{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T14:25:38Z","timestamp":1774448738121,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,5,27]],"date-time":"2018-05-27T00:00:00Z","timestamp":1527379200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1640374"],"award-info":[{"award-number":["1640374"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,5,27]]},"DOI":"10.1145\/3183713.3197390","type":"proceedings-article","created":{"date-parts":[[2018,5,25]],"date-time":"2018-05-25T12:39:28Z","timestamp":1527251968000},"page":"1655-1658","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":201,"title":["Privacy at Scale"],"prefix":"10.1145","author":[{"given":"Graham","family":"Cormode","sequence":"first","affiliation":[{"name":"University of Warwick, Coventry, England UK"}]},{"given":"Somesh","family":"Jha","sequence":"additional","affiliation":[{"name":"University of Wisconsin-Madison, Madison, WI, USA"}]},{"given":"Tejas","family":"Kulkarni","sequence":"additional","affiliation":[{"name":"University of Warwick, Coventry, England UK"}]},{"given":"Ninghui","family":"Li","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, IN, USA"}]},{"given":"Divesh","family":"Srivastava","sequence":"additional","affiliation":[{"name":"AT&amp;T Labs-Research, Middletown, NJ, USA"}]},{"given":"Tianhao","family":"Wang","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, IN, USA"}]}],"member":"320","published-online":{"date-parts":[[2018,5,27]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"747","volume-title":"26th USENIX Security Symposium, USENIX Security 2017","author":"Avent B.","year":"2017","unstructured":"B. Avent , A. Korolova , D. Zeber , T. Hovden , and B. Livshits . BLENDER: enabling local search with a hybrid differential privacy model . In 26th USENIX Security Symposium, USENIX Security 2017 , Vancouver, BC, Canada , August 16-18, 2017 ., pages 747 -- 764 , 2017. B. Avent, A. Korolova, D. Zeber, T. Hovden, and B. Livshits. BLENDER: enabling local search with a hybrid differential privacy model. In 26th USENIX Security Symposium, USENIX Security 2017, Vancouver, BC, Canada, August 16-18, 2017., pages 747--764, 2017."},{"key":"e_1_3_2_1_2_1","first-page":"2285","volume-title":"NIPS","author":"Bassily R.","year":"2017","unstructured":"R. Bassily , K. Nissim , U. Stemmer , and A. G. Thakurta . Practical locally private heavy hitters . In NIPS , pages 2285 -- 2293 , 2017 . R. Bassily, K. Nissim, U. Stemmer, and A. G. Thakurta. Practical locally private heavy hitters. In NIPS, pages 2285--2293, 2017."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2746539.2746632"},{"key":"e_1_3_2_1_4_1","volume-title":"Heavy hitters and the structure of local privacy. arXiv preprint arXiv:1711.04740","author":"Bun M.","year":"2017","unstructured":"M. Bun , J. Nelson , and U. Stemmer . Heavy hitters and the structure of local privacy. arXiv preprint arXiv:1711.04740 , 2017 . M. Bun, J. Nelson, and U. Stemmer. Heavy hitters and the structure of local privacy. arXiv preprint arXiv:1711.04740, 2017."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31680-7_8"},{"key":"e_1_3_2_1_6_1","volume-title":"Randomized response: Theory and techniques","author":"Chaudhuri A.","year":"1988","unstructured":"A. Chaudhuri and R. Mukerjee . Randomized response: Theory and techniques . Marcel Dekker , 1988 . A. Chaudhuri and R. Mukerjee. Randomized response: Theory and techniques. Marcel Dekker, 1988."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2016.7498248"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3183713.3196906"},{"key":"e_1_3_2_1_9_1","volume-title":"Learning with privacy at scale","author":"Team Differential Privacy","year":"2017","unstructured":"Differential Privacy Team , Apple. Learning with privacy at scale . 2017 . Differential Privacy Team, Apple. Learning with privacy at scale. 2017."},{"key":"e_1_3_2_1_10_1","volume-title":"Advances in Neural Information Processing Systems","author":"Ding B.","year":"2017","unstructured":"B. Ding , J. Kulkarni , and S. Yekhanin . Collecting telemetry data privately . In Advances in Neural Information Processing Systems 30, December 2017 . B. Ding, J. Kulkarni, and S. Yekhanin. Collecting telemetry data privately. In Advances in Neural Information Processing Systems 30, December 2017."