{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,10]],"date-time":"2026-01-10T02:27:23Z","timestamp":1768012043939,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,12,7]],"date-time":"2020-12-07T00:00:00Z","timestamp":1607299200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,12,7]]},"DOI":"10.1145\/3427228.3427239","type":"proceedings-article","created":{"date-parts":[[2020,12,9]],"date-time":"2020-12-09T22:20:18Z","timestamp":1607552418000},"page":"100-115","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Towards a Practical Differentially Private Collaborative Phone Blacklisting System"],"prefix":"10.1145","author":[{"given":"Daniele","family":"Ucci","sequence":"first","affiliation":[{"name":"Department of Computer, Control, and Management Engineering, University of Rome, Italy, Italy"}]},{"given":"Roberto","family":"Perdisci","sequence":"additional","affiliation":[{"name":"University of Georgia, United States of America"}]},{"given":"Jaewoo","family":"Lee","sequence":"additional","affiliation":[{"name":"University of Georgia, United States of America"}]},{"given":"Mustaque","family":"Ahamad","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology"}]}],"member":"320","published-online":{"date-parts":[[2020,12,8]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Apple Inc. 2016. Apple Differential Privacy Technical Overview. https:\/\/images.apple.com\/privacy\/docs\/Differential_Privacy_Overview.pdf.  Apple Inc. 2016. Apple Differential Privacy Technical Overview. https:\/\/images.apple.com\/privacy\/docs\/Differential_Privacy_Overview.pdf."},{"key":"e_1_3_2_1_2_1","first-page":"I","article-title":"Practical Locally Private Heavy Hitters","volume":"30","author":"Bassily Raef","year":"2017","unstructured":"Raef Bassily , kobbi nissim, Uri Stemmer , and Abhradeep Guha\u00a0Thakurta . 2017 . Practical Locally Private Heavy Hitters . In Advances in Neural Information Processing Systems 30 , I .\u00a0Guyon, U.\u00a0V. Luxburg, S.\u00a0Bengio, H.\u00a0Wallach, R.\u00a0Fergus, S.\u00a0Vishwanathan, and R.\u00a0Garnett(Eds.). Curran Associates, Inc., 2288\u20132296. http:\/\/papers.nips.cc\/paper\/6823-practical-locally-private-heavy-hitters.pdf Raef Bassily, kobbi nissim, Uri Stemmer, and Abhradeep Guha\u00a0Thakurta. 2017. Practical Locally Private Heavy Hitters. In Advances in Neural Information Processing Systems 30, I.\u00a0Guyon, U.\u00a0V. Luxburg, S.\u00a0Bengio, H.\u00a0Wallach, R.\u00a0Fergus, S.\u00a0Vishwanathan, and R.\u00a0Garnett(Eds.). Curran Associates, Inc., 2288\u20132296. http:\/\/papers.nips.cc\/paper\/6823-practical-locally-private-heavy-hitters.pdf","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2746539.2746632"},{"key":"e_1_3_2_1_4_1","unstructured":"Tara\u00a0Siegel Bernard. 2018. Yes It\u2019s Bad. Robocalls and Their Scams Are Surging. https:\/\/www.nytimes.com\/2018\/05\/06\/your-money\/robocalls-rise-illegal.html.  Tara\u00a0Siegel Bernard. 2018. Yes It\u2019s Bad. Robocalls and Their Scams Are Surging. https:\/\/www.nytimes.com\/2018\/05\/06\/your-money\/robocalls-rise-illegal.html."},{"key":"e_1_3_2_1_5_1","series-title":"Lecture Notes in Computer Science, Vol.\u00a07556","volume-title":"Josep Domingo-Ferrer and Ilenia Tinnirello (Eds.)","author":"Bianchi Giuseppe","unstructured":"Giuseppe Bianchi , Lorenzo Bracciale , and Pierpaolo Loreti . 