{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T14:46:35Z","timestamp":1773153995204,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":79,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,11,12]],"date-time":"2021-11-12T00:00:00Z","timestamp":1636675200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62088101, 61833015, 61772466, U1836202"],"award-info":[{"award-number":["62088101, 61833015, 61772466, U1836202"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Zhejiang Provincial Natural Science Foundation for Distinguished Young Scholars","award":["LR19F020003"],"award-info":[{"award-number":["LR19F020003"]}]},{"name":"Combat Capabilities Development Command Army Research Laboratory","award":["W911NF-13-2-0045"],"award-info":[{"award-number":["W911NF-13-2-0045"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,12]]},"DOI":"10.1145\/3460120.3485668","type":"proceedings-article","created":{"date-parts":[[2021,11,13]],"date-time":"2021-11-13T12:05:27Z","timestamp":1636805127000},"page":"1266-1288","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":31,"title":["AHEAD: Adaptive Hierarchical Decomposition for Range Query under Local Differential Privacy"],"prefix":"10.1145","author":[{"given":"Linkang","family":"Du","sequence":"first","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]},{"given":"Zhikun","family":"Zhang","sequence":"additional","affiliation":[{"name":"CISPA Helmholtz Center for Information Security, Saarbr\u00fccken, Germany"}]},{"given":"Shaojie","family":"Bai","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]},{"given":"Changchang","family":"Liu","sequence":"additional","affiliation":[{"name":"IBM Research, Yorktown Heights, NY, USA"}]},{"given":"Shouling","family":"Ji","sequence":"additional","affiliation":[{"name":"Zhejiang University &amp; Binjiang Institute of Zhejiang University, Hangzhou, China"}]},{"given":"Peng","family":"Cheng","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]},{"given":"Jiming","family":"Chen","sequence":"additional","affiliation":[{"name":"Zhejiang University &amp; Zhejiang University of Technology, Hangzhou, China"}]}],"member":"320","published-online":{"date-parts":[[2021,11,13]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"e_1_3_2_2_2_1","volume-title":"Interactive inference under information constraints. arXiv preprint arXiv:2007.10976","author":"Acharya Jayadev","year":"2020","unstructured":"Jayadev Acharya, Cl\u00e9ment L Canonne, Yuhan Liu, Ziteng Sun, and Himanshu Tyagi. 2020. Interactive inference under information constraints. arXiv preprint arXiv:2007.10976 (2020)."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2012.80"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516735"},{"key":"e_1_3_2_2_5_1","unstructured":"Raef Bassily Kobbi Nissim Uri Stemmer and Abhradeep Guha Thakurta. 2017. Practical locally private heavy hitters. In Advances in Neural Information Processing Systems. 2288--2296."},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2746539.2746632"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/362686.362692"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382263"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2016.7498248"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3183713.3196906"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.14778\/3339490.3339496"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2012.16"},{"key":"e_1_3_2_2_13_1","volume-title":"learning with privacy at scale. https:\/\/machinelearning.apple.com\/docs\/learning-with-privacy-at-scale\/appledifferentialprivacysystem.pdf. Accessed","author":"Apple","year":"2020","unstructured":"Apple differential privacy team. [n.d.]. learning with privacy at scale. https:\/\/machinelearning.apple.com\/docs\/learning-with-privacy-at-scale\/appledifferentialprivacysystem.pdf. Accessed April 9, 2020."