{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T22:55:30Z","timestamp":1776898530619,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":50,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,30]],"date-time":"2017-10-30T00:00:00Z","timestamp":1509321600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"QNRF","award":["NPRP10-0708-170408"],"award-info":[{"award-number":["NPRP10-0708-170408"]}]},{"name":"MOE","award":["MOE2015-T2-2-069"],"award-info":[{"award-number":["MOE2015-T2-2-069"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,10,30]]},"DOI":"10.1145\/3133956.3134086","type":"proceedings-article","created":{"date-parts":[[2017,10,27]],"date-time":"2017-10-27T12:48:18Z","timestamp":1509108498000},"page":"425-438","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":195,"title":["Generating Synthetic Decentralized Social Graphs with Local Differential Privacy"],"prefix":"10.1145","author":[{"given":"Zhan","family":"Qin","sequence":"first","affiliation":[{"name":"State University of New York at Buffalo &amp; Hamad Bin Khalifa University, Buffalo, NY, USA"}]},{"given":"Ting","family":"Yu","sequence":"additional","affiliation":[{"name":"Hamad Bin Khalifa University, Doha, Qatar"}]},{"given":"Yin","family":"Yang","sequence":"additional","affiliation":[{"name":"Hamad Bin Khalifa University, Doha, Qatar"}]},{"given":"Issa","family":"Khalil","sequence":"additional","affiliation":[{"name":"Hamad Bin Khalifa University, Doha, Qatar"}]},{"given":"Xiaokui","family":"Xiao","sequence":"additional","affiliation":[{"name":"Nanyang Technological University, Singapore, Singapore"}]},{"given":"Kui","family":"Ren","sequence":"additional","affiliation":[{"name":"State University of New York at Buffalo &amp; Qatar Computing Research Institute, Buffalo, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,10,30]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/335305.335326"},{"key":"e_1_3_2_2_2_1","volume-title":"Smith","author":"Bassily Raef","year":"2015","unstructured":"Raef Bassily and Adam D. Smith. 2015. Local, Private, Efficient Protocols for Succinct Histograms. In STOC. 127--135."},{"key":"e_1_3_2_2_3_1","volume-title":"Proceedings of the 12th International Conference on Music Information Retrieval (ISMIR","author":"Bertin-Mahieux Thierry","year":"2011","unstructured":"Thierry Bertin-Mahieux, Daniel P.W. Ellis, Brian Whitman, and Paul Lamere. 2011. The Million Song Dataset. In Proceedings of the 12th International Conference on Music Information Retrieval (ISMIR 2011)."},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2012.67"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1088\/1742-5468\/2008\/10\/P10008"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41398-8_12"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1080\/00018730601170527"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2882903.2926745"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"crossref","unstructured":"John C Duchi Michael I Jordan and Martin J Wainwright. 2013. Local privacy and statistical minimax rates. In FOCS. 429--438.","DOI":"10.1109\/FOCS.2013.53"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","unstructured":"Cynthia Dwork. 2006. Differential privacy. In Automata languages and programming. 1--12. 10.1007\/11787006_1","DOI":"10.1007\/11787006_1"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536466"},{"key":"e_1_3_2_2_12_1","unstructured":"Cynthia Dwork Moni Naor Toniann Pitassi Guy N Rothblum and Sergey Yekhanin. 2010. Pan-Private Streaming Algorithms.. In ICS. 66--80."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"crossref","unstructured":"Cynthia Dwork Aaron Roth et al. 2014. The algorithmic foundations of differential privacy. Foundations and Trends\u00ae in Theoretical Computer Science 9 3--4 (2014) 211--407.","DOI":"10.1561\/0400000042"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.5486\/PMD.1959.6.3-4.12"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660348"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660348"},{"key":"e_1_3_2_2_17_1","volume-title":"Unknown: PrivacyPreserving Learning of Associations and Data Dictionaries. PoPETS issue 3","author":"Giulia Fanti","year":"2016","unstructured":"Giulia Fanti et al. 2016. Building a RAPPOR with the Unknown: PrivacyPreserving Learning of Associations and Data Dictionaries. PoPETS issue 3, 2016 (2016)."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2398776.2398792"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.70.025101"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","unstructured":"Justin Hsu Sanjeev Khanna and Aaron Roth. 2012. Distributed private heavy hitters. In Automata Languages and Programming. 461--472. 10.1007\/978-3-642-31594-7_39","DOI":"10.1007\/978-3-642-31594-7_39"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1864708.1864736"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/582415.582418"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","unstructured":"Zach Jorgensen Ting Yu and Graham Cormode. 2016. Publishing Attributed Social Graphs with Formal Privacy Guarantees. In SIGMOD. 107--122. 10.1145\/2882903.2915215","DOI":"10.1145\/2882903.2915215"},{"key":"e_1_3_2_2_24_1","volume-title":"Privacy in Statistical Databases","author":"Karwa Vishesh","unstructured":"Vishesh Karwa and Aleksandra B Slavkovi\u0107. 2012. Differentially private graphical degree sequences and synthetic graphs. In Privacy in Statistical Databases. Springer, 273--285."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1137\/090756090"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36594-2_26"},{"key":"e_1_3_2_2_27_1","volume-title":"Synereo: The Decentralized and Distributed Social Network.","author":"Konforty Dor","year":"2015","unstructured":"Dor Konforty, Yuval Adam, Daniel Estrada, and Lucius Gregory Meredith. 