2012. Better Than Nothing Privacy with Bloom Filters: To What Extent?In Privacy in Statistical Databases , Josep Domingo-Ferrer and Ilenia Tinnirello (Eds.) . Lecture Notes in Computer Science, Vol.\u00a07556 . Springer Berlin Heidelberg , 348\u2013363. https:\/\/doi.org\/10.1007\/978-3-642-33627-0_27 10.1007\/978-3-642-33627-0_27 Giuseppe Bianchi, Lorenzo Bracciale, and Pierpaolo Loreti. 2012. Better Than Nothing Privacy with Bloom Filters: To What Extent?In Privacy in Statistical Databases, Josep Domingo-Ferrer and Ilenia Tinnirello (Eds.). Lecture Notes in Computer Science, Vol.\u00a07556. Springer Berlin Heidelberg, 348\u2013363. https:\/\/doi.org\/10.1007\/978-3-642-33627-0_27"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2013.53"},{"key":"e_1_3_2_1_7_1","volume-title":"Differential privacy. In in ICALP","author":"Dwork Cynthia","unstructured":"Cynthia Dwork . 2006. Differential privacy. In in ICALP . Springer , 1\u201312. Cynthia Dwork. 2006. Differential privacy. In in ICALP. Springer, 1\u201312."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806689.1806787"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660348"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2016-0015"},{"key":"e_1_3_2_1_11_1","unstructured":"FCC. 2020. FCC MANDATES THAT PHONE COMPANIES IMPLEMENT CALLER ID AUTHENTICATION TO COMBAT SPOOFED ROBOCALLS. https:\/\/docs.fcc.gov\/public\/attachments\/DOC-363399A1.pdf.  FCC. 2020. FCC MANDATES THAT PHONE COMPANIES IMPLEMENT CALLER ID AUTHENTICATION TO COMBAT SPOOFED ROBOCALLS. https:\/\/docs.fcc.gov\/public\/attachments\/DOC-363399A1.pdf."},{"key":"e_1_3_2_1_12_1","unstructured":"FTC. 2018. Abusive Robocalls and How We Can Stop Them. https:\/\/www.ftc.gov\/system\/files\/documents\/public_statements\/1366628\/p034412_commission_testimony_re_abusive_robocalls_senate_04182018.pdf.  FTC. 2018. Abusive Robocalls and How We Can Stop Them. https:\/\/www.ftc.gov\/system\/files\/documents\/public_statements\/1366628\/p034412_commission_testimony_re_abusive_robocalls_senate_04182018.pdf."},{"key":"e_1_3_2_1_13_1","unstructured":"FTC. 2018. FTC and FCC to Host Joint Policy Forum and Consumer Expo to Fight the Scourge of Illegal Robocalls. https:\/\/www.ftc.gov\/news-events\/press-releases\/2018\/03\/ftc-fcc-host-joint-policy-forum-consumer-expo-fight-scourge.  FTC. 2018. FTC and FCC to Host Joint Policy Forum and Consumer Expo to Fight the Scourge of Illegal Robocalls. https:\/\/www.ftc.gov\/news-events\/press-releases\/2018\/03\/ftc-fcc-host-joint-policy-forum-consumer-expo-fight-scourge."},{"key":"e_1_3_2_1_14_1","unstructured":"FTC. 2019. Do Not Call (DNC) Reported Calls Data. https:\/\/www.ftc.gov\/site-information\/open-government\/data-sets\/do-not-call-data.  FTC. 2019. Do Not Call (DNC) Reported Calls Data. https:\/\/www.ftc.gov\/site-information\/open-government\/data-sets\/do-not-call-data."},{"key":"e_1_3_2_1_15_1","volume-title":"Report: Americans got 26.3 billion robocalls last year, up 46 percent from","author":"Fung Brian","year":"2019","unstructured":"Brian Fung . 2019 . Report: Americans got 26.3 billion robocalls last year, up 46 percent from 2017. https:\/\/www.washingtonpost.com\/technology\/2019\/01\/29\/report-americans-got-billion-robocalls-last-year-up-percent\/. Brian Fung. 2019. Report: Americans got 26.3 billion robocalls last year, up 46 percent from 2017. https:\/\/www.washingtonpost.com\/technology\/2019\/01\/29\/report-americans-got-billion-robocalls-last-year-up-percent\/."