},{"key":"e_1_3_2_2_14_1","unstructured":"Bolin Ding Janardhan Kulkarni and Sergey Yekhanin. 2017. Collecting telemetry data privately. In Advances in Neural Information Processing Systems. 3571--3580."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2013.53"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/11787006_1"},{"key":"e_1_3_2_2_17_1","volume-title":"Theory of cryptography conference","author":"Dwork Cynthia","unstructured":"Cynthia Dwork, Frank McSherry, Kobbi Nissim, and Adam Smith. 2006. Calibrating noise to sensitivity in private data analysis. In Theory of cryptography conference. Springer, 265--284."},{"key":"e_1_3_2_2_18_1","volume-title":"et almbox","author":"Dwork Cynthia","year":"2014","unstructured":"Cynthia Dwork, Aaron Roth, et almbox. 2014. The algorithmic foundations of differential privacy. Foundations and Trends\u00ae in Theoretical Computer Science, Vol. 9, 3--4 (2014), 211--407."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3357713.3384297"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660348"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2016-0015"},{"key":"e_1_3_2_2_22_1","volume-title":"Kamino: Constraint-Aware Differentially Private Data Synthesis. arXiv preprint arXiv:2012.15713","author":"Ge Chang","year":"2020","unstructured":"Chang Ge, Shubhankar Mohapatra, Xi He, and Ihab F Ilyas. 2020. Kamino: Constraint-Aware Differentially Private Data Synthesis. arXiv preprint arXiv:2012.15713 (2020)."},{"key":"e_1_3_2_2_23_1","volume-title":"Marketing Firm Exactis Leaked a Personal Info Database With 340 Million Records. [EB\/OL]. https:\/\/www.wired.com\/story\/exactis-database-leak-340-million-records\/ Accessed","author":"Greenberg Andy","year":"2020","unstructured":"Andy Greenberg. [n.d.]. Marketing Firm Exactis Leaked a Personal Info Database With 340 Million Records. [EB\/OL]. https:\/\/www.wired.com\/story\/exactis-database-leak-340-million-records\/ Accessed April 13, 2020."},{"key":"e_1_3_2_2_24_1","volume-title":"29th $$USENIX$$ Security Symposium ($$USENIX$$ Security 20). 967--984.","author":"Gu Xiaolan","unstructured":"Xiaolan Gu, Ming Li, Yueqiang Cheng, Li Xiong, and Yang Cao. 2020. $$PCKV$$: Locally Differentially Private Correlated Key-Value Data Collection with Optimized Utility. In 29th $$USENIX$$ Security Symposium ($$USENIX$$ Security 20). 967--984."},{"key":"e_1_3_2_2_25_1","unstructured":"Moritz Hardt Katrina Ligett and Frank McSherry. 2012. A simple and practical algorithm for differentially private data release. In Advances in Neural Information Processing Systems. 2339--2347."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2882903.2882931"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.14778\/1920841.1920970"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2020.3006760"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/B978-012722442-8\/50011-2"},{"key":"e_1_3_2_2_30_1","volume-title":"Prateek Mittal, and Raheem A Beyah.","author":"Ji Shouling","year":"2015","unstructured":"Shouling Ji, Weiqing Li, Neil Zhenqiang Gong, Prateek Mittal, and Raheem A Beyah. 2015a. On Your Social Network De-anonymizablity: Quantification and Large Scale Evaluation with Seed Knowledge.. In NDSS ."},{"key":"e_1_3_2_2_31_1","volume-title":"Secgraph: A uniform and open-source evaluation system for graph data anonymization and de-anonymization. In 24th $$USENIX$$ Security Symposium ($$USENIX$$ Security 15). 303--318.","author":"Ji Shouling","year":"2015","unstructured":"Shouling Ji, Weiqing Li, Prateek Mittal, Xin Hu, and Raheem Beyah. 2015b. Secgraph: A uniform and open-source evaluation system for graph data anonymization and de-anonymization. In 24th $$USENIX$$ Security Symposium ($$USENIX$$ Security 15). 303--318."