{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T09:01:43Z","timestamp":1775638903663,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":56,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,11,13]],"date-time":"2021-11-13T00:00:00Z","timestamp":1636761600000},"content-version":"vor","delay-in-days":1,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1931443, 2047476"],"award-info":[{"award-number":["1931443, 2047476"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,12]]},"DOI":"10.1145\/3460120.3484750","type":"proceedings-article","created":{"date-parts":[[2021,11,13]],"date-time":"2021-11-13T12:05:34Z","timestamp":1636805134000},"page":"1237-1253","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":62,"title":["Continuous Release of Data Streams under both Centralized and Local Differential Privacy"],"prefix":"10.1145","author":[{"given":"Tianhao","family":"Wang","sequence":"first","affiliation":[{"name":"Carnegie Mellon University &amp; University of Virginia, Pittsburgh, PA, USA"}]},{"given":"Joann Qiongna","family":"Chen","sequence":"additional","affiliation":[{"name":"University of California, Irvine, Irvine, CA, USA"}]},{"given":"Zhikun","family":"Zhang","sequence":"additional","affiliation":[{"name":"CISPA Helmholtz Center for Information Security, Saarbr\u00fccken, Germany"}]},{"given":"Dong","family":"Su","sequence":"additional","affiliation":[{"name":"Alibaba Inc., San Mateo, CA, USA"}]},{"given":"Yueqiang","family":"Cheng","sequence":"additional","affiliation":[{"name":"NIO Security Research, San Jose, CA, USA"}]},{"given":"Zhou","family":"Li","sequence":"additional","affiliation":[{"name":"University of California, Irvine, Irvine, CA, USA"}]},{"given":"Ninghui","family":"Li","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, IN, USA"}]},{"given":"Somesh","family":"Jha","sequence":"additional","affiliation":[{"name":"University of Wisconsin, Madison, Madison, WI, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,11,13]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"Frequent itemset mining dataset repository. http:\/\/fimi.ua.ac.be\/data\/."},{"key":"e_1_3_2_2_2_1","unstructured":"New york taxi trip record data. https:\/\/www1.nyc.gov\/site\/tlc\/about\/tlc-trip-record-data.page."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623361"},{"key":"e_1_3_2_2_4_1","volume-title":"NIPS","author":"Bassily R.","year":"2017","unstructured":"R. Bassily, K. Nissim, U. Stemmer, and A. G. Thakurta. Practical locally private heavy hitters. In NIPS, 2017."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2746539.2746632"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2448496.2448530"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/3310435.3310585"},{"key":"e_1_3_2_2_8_1","volume-title":"Private and continual release of statistics. ACM Transactions on Information and System Security (TISSEC), 14(3):1--24","author":"Chan T.-H. H.","year":"2011","unstructured":"T.-H. H. Chan, E. Shi, and D. Song. Private and continual release of statistics. ACM Transactions on Information and System Security (TISSEC), 14(3):1--24, 2011."},{"key":"e_1_3_2_2_9_1","volume-title":"Anomaly detection: A survey. ACM computing surveys (CSUR), 41(3):1--58","author":"Chandola V.","year":"2009","unstructured":"V. Chandola, A. Banerjee, and V. Kumar. Anomaly detection: A survey. ACM computing surveys (CSUR), 41(3):1--58, 2009."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134102"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3183713.3197390"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.14778\/3339490.3339496"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2882903.2926745"},{"key":"e_1_3_2_2_14_1","volume-title":"The permute-and-flip mechanism is identical to report-noisy-max with exponential noise. arXiv preprint arXiv:2105.07260","author":"Ding Z.","year":"2021","unstructured":"Z. Ding, D. Kifer, T. Steinke, Y. Wang, Y. Xiao, D. Zhang, et al. The permute-and-flip mechanism is identical to report-noisy-max with exponential noise. arXiv preprint arXiv:2105.07260, 2021."},{"key":"e_1_3_2_2_15_1","volume-title":"FOCS","author":"Duchi J. C.","year":"2013","unstructured":"J. C. Duchi, M. I. Jordan, and M. J. Wainwright. Local privacy and statistical minimax rates. In FOCS, 2013."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.2017.1389735"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_14"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806689.1806787"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48800-3_30"},{"key":"e_1_3_2_2_20_1","volume-title":"The algorithmic foundations of differential privacy. Foundations and Trends in Theoretical Computer Science, 9(3--4)","author":"Dwork C.","year":"2014","unstructured":"C. Dwork and A. Roth. The algorithmic foundations of differential privacy. Foundations and Trends in Theoretical Computer Science, 9(3--4), 2014."},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2010.12"},{"key":"e_1_3_2_2_22_1","volume-title":"Amplification by shuffling: From local to central differential privacy via anonymity. arXiv preprint arXiv:1811.12469","author":"Feldman V.","year":"2018","unstructured":"\u00da. Erlingsson, V. Feldman, I. Mironov, A. Raghunathan, K. Talwar, and A. Thakurta. Amplification by shuffling: From local to central differential privacy via anonymity. arXiv preprint arXiv:1811.12469, 2018."},{"key":"e_1_3_2_2_23_1","volume-title":"CCS","author":"Pihur V.","year":"2014","unstructured":"\u00da. Erlingsson, V. Pihur, and A. Korolova. RAPPOR: randomized aggregatable privacy-preserving ordinal response. In CCS, 2014."