},{"key":"e_1_3_2_1_16_1","unstructured":"Google. 2019. Use caller ID and spam protection. https:\/\/support.google.com\/phoneapp\/answer\/3459196?hl=en.  Google. 2019. Use caller ID and spam protection. https:\/\/support.google.com\/phoneapp\/answer\/3459196?hl=en."},{"key":"e_1_3_2_1_17_1","volume-title":"List decoding of error-correcting codes: winning thesis of the 2002 ACM doctoral dissertation competition. Vol.\u00a03282","author":"Guruswami Venkatesan","unstructured":"Venkatesan Guruswami . 2004. List decoding of error-correcting codes: winning thesis of the 2002 ACM doctoral dissertation competition. Vol.\u00a03282 . Springer Science & Business Media . Venkatesan Guruswami. 2004. List decoding of error-correcting codes: winning thesis of the 2002 ACM doctoral dissertation competition. Vol.\u00a03282. Springer Science & Business Media."},{"key":"e_1_3_2_1_18_1","volume-title":"Phone Scams Pose Serious Threat","author":"IRS.","unstructured":"IRS. 2018. Phone Scams Pose Serious Threat ; Remain on IRS \u2018Dirty Dozen\u2019 List of Tax Scams . https:\/\/www.irs.gov\/newsroom\/phone-scams-pose-serious-threat-remain-on-irs-dirty- dozen-list-of-tax-scams. IRS. 2018. Phone Scams Pose Serious Threat; Remain on IRS \u2018Dirty Dozen\u2019 List of Tax Scams. https:\/\/www.irs.gov\/newsroom\/phone-scams-pose-serious-threat-remain-on-irs-dirty- dozen-list-of-tax-scams."},{"key":"e_1_3_2_1_19_1","volume-title":"International Conference on Machine Learning. 2436\u20132444","author":"Kairouz Peter","year":"2016","unstructured":"Peter Kairouz , Keith Bonawitz , and Daniel Ramage . 2016 . Discrete Distribution Estimation under Local Privacy . In International Conference on Machine Learning. 2436\u20132444 . Peter Kairouz, Keith Bonawitz, and Daniel Ramage. 2016. Discrete Distribution Estimation under Local Privacy. In International Conference on Machine Learning. 2436\u20132444."},{"key":"e_1_3_2_1_20_1","volume-title":"Variance Reduction Techniques in Monte Carlo Methods","author":"Kleijnen Jack","unstructured":"Jack P.\u00a0C. Kleijnen , Ad\u00a0A.\u00a0 N. Ridder , and Reuven\u00a0 Y. Rubinstein . 2013. Variance Reduction Techniques in Monte Carlo Methods . Springer US. Jack P.\u00a0C. Kleijnen, Ad\u00a0A.\u00a0N. Ridder, and Reuven\u00a0Y. Rubinstein. 2013. Variance Reduction Techniques in Monte Carlo Methods. Springer US."},{"key":"e_1_3_2_1_21_1","volume-title":"IEEE Symposium on Security and Privacy (SP). 561\u2013577","author":"Li H.","unstructured":"H. Li , X. Xu , C. Liu , T. Ren , K. Wu , X. Cao , W. Zhang , Y. Yu , and D. Song . 2018. A Machine Learning Approach To Prevent Malicious Calls Over Telephony Networks . In IEEE Symposium on Security and Privacy (SP). 561\u2013577 . H. Li, X. Xu, C. Liu, T. Ren, K. Wu, X. Cao, W. Zhang, Y. Yu, and D. Song. 2018. A Machine Learning Approach To Prevent Malicious Calls Over Telephony Networks. In IEEE Symposium on Security and Privacy (SP). 561\u2013577."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196553"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23243"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978409"},{"key":"e_1_3_2_1_25_1","unstructured":"Robocall Blocking. 