{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,17]],"date-time":"2026-01-17T20:55:28Z","timestamp":1768683328458,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,6,22]],"date-time":"2021-06-22T00:00:00Z","timestamp":1624320000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,6,22]]},"DOI":"10.1145\/3447555.3464873","type":"proceedings-article","created":{"date-parts":[[2021,6,23]],"date-time":"2021-06-23T04:49:35Z","timestamp":1624423775000},"page":"259-263","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["Towards Privacy-preserving Framework for Non-Intrusive Load Monitoring"],"prefix":"10.1145","author":[{"given":"Henrique","family":"P\u00f6tter","sequence":"first","affiliation":[{"name":"University of Pittsburgh, Pittsburgh, USA"}]},{"given":"Stephen","family":"Lee","sequence":"additional","affiliation":[{"name":"University of Pittsburgh, Pittsburgh, USA"}]},{"given":"Daniel","family":"Moss\u00e9","sequence":"additional","affiliation":[{"name":"University of Pittsburgh, Pittsburgh, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,6,22]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Module: tff | TensorFlow Federated. https:\/\/www.tensorflow.org\/federated\/api_docs\/python\/tff [Online","year":"2021","unstructured":"2021. Module: tff | TensorFlow Federated. https:\/\/www.tensorflow.org\/federated\/api_docs\/python\/tff [Online ; accessed 18. Feb. 2021 ]. 2021. Module: tff | TensorFlow Federated. https:\/\/www.tensorflow.org\/federated\/api_docs\/python\/tff [Online; accessed 18. Feb. 2021]."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"e_1_3_2_1_3_1","volume-title":"Privacy amplification by subsampling: Tight analyses via couplings and divergences. arXiv preprint arXiv:1807.01647","author":"Balle Borja","year":"2018","unstructured":"Borja Balle , Gilles Barthe , and Marco Gaboardi . 2018. Privacy amplification by subsampling: Tight analyses via couplings and divergences. arXiv preprint arXiv:1807.01647 ( 2018 ). Borja Balle, Gilles Barthe, and Marco Gaboardi. 2018. Privacy amplification by subsampling: Tight analyses via couplings and divergences. arXiv preprint arXiv:1807.01647 (2018)."},{"key":"e_1_3_2_1_4_1","volume-title":"On the Feasibility of Generic Deep Disaggregation for Single-Load Extraction. CoRR abs\/1802.02139","author":"Barsim Karim Said","year":"2018","unstructured":"Karim Said Barsim and Bin Yang . 2018. On the Feasibility of Generic Deep Disaggregation for Single-Load Extraction. CoRR abs\/1802.02139 ( 2018 ). arXiv:1802.02139 http:\/\/arxiv.org\/abs\/1802.02139 Karim Said Barsim and Bin Yang. 2018. On the Feasibility of Generic Deep Disaggregation for Single-Load Extraction. CoRR abs\/1802.02139 (2018). arXiv:1802.02139 http:\/\/arxiv.org\/abs\/1802.02139"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3360322.3360844"},{"key":"e_1_3_2_1_6_1","volume-title":"Federated Intrusion Detection for IoT with Heterogeneous Cohort Privacy. arXiv preprint arXiv:2101.09878","author":"Chathoth Ajesh Koyatan","year":"2021","unstructured":"Ajesh Koyatan Chathoth , Abhyuday Jagannatha , and Stephen Lee . 2021. Federated Intrusion Detection for IoT with Heterogeneous Cohort Privacy. arXiv preprint arXiv:2101.09878 ( 2021 ). Ajesh Koyatan Chathoth, Abhyuday Jagannatha, and Stephen Lee. 2021. Federated Intrusion Detection for IoT with Heterogeneous Cohort Privacy. arXiv preprint arXiv:2101.09878 (2021)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Cynthia Dwork Aaron Roth etal 2014. The algorithmic foundations of differential privacy. Foundations and Trends\u00ae in Theoretical Computer Science 9 3-4 (2014) 211--407.  Cynthia Dwork Aaron Roth et al. 2014. The algorithmic foundations of differential privacy. Foundations and Trends\u00ae in Theoretical Computer Science 9 3-4 (2014) 211--407.","DOI":"10.1561\/0400000042"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3396851.3397717"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2019.8682543"},{"key":"e_1_3_2_1_10_1","volume-title":"Evaluating Differentially Private Machine Learning in Practice","author":"Jayaraman Bargav","year":"1895","unstructured":"Bargav Jayaraman and David Evans . 2019. Evaluating Differentially Private Machine Learning in Practice ., 1895 -1912 pages. https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/jayaraman [Online; accessed 18. Feb. 2021]. Bargav Jayaraman and David Evans. 2019. Evaluating Differentially Private Machine Learning in Practice., 1895-1912 pages. https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/jayaraman [Online; accessed 18. Feb. 2021]."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Bargav Jayaraman Lingxiao Wang Katherine Knipmeyer Quanquan Gu and David Evans. 2021. Revisiting Membership Inference Under Realistic Assumptions. arXiv:2005.10881 [cs.CR]  Bargav Jayaraman Lingxiao Wang Katherine Knipmeyer Quanquan Gu and David Evans. 2021. Revisiting Membership Inference Under Realistic Assumptions. arXiv:2005.10881 [cs.CR]","DOI":"10.2478\/popets-2021-0031"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2821650.2821672"},{"key":"e_1_3_2_1_13_1","volume-title":"The UK-DALE dataset, domestic appliance-level electricity demand and whole-house demand from five UK homes. 2, 150007","author":"Kelly Jack","year":"2015","unstructured":"Jack Kelly and William Knottenbelt . 