{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T18:01:04Z","timestamp":1773511264430,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,6,9]],"date-time":"2021-06-09T00:00:00Z","timestamp":1623196800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,6,9]]},"DOI":"10.1145\/3448016.3452756","type":"proceedings-article","created":{"date-parts":[[2021,6,18]],"date-time":"2021-06-18T17:22:37Z","timestamp":1624036957000},"page":"2808-2812","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["DPGraph: A Benchmark Platform for Differentially Private Graph Analysis"],"prefix":"10.1145","author":[{"given":"Siyuan","family":"Xia","sequence":"first","affiliation":[{"name":"University of Waterloo, Waterloo, ON, Canada"}]},{"given":"Beizhen","family":"Chang","sequence":"additional","affiliation":[{"name":"University of Waterloo, Waterloo, ON, Canada"}]},{"given":"Karl","family":"Knopf","sequence":"additional","affiliation":[{"name":"University of Waterloo, Waterloo, ON, Canada"}]},{"given":"Yihan","family":"He","sequence":"additional","affiliation":[{"name":"New York University, New York, NY, USA"}]},{"given":"Yuchao","family":"Tao","sequence":"additional","affiliation":[{"name":"Duke University, Durham, NC, USA"}]},{"given":"Xi","family":"He","sequence":"additional","affiliation":[{"name":"University of Waterloo, Waterloo, ON, Canada"}]}],"member":"320","published-online":{"date-parts":[[2021,6,18]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"The New York Times","author":"Barbaro M.","year":"2006","unstructured":"M. Barbaro and T. Z. Jr . A face is exposed for aol searcher no. 4417749 . The New York Times , 2006 . M. Barbaro and T. Z. Jr. A face is exposed for aol searcher no. 4417749. The New York Times, 2006."},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2422436.2422449"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2018.00057"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2463676.2465304"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1807167.1807218"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2882903.2926745"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_14"},{"key":"e_1_3_2_2_8_1","volume-title":"Foundations and Trends\u00ae in Theoretical Computer Science","author":"Dwork C.","year":"2014","unstructured":"C. Dwork , A. Roth , The algorithmic foundations of differential privacy . Foundations and Trends\u00ae in Theoretical Computer Science , 2014 . C. Dwork, A. Roth, et al. The algorithmic foundations of differential privacy. Foundations and Trends\u00ae in Theoretical Computer Science, 2014."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1401890.1401926"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3077136.3080649"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28914-9_19"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2009.11"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2882903.2899387"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.14778\/1453856.1453873"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3187009.3177733"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2611523"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36594-2_26"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.14778\/3342263.3342274"},{"key":"e_1_3_2_2_19_1","unstructured":"J. Leskovec and A. Krevl. SNAP Datasets: Stanford large network dataset collection. http:\/\/snap.stanford.edu\/data June 2014.  J. Leskovec and A. Krevl. SNAP Datasets: Stanford large network dataset collection. http:\/\/snap.stanford.edu\/data June 2014."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.14778\/3055330.3055331"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2008.4497436"},{"key":"e_1_3_2_2_22_1","volume-title":"Digital contact tracing based on a graph database algorithm for emergency management during the covid-19 epidemic: Case study. JMIR mHealth and uHealth, 9(1):e26836","author":"Mao Z.","year":"2021","unstructured":"Z. Mao , H. Yao , Q. Zou , W. Zhang , and Y. Dong . Digital contact tracing based on a graph database algorithm for emergency management during the covid-19 epidemic: Case study. JMIR mHealth and uHealth, 9(1):e26836 , 2021 . Z. Mao, H. Yao, Q. Zou, W. Zhang, and Y. Dong. Digital contact tracing based on a graph database algorithm for emergency management during the covid-19 epidemic: Case study. JMIR mHealth and uHealth, 9(1):e26836, 2021."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382264"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250790.1250803"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2342549.2342553"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.14778\/2732296.2732300"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1658939.1658958"},{"key":"e_1_3_2_2_28_1","volume-title":"CCS","author":"Qin Z.","year":"2017","unstructured":"Z. Qin , T. Yu , Y. Yang , I. Khalil , X. Xiao , and K. Ren . Generating synthetic decentralized social graphs with local differential privacy . In CCS , 2017 . Z. Qin, T. Yu, Y. Yang, I. Khalil, X. Xiao, and K. Ren. Generating synthetic decentralized social graphs with local differential privacy. In CCS, 2017."},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2016.60"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1559795.1559812"},{"key":"e_1_3_2_2_31_1","volume-title":"Advances in Neural Information Processing Systems","author":"Ullman J.","year":"2019","unstructured":"J. Ullman and A. Sealfon . Efficiently estimating erdos-renyi graphs with node differential privacy . In Advances in Neural Information Processing Systems , 2019 . J. Ullman and A. Sealfon. Efficiently estimating erdos-renyi graphs with node differential privacy. In Advances in Neural Information Processing Systems, 2019."},{"key":"e_1_3_2_2_32_1","volume-title":"VLDB","author":"Wong R. C.-W.","year":"2007","unstructured":"R. C.-W. Wong , A. W.-C. Fu , K. Wang , and J. Pei . Minimality attack in privacy preserving data publishing . In VLDB , 2007 . R. C.-W. Wong, A. W.-C. Fu, K. Wang, and J. Pei. Minimality attack in privacy preserving data publishing. In VLDB, 2007."},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2723372.2737785"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78478-4_9"}],"event":{"name":"SIGMOD\/PODS '21: International Conference on Management of Data","location":"Virtual Event China","acronym":"SIGMOD\/PODS '21","sponsor":["SIGMOD ACM Special Interest Group on Management of Data"]},"container-title":["Proceedings of the 2021 International Conference on Management of Data"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3448016.3452756","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3448016.3452756","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:49:13Z","timestamp":1750193353000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3448016.3452756"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,9]]},"references-count":34,"alternative-id":["10.1145\/3448016.3452756","10.1145\/3448016"],"URL":"https:\/\/doi.org\/10.1145\/3448016.3452756","relation":{},"subject":[],"published":{"date-parts":[[2021,6,9]]},"assertion":[{"value":"2021-06-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}