2019. Caller ID SMS spam blocking and Dialer. https:\/\/play.google.com\/store\/apps\/details?id=com.nomorobo&hl=en_US.  Robocall Blocking. 2019. Caller ID SMS spam blocking and Dialer. https:\/\/play.google.com\/store\/apps\/details?id=com.nomorobo&hl=en_US."},{"key":"e_1_3_2_1_26_1","unstructured":"TrueCaller. 2019. Caller ID SMS spam blocking and Dialer. https:\/\/play.google.com\/store\/apps\/details?id=com.truecaller&hl=en_US.  TrueCaller. 2019. Caller ID SMS spam blocking and Dialer. https:\/\/play.google.com\/store\/apps\/details?id=com.truecaller&hl=en_US."},{"key":"e_1_3_2_1_27_1","unstructured":"Tianhao Wang. 2018. Sample OLH implementation in Python. https:\/\/github.com\/vvv214\/OLH.  Tianhao Wang. 2018. Sample OLH implementation in Python. https:\/\/github.com\/vvv214\/OLH."},{"key":"e_1_3_2_1_28_1","volume-title":"Locally Differentially Private Protocols for Frequency Estimation. In 26th USENIX Security Symposium (USENIX Security 17)","author":"Wang Tianhao","year":"2017","unstructured":"Tianhao Wang , Jeremiah Blocki , Ninghui Li , and Somesh Jha . 2017 . Locally Differentially Private Protocols for Frequency Estimation. In 26th USENIX Security Symposium (USENIX Security 17) . Tianhao Wang, Jeremiah Blocki, Ninghui Li, and Somesh Jha. 2017. Locally Differentially Private Protocols for Frequency Estimation. In 26th USENIX Security Symposium (USENIX Security 17)."},{"key":"e_1_3_2_1_29_1","unstructured":"Tianhao Wang Ninghui Li and Somesh Jha. 2017. Locally Differentially Private Heavy Hitter Identification. arXiv preprint arXiv:1708.06674(2017).  Tianhao Wang Ninghui Li and Somesh Jha. 2017. Locally Differentially Private Heavy Hitter Identification. arXiv preprint arXiv:1708.06674(2017)."},{"key":"e_1_3_2_1_30_1","volume-title":"Locally Differentially Private Frequent Itemset Mining. In 2018 IEEE Symposium on Security and Privacy (SP), Vol.\u00a000","author":"Wang T.","year":"2018","unstructured":"T. Wang , N. Li , and S. Jha . 2018 . Locally Differentially Private Frequent Itemset Mining. In 2018 IEEE Symposium on Security and Privacy (SP), Vol.\u00a000 . 578\u2013594. https:\/\/doi.org\/10.1109\/SP. 2018 .00035 10.1109\/SP.2018.00035 T. Wang, N. Li, and S. Jha. 2018. Locally Differentially Private Frequent Itemset Mining. In 2018 IEEE Symposium on Security and Privacy (SP), Vol.\u00a000. 578\u2013594. https:\/\/doi.org\/10.1109\/SP.2018.00035"},{"key":"e_1_3_2_1_31_1","unstructured":"YouMail. 2019. Stop Robocalls Forever. https:\/\/www.youmail.com.  YouMail. 2019. Stop Robocalls Forever. https:\/\/www.youmail.com."}],"event":{"name":"ACSAC '20: Annual Computer Security Applications Conference","location":"Austin USA","acronym":"ACSAC '20"},"container-title":["Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3427228.3427239","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3427228.3427239","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:02:24Z","timestamp":1750197744000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3427228.3427239"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,7]]},"references-count":31,"alternative-id":["10.1145\/3427228.3427239","10.1145\/3427228"],"URL":"https:\/\/doi.org\/10.1145\/3427228.3427239","relation":{},"subject":[],"published":{"date-parts":[[2020,12,7]]},"assertion":[{"value":"2020-12-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}