},{"issue":"9","key":"e_1_3_2_2_24_1","doi-asserted-by":"crossref","first-page":"2094","DOI":"10.1109\/TKDE.2013.96","article-title":"An adaptive approach to real-time aggregate monitoring with differential privacy","volume":"26","author":"Fan L.","year":"2013","unstructured":"L. Fan and L. Xiong. An adaptive approach to real-time aggregate monitoring with differential privacy. IEEE Transactions on knowledge and data engineering, 26(9):2094--2106, 2013.","journal-title":"IEEE Transactions on knowledge and data engineering"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1613\/jair.1.11583"},{"key":"e_1_3_2_2_26_1","volume-title":"Boosting the accuracy of differentially private histograms through consistency. PVLDB, 3(1)","author":"Hay M.","year":"2010","unstructured":"M. Hay, V. Rastogi, G. Miklau, and D. Suciu. Boosting the accuracy of differentially private histograms through consistency. PVLDB, 3(1), 2010."},{"key":"e_1_3_2_2_27_1","first-page":"2375","volume-title":"Advances in Neural Information Processing Systems","author":"Joseph M.","year":"2018","unstructured":"M. Joseph, A. Roth, J. Ullman, and B. Waggoner. Local differential privacy for evolving data. In Advances in Neural Information Processing Systems, pages 2375--2384, 2018."},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1137\/090756090"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.14778\/2732977.2732989"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.14778\/3342263.3342274"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2783366"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.14778\/2350229.2350251"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3318464.3389700"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1878431.1878446"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250790.1250803"},{"key":"e_1_3_2_2_36_1","volume-title":"Private continual release of real-valued data streams. ndss","author":"Perrier V.","year":"2019","unstructured":"V. Perrier, H. J. Asghar, and D. Kaafar. Private continual release of real-valued data streams. ndss, 2019."},{"key":"e_1_3_2_2_37_1","volume-title":"Understanding hierarchical methods for differentially private histograms. PVLDB, 6(14)","author":"Qardaji W. H.","year":"2013","unstructured":"W. H. Qardaji, W. Yang, and N. Li. Understanding hierarchical methods for differentially private histograms. PVLDB, 6(14), 2013."},{"key":"e_1_3_2_2_38_1","volume-title":"CCS","author":"Qin Z.","year":"2016","unstructured":"Z. Qin, Y. Yang, T. Yu, I. Khalil, X. Xiao, and K. Ren. Heavy hitter estimation over set-valued data with local differential privacy. In CCS, 2016."},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1807167.1807247"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2018.00079"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2019.00063"},{"issue":"4","key":"e_1_3_2_2_42_1","first-page":"591","article-title":"Real-time and spatio-temporal crowd-sourced social network data publishing with differential privacy","volume":"15","author":"Wang Q.","year":"2016","unstructured":"Q. Wang, Y. Zhang, X. Lu, Z. Wang, Z. Qin, and K. Ren. Real-time and spatio-temporal crowd-sourced social network data publishing with differential privacy. IEEE Transactions on Dependable and Secure Computing, 15(4):591--606, 2016.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"e_1_3_2_2_43_1","volume-title":"USENIX Security","author":"Wang T.","year":"2017","unstructured":"T. Wang, J. Blocki, N. Li, and S. Jha. Locally differentially private protocols for frequency estimation. In USENIX Security, 2017."},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3299869.3319891"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00035"},{"key":"e_1_3_2_2_46_1","volume-title":"IEEE TDSC","author":"Wang T.","year":"2019","unstructured":"T. Wang, N. Li, and S. Jha. Locally differentially private heavy hitter identification. IEEE TDSC, 2019."},{"key":"e_1_3_2_2_47_1","volume-title":"NDSS","author":"Wang T.","year":"2020","unstructured":"T. Wang, Z. Li, N. Li, M. Lopuha\"a-Zwakenberg, and B. Skoric. Consistent and accurate frequency oracles under local differential privacy. In NDSS, 2020."},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155290"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1965.10480775"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0025"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.14778\/3407790.3407859"},{"key":"e_1_3_2_2_52_1","volume-title":"VLDB","author":"Yang J.","year":"2021","unstructured":"J. Yang, T. Wang, N. Li, X. Cheng, and S. Su. Answering multi-dimensional range queries under local differential privacy. VLDB, 2021."},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2018.2809790"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.14778\/2428536.2428539"},{"key":"e_1_3_2_2_55_1","volume-title":"CCS","author":"Zhang Z.","year":"2018","unstructured":"Z. Zhang, T. Wang, N. Li, S. He, and J. Chen. Calm: Consistent adaptive local marginal for marginal release under local differential privacy. In CCS, 2018."},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/502512.502572"}],"event":{"name":"CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security","location":"Virtual Event Republic of Korea","acronym":"CCS '21","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484750","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3484750","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3484750","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T20:49:18Z","timestamp":1763498958000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484750"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,12]]},"references-count":56,"alternative-id":["10.1145\/3460120.3484750","10.1145\/3460120"],"URL":"https:\/\/doi.org\/10.1145\/3460120.3484750","relation":{},"subject":[],"published":{"date-parts":[[2021,11,12]]},"assertion":[{"value":"2021-11-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}