},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660278"},{"key":"e_1_3_2_2_33_1","volume-title":"Practical differential privacy for SQL queries using elastic sensitivity. arXiv preprint arXiv:1706.09479","author":"Johnson Noah","year":"2017","unstructured":"Noah Johnson, Joseph P Near, and Dawn Song. 2017. Practical differential privacy for SQL queries using elastic sensitivity. arXiv preprint arXiv:1706.09479 (2017)."},{"key":"e_1_3_2_2_34_1","volume-title":"International Conference on Learning Representations .","author":"Jordon James","year":"2018","unstructured":"James Jordon, Jinsung Yoon, and Mihaela Van Der Schaar. 2018. PATE-GAN: Generating synthetic data with differential privacy guarantees. In International Conference on Learning Representations ."},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2019.00015"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611975994.31"},{"key":"e_1_3_2_2_37_1","volume-title":"Proceedings of the 32nd International Conference on Neural Information Processing Systems. 2381--2390","author":"Joseph Matthew","year":"2018","unstructured":"Matthew Joseph, Aaron Roth, Jonathan Ullman, and Bo Waggoner. 2018. Local differential privacy for evolving data. In Proceedings of the 32nd International Conference on Neural Information Processing Systems. 2381--2390."},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1137\/090756090"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.14778\/2732269.2732271"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1807085.1807104"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-02350-7"},{"key":"e_1_3_2_2_42_1","volume-title":"28th European Modeling and Simulation Symposium, EMSS, Larnaca","author":"Lopez-Rojas Edgar","year":"2016","unstructured":"Edgar Lopez-Rojas, Ahmad Elmir, and Stefan Axelsson. 2016. PaySim: A financial mobile money simulator for fraud detection. In 28th European Modeling and Simulation Symposium, EMSS, Larnaca. Dime University of Genoa, 249--255."},{"key":"e_1_3_2_2_43_1","volume-title":"Optimizing error of high-dimensional statistical queries under differential privacy. arXiv preprint arXiv:1808.03537","author":"McKenna Ryan","year":"2018","unstructured":"Ryan McKenna, Gerome Miklau, Michael Hay, and Ashwin Machanavajjhala. 2018. Optimizing error of high-dimensional statistical queries under differential privacy. arXiv preprint arXiv:1808.03537 (2018)."},{"key":"e_1_3_2_2_44_1","volume-title":"Facebook Security Breach Exposes Accounts of 50 Million Users. [EB\/OL]. https:\/\/www.nytimes.com\/2018\/09\/28\/technology\/facebook-hack-data-breach.html Accessed","author":"Mike Isaac Sheera Frenkel","year":"2020","unstructured":"Sheera Frenkel Mike Isaac. [n.d.]. Facebook Security Breach Exposes Accounts of 50 Million Users. [EB\/OL]. https:\/\/www.nytimes.com\/2018\/09\/28\/technology\/facebook-hack-data-breach.html Accessed April 13, 2020."},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-49257-7_16"},{"key":"e_1_3_2_2_46_1","volume-title":"Hyejin Shin, and Junbum Shin.","author":"Nguy\u00ean Th\u00f4ng T","year":"2016","unstructured":"Th\u00f4ng T Nguy\u00ean, Xiaokui Xiao, Yin Yang, Siu Cheung Hui, Hyejin Shin, and Junbum Shin. 2016. Collecting and analyzing data from smart device users with local differential privacy. arXiv preprint arXiv:1606.05053 (2016)."},{"key":"e_1_3_2_2_47_1","volume-title":"Marriott Hacking Exposes Data of Up to 500 Million Guests. [EB\/OL]. https:\/\/www.nytimes.com\/2018\/11\/30\/business\/marriott-data-breach.html Accessed","author":"Nicole Perlroth Adam Satariano","year":"2020","unstructured":"Adam Satariano Nicole Perlroth, Amie Tsang. [n.d.]. Marriott Hacking Exposes Data of Up to 500 Million Guests. [EB\/OL]. https:\/\/www.nytimes.com\/2018\/11\/30\/business\/marriott-data-breach.html Accessed April 13, 2020."},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250790.1250803"},{"key":"e_1_3_2_2_49_1","volume-title":"Semi-supervised knowledge transfer for deep learning from private training data. arXiv preprint arXiv:1610.05755","author":"Papernot Nicolas","year":"2016","unstructured":"Nicolas Papernot, Mart'in Abadi, Ulfar Erlingsson, Ian Goodfellow, and Kunal Talwar. 