{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,28]],"date-time":"2025-12-28T02:25:33Z","timestamp":1766888733423,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,1,30]],"date-time":"2019-01-30T00:00:00Z","timestamp":1548806400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,1,30]]},"DOI":"10.1145\/3289600.3291384","type":"proceedings-article","created":{"date-parts":[[2019,3,11]],"date-time":"2019-03-11T12:33:01Z","timestamp":1552307581000},"page":"840-841","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":29,"title":["Privacy-preserving Data Mining in Industry"],"prefix":"10.1145","author":[{"given":"Krishnaram","family":"Kenthapadi","sequence":"first","affiliation":[{"name":"LinkedIn, Sunnyvale, CA, USA"}]},{"given":"Ilya","family":"Mironov","sequence":"additional","affiliation":[{"name":"Google, Mountain View, CA, USA"}]},{"given":"Abhradeep Guha","family":"Thakurta","sequence":"additional","affiliation":[{"name":"University of California, Santa Cruz, Santa Cruz, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,1,30]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Apple's Machine Learning Journal 2017 1 8"},{"key":"e_1_3_2_1_2_1","volume-title":"New York Times","author":"Barbaro M.","year":"2006","unstructured":"M. Barbaro , T. Zeller , and S. Hansell . A face is exposed for AOL searcher no. 4417749 . New York Times , August 2006 . M. Barbaro, T. Zeller, and S. Hansell. A face is exposed for AOL searcher no. 4417749. New York Times, August 2006."},{"key":"e_1_3_2_1_3_1","volume-title":"NIPS","author":"Bassily R.","year":"2017","unstructured":"R. Bassily , K. Nissim , U. Stemmer , and A. Thakurta . Practical locally private heavy hitters . In NIPS , 2017 . R. Bassily, K. Nissim, U. Stemmer, and A. Thakurta. Practical locally private heavy hitters. In NIPS, 2017."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132769"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133982"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.40"},{"key":"e_1_3_2_1_7_1","volume-title":"NIPS","author":"Ding B.","year":"2017","unstructured":"B. Ding , J. Kulkarni , and S. Yekhanin . Collecting telemetry data privately . In NIPS , 2017 . B. Ding, J. Kulkarni, and S. Yekhanin. Collecting telemetry data privately. In NIPS, 2017."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/11761679_29"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_14"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1561\/0400000042"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660348"},{"key":"e_1_3_2_1_12_1","first-page":"3","author":"Fanti G.","year":"2016","unstructured":"G. Fanti , V. Pihur , and \u00da. Erlingsson. Building a RA PPOR with the unknown: Privacy-preserving learning of associations and data dictionaries. Proceedings on Privacy Enhancing Technologies , 3 , 2016 . G. Fanti, V. Pihur, and \u00da. Erlingsson. Building a RAPPOR with the unknown: Privacy-preserving learning of associations and data dictionaries. Proceedings on Privacy Enhancing Technologies, 3, 2016.","journal-title":"Proceedings on Privacy Enhancing Technologies"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2018.00056"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3035918.3035940"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132847.3132863"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/PAC.2017.9"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3269206.3272031"},{"key":"e_1_3_2_1_18_1","volume-title":"Privacy violations using microtargeted ads: A case study. J. Privacy and Confidentiality, 3(1)","author":"Korolova A.","year":"2011","unstructured":"A. Korolova . Privacy violations using microtargeted ads: A case study. J. Privacy and Confidentiality, 3(1) , 2011 . A. Korolova. Privacy violations using microtargeted ads: A case study. J. Privacy and Confidentiality, 3(1), 2011."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2008.4497436"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.33"},{"key":"e_1_3_2_1_21_1","volume-title":"ICLR","author":"Papernot N.","year":"2017","unstructured":"N. Papernot , M. Abadi , \u00da. Erlingsson, I. Goodfellow , and K. Talwar . Semi-supervised knowledge transfer for deep learning from private training data . In ICLR , 2017 . N. Papernot, M. Abadi, \u00da. Erlingsson, I. Goodfellow, and K. Talwar. Semi-supervised knowledge transfer for deep learning from private training data. In ICLR, 2017."},{"key":"e_1_3_2_1_22_1","volume-title":"ICLR","author":"Papernot N.","year":"2018","unstructured":"N. Papernot , S. Song , I. Mironov , A. Raghunathan , K. Talwar , and \u00da. Erlingsson. Scalable private learning with PATE . In ICLR , 2018 . N. Papernot, S. Song, I. Mironov, A. Raghunathan, K. Talwar, and \u00da. Erlingsson. Scalable private learning with PATE. In ICLR, 2018."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.35"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052714"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/3152676"}],"event":{"name":"WSDM '19: The Twelfth ACM International Conference on Web Search and Data Mining","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data","SIGIR ACM Special Interest Group on Information Retrieval"],"location":"Melbourne VIC Australia","acronym":"WSDM '19"},"container-title":["Proceedings of the Twelfth ACM International Conference on Web Search and Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3289600.3291384","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3289600.3291384","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:02:21Z","timestamp":1750208541000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3289600.3291384"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1,30]]},"references-count":26,"alternative-id":["10.1145\/3289600.3291384","10.1145\/3289600"],"URL":"https:\/\/doi.org\/10.1145\/3289600.3291384","relation":{},"subject":[],"published":{"date-parts":[[2019,1,30]]},"assertion":[{"value":"2019-01-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}