2015. The UK-DALE dataset, domestic appliance-level electricity demand and whole-house demand from five UK homes. 2, 150007 ( 2015 ). https:\/\/doi.org\/10.1038\/sdata.2015.7 10.1038\/sdata.2015.7 Jack Kelly and William Knottenbelt. 2015. The UK-DALE dataset, domestic appliance-level electricity demand and whole-house demand from five UK homes. 2, 150007 (2015). https:\/\/doi.org\/10.1038\/sdata.2015.7"},{"key":"e_1_3_2_1_14_1","volume-title":"Workshop on data mining applications in sustainability (SIGKDD)","volume":"25","author":"Zico Kolter J","year":"2011","unstructured":"J Zico Kolter and Matthew J Johnson . 2011 . REDD: A public data set for energy disaggregation research . In Workshop on data mining applications in sustainability (SIGKDD) , San Diego, CA , Vol. 25 . 59--62. J Zico Kolter and Matthew J Johnson. 2011. REDD: A public data set for energy disaggregation research. In Workshop on data mining applications in sustainability (SIGKDD), San Diego, CA, Vol. 25. 59--62."},{"key":"e_1_3_2_1_15_1","volume-title":"A General Approach to Adding Differential Privacy to Iterative Training Procedures. CoRR abs\/1812.06210","author":"McMahan H. Brendan","year":"2018","unstructured":"H. Brendan McMahan and Galen Andrew . 2018. A General Approach to Adding Differential Privacy to Iterative Training Procedures. CoRR abs\/1812.06210 ( 2018 ). arXiv:1812.06210 http:\/\/arxiv.org\/abs\/1812.06210 H. Brendan McMahan and Galen Andrew. 2018. A General Approach to Adding Differential Privacy to Iterative Training Procedures. CoRR abs\/1812.06210 (2018). arXiv:1812.06210 http:\/\/arxiv.org\/abs\/1812.06210"},{"key":"e_1_3_2_1_16_1","unstructured":"H. Brendan McMahan Eider Moore Daniel Ramage Seth Hampson and Blaise Ag\u00fcera y Arcas. 2017. Communication-Efficient Learning of Deep Networks from Decentralized Data. arXiv:1602.05629 [cs.LG]  H. Brendan McMahan Eider Moore Daniel Ramage Seth Hampson and Blaise Ag\u00fcera y Arcas. 2017. Communication-Efficient Learning of Deep Networks from Decentralized Data. arXiv:1602.05629 [cs.LG]"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1878431.1878446"},{"key":"e_1_3_2_1_18_1","volume-title":"Maintaining Privacy and Utility in IoT System Analytics. In 2020 Second IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA). IEEE, 157--164","author":"Moss\u00e9 Daniel","year":"2020","unstructured":"Daniel Moss\u00e9 , Henrique P\u00f6tter , and Stephen Lee . 2020 . Maintaining Privacy and Utility in IoT System Analytics. In 2020 Second IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA). IEEE, 157--164 . Daniel Moss\u00e9, Henrique P\u00f6tter, and Stephen Lee. 2020. Maintaining Privacy and Utility in IoT System Analytics. In 2020 Second IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA). IEEE, 157--164."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.41"},{"key":"e_1_3_2_1_20_1","volume-title":"The Unintended Consequences of Overfitting: Training Data Inference Attacks. CoRR abs\/1709.01604","author":"Yeom Samuel","year":"2017","unstructured":"Samuel Yeom , Matt Fredrikson , and Somesh Jha . 2017. The Unintended Consequences of Overfitting: Training Data Inference Attacks. CoRR abs\/1709.01604 ( 2017 ). arXiv:1709.01604 http:\/\/arxiv.org\/abs\/1709.01604 Samuel Yeom, Matt Fredrikson, and Somesh Jha. 2017. The Unintended Consequences of Overfitting: Training Data Inference Attacks. CoRR abs\/1709.01604 (2017). arXiv:1709.01604 http:\/\/arxiv.org\/abs\/1709.01604"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2018.00027"},{"key":"e_1_3_2_1_22_1","volume-title":"Thirty-second AAAI conference on artificial intelligence","author":"Zhang Chaoyun","unstructured":"Chaoyun Zhang , Mingjun Zhong , Zongzuo Wang , Nigel Goddard , and Charles Sutton . 2018. Sequence-to-Point Learning with Neural Networks for Non-Intrusive Load Monitoring . In Thirty-second AAAI conference on artificial intelligence . AIII Press , 2604--2611. https:\/\/aaai.org\/Conferences\/AAAI-18\/ Thirty-Second AAAI Conference on Artificial Intelligence, AAAI-18; Conference date: 02-02-2018 Through 07-02-2018. Chaoyun Zhang, Mingjun Zhong, Zongzuo Wang, Nigel Goddard, and Charles Sutton. 2018. Sequence-to-Point Learning with Neural Networks for Non-Intrusive Load Monitoring. In Thirty-second AAAI conference on artificial intelligence. AIII Press, 2604--2611. https:\/\/aaai.org\/Conferences\/AAAI-18\/ Thirty-Second AAAI Conference on Artificial Intelligence, AAAI-18; Conference date: 02-02-2018 Through 07-02-2018."}],"event":{"name":"e-Energy '21: The Twelfth ACM International Conference on Future Energy Systems","location":"Virtual Event Italy","acronym":"e-Energy '21"},"container-title":["Proceedings of the Twelfth ACM International Conference on Future Energy Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3447555.3464873","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3447555.3464873","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:18:32Z","timestamp":1750191512000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3447555.3464873"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,22]]},"references-count":22,"alternative-id":["10.1145\/3447555.3464873","10.1145\/3447555"],"URL":"https:\/\/doi.org\/10.1145\/3447555.3464873","relation":{},"subject":[],"published":{"date-parts":[[2021,6,22]]},"assertion":[{"value":"2021-06-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}