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2013.53"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660348"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/773153.773174"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2016-0015"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31594-7_39"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2414456.2414474"},{"key":"e_1_3_2_1_17_1","volume-title":"ICLR","author":"McMahan H. B.","year":"2018","unstructured":"H. B. McMahan , D. Ramage , K. Talwar , and L. Zhang . Learning differentially private language models without losing accuracy . In ICLR , 2018 . H. B. McMahan, D. Ramage, K. Talwar, and L. Zhang. Learning differentially private language models without losing accuracy. In ICLR, 2018."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1142351.1142373"},{"key":"e_1_3_2_1_19_1","volume-title":"Collecting and analyzing data from smart device users with local differential privacy. CoRR, abs\/1606.05053","author":"Nguy\u00ean T. T.","year":"2016","unstructured":"T. T. Nguy\u00ean , X. Xiao , Y. Yang , S. C. Hui , H. Shin , and J. Shin . Collecting and analyzing data from smart device users with local differential privacy. CoRR, abs\/1606.05053 , 2016 . T. T. Nguy\u00ean, X. Xiao, Y. Yang, S. C. Hui, H. Shin, and J. Shin. Collecting and analyzing data from smart device users with local differential privacy. CoRR, abs\/1606.05053, 2016."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978409"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134086"},{"key":"e_1_3_2_1_22_1","volume-title":"Mar. 14","author":"Thakurta A. G.","year":"2017","unstructured":"A. G. Thakurta , A. H. Vyrros , U. S. Vaishampayan , G. Kapoor , J. Freudiger , V. R. Sridhar , and D. Davidson . Learning new words , Mar. 14 2017 . US Patent 9,594,741. A. G. Thakurta, A. H. Vyrros, U. S. Vaishampayan, G. Kapoor, J. Freudiger, V. R. Sridhar, and D. Davidson. Learning new words, Mar. 14 2017. US Patent 9,594,741."},{"key":"e_1_3_2_1_23_1","volume-title":"July 11","author":"Thakurta A. G.","year":"2017","unstructured":"A. G. Thakurta , A. H. Vyrros , U. S. Vaishampayan , G. Kapoor , J. Freudinger , V. V. Prakash , A. Legendre , and S. Duplinsky . Emoji frequency detection and deep link frequency , July 11 2017 . US Patent 9,705,908. A. G. Thakurta, A. H. Vyrros, U. S. Vaishampayan, G. Kapoor, J. Freudinger, V. V. Prakash, A. Legendre, and S. Duplinsky. Emoji frequency detection and deep link frequency, July 11 2017. US Patent 9,705,908."},{"key":"e_1_3_2_1_24_1","volume-title":"USENIX'17: Proceedings of 26th USENIX Security Symposium on USENIX Security Symposium. USENIX Association","author":"Wang T.","year":"2017","unstructured":"T. Wang , J. Blocki , N. Li , and S. Jha . Locally differentially private protocols for frequency estimation . In USENIX'17: Proceedings of 26th USENIX Security Symposium on USENIX Security Symposium. USENIX Association , 2017 . T. Wang, J. Blocki, N. Li, and S. Jha. Locally differentially private protocols for frequency estimation. In USENIX'17: Proceedings of 26th USENIX Security Symposium on USENIX Security Symposium. USENIX Association, 2017."},{"key":"e_1_3_2_1_25_1","volume-title":"Locally differentially private heavy hitter identification. arXiv preprint arXiv:1708.06674","author":"Wang T.","year":"2017","unstructured":"T. Wang , N. Li , and S. Jha . Locally differentially private heavy hitter identification. arXiv preprint arXiv:1708.06674 , 2017 . T. Wang, N. Li, and S. Jha. Locally differentially private heavy hitter identification. arXiv preprint arXiv:1708.06674, 2017."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00035"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1965.10480775"}],"event":{"name":"SIGMOD\/PODS '18: International Conference on Management of Data","location":"Houston TX USA","acronym":"SIGMOD\/PODS '18","sponsor":["SIGMOD ACM Special Interest Group on Management of Data"]},"container-title":["Proceedings of the 2018 International Conference on Management of Data"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3183713.3197390","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3183713.3197390","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3183713.3197390","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:08:28Z","timestamp":1750208908000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3183713.3197390"}},"subtitle":["Local Differential Privacy in Practice"],"short-title":[],"issued":{"date-parts":[[2018,5,27]]},"references-count":27,"alternative-id":["10.1145\/3183713.3197390","10.1145\/3183713"],"URL":"https:\/\/doi.org\/10.1145\/3183713.3197390","relation":{},"subject":[],"published":{"date-parts":[[2018,5,27]]},"assertion":[{"value":"2018-05-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}