{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T15:38:42Z","timestamp":1775230722309,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,6,25]],"date-time":"2019-06-25T00:00:00Z","timestamp":1561420800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1566481"],"award-info":[{"award-number":["1566481"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,6,25]]},"DOI":"10.1145\/3314111.3319823","type":"proceedings-article","created":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T12:38:46Z","timestamp":1559219926000},"page":"1-10","source":"Crossref","is-referenced-by-count":52,"title":["Differential privacy for eye-tracking data"],"prefix":"10.1145","author":[{"given":"Ao","family":"Liu","sequence":"first","affiliation":[{"name":"Rensselaer Polytechnic Institute"}]},{"given":"Lirong","family":"Xia","sequence":"additional","affiliation":[{"name":"Rensselaer Polytechnic Institute"}]},{"given":"Andrew","family":"Duchowski","sequence":"additional","affiliation":[{"name":"Clemson University"}]},{"given":"Reynold","family":"Bailey","sequence":"additional","affiliation":[{"name":"Rochester Institute of Technology"}]},{"given":"Kenneth","family":"Holmqvist","sequence":"additional","affiliation":[{"name":"University of Regensburg, Regensburg, Germany"}]},{"given":"Eakta","family":"Jain","sequence":"additional","affiliation":[{"name":"University of Florida"}]}],"member":"320","published-online":{"date-parts":[[2019,6,25]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"(2018). Eu general data protection regulation. https:\/\/eugdpr.org. (2018). Eu general data protection regulation. https:\/\/eugdpr.org."},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"e_1_3_2_2_3_1","unstructured":"Chuang L. Duchowski A. Qvarfordt P. and Weiskopf D. editors ( 2018 ). Ubiquitous Gaze Sensing and Interaction volume 8 of Dagstuhl Reports Schloss Dagstuhl-Leibniz-Zentrum f\u00fc Informatik Germany. Dagstuhl Publishing . Chuang L. Duchowski A. Qvarfordt P. and Weiskopf D. editors (2018). Ubiquitous Gaze Sensing and Interaction volume 8 of Dagstuhl Reports Schloss Dagstuhl-Leibniz-Zentrum f\u00fc Informatik Germany. Dagstuhl Publishing."},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cag.2018.04.002"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2168556.2168558"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/1791834.1791836"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866739.1866758"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"crossref","unstructured":"Dwork C. Roth A. etal (2014). The algorithmic foundations of differential privacy. Foundations and Trends\u00ae in Theoretical Computer Science 9(3--4):211--407. 10.1561\/0400000042 Dwork C. Roth A. et al. (2014). The algorithmic foundations of differential privacy. Foundations and Trends \u00ae in Theoretical Computer Science 9(3--4):211--407. 10.1561\/0400000042","DOI":"10.1561\/0400000042"},{"key":"e_1_3_2_2_9_1","unstructured":"Elias G. Sherwin G. and Wise J. (1984). Eye movements while viewing NTSC format television. Technical report SMPTE Psychophysics Subcommittee. Elias G. Sherwin G. and Wise J. (1984). Eye movements while viewing NTSC format television. Technical report SMPTE Psychophysics Subcommittee."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2013.96"},{"key":"e_1_3_2_2_11_1","unstructured":"Farid H. and Bravo M. J. (2012). Perceptual discrimination of computer generated and photographic faces. Digital Investigation 8(3--4):226--235. Farid H. and Bravo M. J. (2012). Perceptual discrimination of computer generated and photographic faces. Digital Investigation 8(3--4):226--235."},{"key":"e_1_3_2_2_12_1","unstructured":"Graham J. (2018). Is apple really better about privacy? here's what we found out. https:\/\/www.usatoday.com\/story\/tech\/talkingtech\/2018\/04\/17\/apple-make-simpler-download-your-privacy-data-year\/521786002\/. Graham J. (2018). Is apple really better about privacy? here's what we found out. https:\/\/www.usatoday.com\/story\/tech\/talkingtech\/2018\/04\/17\/apple-make-simpler-download-your-privacy-data-year\/521786002\/."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB.2011.6117536"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"crossref","DOI":"10.16910\/jemr.10.1.3","article-title":"Eye tracking in educational science: Theoretical frameworks and research agendas","author":"Jarodzka H.","year":"2017","journal-title":"Journal of Eye Movement Research, 10(1)."},{"key":"e_1_3_2_2_15_1","unstructured":"Ji Z. Lipton Z. C. and Elkan C. (2014). Differential privacy and machine learning: a survey and review. arXiv preprint arXiv:1412.7584. Ji Z. Lipton Z. C. and Elkan C. (2014). Differential privacy and machine learning: a survey and review. arXiv preprint arXiv:1412.7584."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3229434.3229452"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1743666.1743679"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"crossref","unstructured":"Leigh R. J. and Zee D. S. (2015). The neurology of eye movements. Oxford University Press USA. Leigh R. J. and Zee D. S. (2015). The neurology of eye movements. Oxford University Press USA.","DOI":"10.1093\/med\/9780199969289.001.0001"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2638728.2641688"},{"key":"e_1_3_2_2_20_1","first-page":"131","volume-title":"Living inside social mobile information","author":"Ling R.","year":"2014"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1177\/0301006617713633"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12559-010-9074-z"},{"key":"e_1_3_2_2_24_1","first-page":"1701","article-title":"Broken promises of privacy: Responding to the surprising failure of anonymization","volume":"57","author":"Ohm P.","year":"2009","journal-title":"Ucla L. Rev."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1068\/p250931"},{"key":"e_1_3_2_2_26_1","unstructured":"Raiturkar P. Farid H. and Jain E. (2018). Identifying computer-generated portraits: an eye tracking study. Technical report University of Florida. Raiturkar P. Farid H. and Jain E. (2018). Identifying computer-generated portraits: an eye tracking study. Technical report University of Florida."},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1807167.1807247"},{"key":"e_1_3_2_2_28_1","unstructured":"van Gisbergen M. S. van der Most J. and Aelen P. (2007). Visual Attention to Online Search Engine Results. Technical report De Vos & Jansen in cooperation with Checkit. URL: http:\/\/www.iprospect.nl\/wp-content\/themes\/iprospect\/pdf\/checkit\/eyetracking_research.pdf (last accessed Dec. 2011). van Gisbergen M. S. van der Most J. and Aelen P. (2007). Visual Attention to Online Search Engine Results. Technical report De Vos & Jansen in cooperation with Checkit. URL: http:\/\/www.iprospect.nl\/wp-content\/themes\/iprospect\/pdf\/checkit\/eyetracking_research.pdf (last accessed Dec. 2011)."},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/507072.507078"}],"event":{"name":"ETRA '19: 2019 Symposium on Eye Tracking Research and Applications","location":"Denver Colorado","acronym":"ETRA '19","sponsor":["SIGGRAPH ACM Special Interest Group on Computer Graphics and Interactive Techniques","SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 11th ACM Symposium on Eye Tracking Research &amp; Applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3314111.3319823","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3314111.3319823","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3314111.3319823","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:57:53Z","timestamp":1750208273000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3314111.3319823"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6,25]]},"references-count":28,"alternative-id":["10.1145\/3314111.3319823","10.1145\/3314111"],"URL":"https:\/\/doi.org\/10.1145\/3314111.3319823","relation":{},"subject":[],"published":{"date-parts":[[2019,6,25]]}}}