2015. Synereo: The Decentralized and Distributed Social Network. (2015)."},{"key":"e_1_3_2_2_28_1","first-page":"985","article-title":"Kronecker graphs: An approach to modeling networks","author":"Leskovec Jure","year":"2010","unstructured":"Jure Leskovec, Deepayan Chakrabarti, Jon Kleinberg, Christos Faloutsos, and Zoubin Ghahramani. 2010. Kronecker graphs: An approach to modeling networks. Journal of Machine Learning Research 11, Feb (2010), 985--1042.","journal-title":"Journal of Machine Learning Research 11"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1080\/15427951.2009.10129177"},{"key":"e_1_3_2_2_30_1","unstructured":"Jure Leskovec and Julian J Mcauley. 2012. Learning to discover social circles in ego networks. In Advances in neural information processing systems. 539--547."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2010.11.027"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","unstructured":"Wentian Lu and Gerome Miklau. 2014. Exponential Random Graph Estimation under Differential Privacy. In KDD. 921--930. 10.1145\/2623330.2623683","DOI":"10.1145\/2623330.2623683"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02289146"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"crossref","unstructured":"Christopher D Manning Prabhakar Raghavan Hinrich Sch\u00fctze et al. 2008. Introduction to information retrieval. Vol. 1. Cambridge university press Cambridge.","DOI":"10.1017\/CBO9780511809071"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45167-9_14"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2320765.2320818"},{"key":"e_1_3_2_2_37_1","volume-title":"Hyejin Shin, and Junbum Shin.","author":"Nguy\u00ean Th\u00f4ng T.","year":"2016","unstructured":"Th\u00f4ng T. Nguy\u00ean, Xiaokui Xiao, Yin Yang, Siu Cheung Hui, Hyejin Shin, and Junbum Shin. 2016. Collecting and Analyzing Data from Smart Device Users with Local Differential Privacy. CoRR abs\/1606.05053 (2016). http:\/\/arxiv.org\/abs\/ 1606.05053"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.4630270505"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978409"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1971.10482356"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.socnet.2006.08.002"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"crossref","unstructured":"Alessandra Sala Xiaohan Zhao Christo Wilson Haitao Zheng and Ben Y Zhao. 2011. Sharing graphs using differentially private graph models. In IMC. ACM 81--98.","DOI":"10.1145\/2068816.2068825"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.85.056109"},{"key":"e_1_3_2_2_44_1","first-page":"2837","article-title":"Information theoretic measures for clusterings comparison: Variants, properties, normalization and correction for chance","author":"Vinh Nguyen Xuan","year":"2010","unstructured":"Nguyen Xuan Vinh, Julien Epps, and James Bailey. 2010. Information theoretic measures for clusterings comparison: Variants, properties, normalization and correction for chance. Journal of Machine Learning Research 11, Oct (2010), 2837--2854.","journal-title":"Journal of Machine Learning Research 11"},{"key":"e_1_3_2_2_45_1","first-page":"2","article-title":"Preserving Differential Privacy in DegreeCorrelation Based Graph","volume":"6","author":"Wang Yue","year":"2013","unstructured":"Yue Wang and Xintao Wu. 2013. Preserving Differential Privacy in DegreeCorrelation Based Graph Generation. Trans. Data Privacy 6, 2 (Aug. 2013).","journal-title":"Generation. Trans. Data Privacy"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","unstructured":"Yue Wang Xintao Wu and Leting Wu. 2013. Differential Privacy Preserving Spectral Graph Analysis. In PAKDD. 329--340. 10.1007\/978-3-642-37456-2_28","DOI":"10.1007\/978-3-642-37456-2_28"},{"key":"e_1_3_2_2_47_1","first-page":"63","article-title":"Randomized response: A survey technique for eliminating evasive answer bias","volume":"60","author":"Warner Stanley L","year":"1965","unstructured":"Stanley L Warner. 1965. Randomized response: A survey technique for eliminating evasive answer bias. Journal of the ASA 60, 309 (1965), 63--69.","journal-title":"Journal of the ASA"},{"key":"e_1_3_2_2_48_1","volume-title":"Collective dynamics of \"smallworld\" networks. nature 393, 6684","author":"Watts Duncan J","year":"1998","unstructured":"Duncan J Watts and Steven H Strogatz. 1998. Collective dynamics of \"smallworld\" networks. nature 393, 6684 (1998), 440--442."},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2016.7472065"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","unstructured":"Jun Zhang Graham Cormode Cecilia M. Procopiuc Divesh Srivastava and Xiaokui Xiao. 2015. Private Release of Graph Statistics using Ladder Functions. In SIGMOD. 731--745. 10.1145\/2723372.2737785","DOI":"10.1145\/2723372.2737785"}],"event":{"name":"CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security","location":"Dallas Texas USA","acronym":"CCS '17","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3134086","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3133956.3134086","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,26]],"date-time":"2025-06-26T19:33:22Z","timestamp":1750966402000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3134086"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10,30]]},"references-count":50,"alternative-id":["10.1145\/3133956.3134086","10.1145\/3133956"],"URL":"https:\/\/doi.org\/10.1145\/3133956.3134086","relation":{},"subject":[],"published":{"date-parts":[[2017,10,30]]},"assertion":[{"value":"2017-10-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}