium on Computational Complexity (ECCC), 18:106, 2011.","journal-title":"The Limits of Two-Party Differential Privacy. Electronic Colloquium on Computational Complexity (ECCC)"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1109\/FOCS.2007.41"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1145\/1989284.1989290"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.1145\/2426656.2426685"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9781139058520","volume-title":"Enumerative Combinatorics","author":"Stanley R. P.","year":"2011","unstructured":"R. P. Stanley . Enumerative Combinatorics : Volume 1 . Cambridge University Press , New York, NY, USA , 2 nd edition, 2011 . R. P. Stanley. Enumerative Combinatorics: Volume 1. Cambridge University Press, New York, NY, USA, 2nd edition, 2011.","edition":"2"}],"event":{"sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"acronym":"CODASPY '17","name":"CODASPY '17: Seventh ACM Conference on Data and Application Security and Privacy","location":"Scottsdale Arizona USA"},"container-title":["Proceedings of the 3rd ACM on International Workshop on Security And Privacy Analytics"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3041008.3041017","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3041008.3041017","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T19:04:58Z","timestamp":1750273498000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3041008.3041017"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3,24]]},"references-count":15,"alternative-id":["10.1145\/3041008.3041017","10.1145\/3041008"],"URL":"https:\/\/doi.org\/10.1145\/3041008.3041017","relation":{},"subject":[],"published":{"date-parts":[[2017,3,24]]},"assertion":[{"value":"2017-03-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}