2016. Semi-supervised knowledge transfer for deep learning from private training data. arXiv preprint arXiv:1610.05755 (2016)."},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2013.6544872"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.14778\/2556549.2556576"},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2588555.2588575"},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978409"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134086"},{"key":"e_1_3_2_2_55_1","volume-title":"Proceedings of the 54th Annual Symposium on Foundations of Computer Science. 531--540","author":"Raskhodnikova Sofya","year":"2008","unstructured":"Sofya Raskhodnikova, Adam Smith, Homin K Lee, Kobbi Nissim, and Shiva Prasad Kasiviswanathan. 2008. What can we learn privately. In Proceedings of the 54th Annual Symposium on Foundations of Computer Science. 531--540."},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2812146"},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354253"},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2018.00079"},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-42836-9_23"},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.14778\/3389133.3389140"},{"key":"e_1_3_2_2_61_1","volume-title":"26th $$USENIX$$ Security Symposium ($$USENIX$$ Security 17). 729--745.","author":"Wang Tianhao","unstructured":"Tianhao Wang, Jeremiah Blocki, Ninghui Li, and Somesh Jha. 2017. Locally differentially private protocols for frequency estimation. In 26th $$USENIX$$ Security Symposium ($$USENIX$$ Security 17). 729--745."},{"key":"e_1_3_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3299869.3319891"},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00035"},{"key":"e_1_3_2_2_64_1","volume-title":"2019 b. Locally differentially private heavy hitter identification","author":"Wang Tianhao","year":"2019","unstructured":"Tianhao Wang, Ninghui Li, and Somesh Jha. 2019 b. Locally differentially private heavy hitter identification. IEEE Transactions on Dependable and Secure Computing (2019)."},{"key":"e_1_3_2_2_65_1","volume-title":"2019 c. Consistent and accurate frequency oracles under local differential privacy. arXiv preprint arXiv:1905.08320","author":"Wang Tianhao","year":"2019","unstructured":"Tianhao Wang, Zitao Li, Ninghui Li, Milan Lopuha\"a-Zwakenberg, and Boris Skoric. 2019 c. Consistent and accurate frequency oracles under local differential privacy. arXiv preprint arXiv:1905.08320 (2019)."},{"key":"e_1_3_2_2_66_1","unstructured":"Tianhao Wang Milan Lopuha\"a-Zwakenberg Zitao Li Boris Skoric and Ninghui Li. [n.d.]. Locally Differentially Private Frequency Estimation with Consistency. ( [n. d.])."},{"key":"e_1_3_2_2_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2020.3009007"},{"key":"e_1_3_2_2_68_1","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1965.10480775"},{"key":"e_1_3_2_2_69_1","volume-title":"Linear and Range Counting under Metric-based Local Differential Privacy. arXiv","author":"Xiang Zhuolun","year":"2019","unstructured":"Zhuolun Xiang, Bolin Ding, Xi He, and Jingren Zhou. 2019. Linear and Range Counting under Metric-based Local Differential Privacy. arXiv (2019), arXiv--1909."},{"key":"e_1_3_2_2_70_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2010.247"},{"key":"e_1_3_2_2_71_1","volume-title":"DPCube: differentially private histogram release through multidimensional partitioning. arXiv preprint arXiv:1202.5358","author":"Xiao Yonghui","year":"2012","unstructured":"Yonghui Xiao, Li Xiong, Liyue Fan, and Slawomir Goryczka. 2012. DPCube: differentially private histogram release through multidimensional partitioning. arXiv preprint arXiv:1202.5358 (2012)."},{"key":"e_1_3_2_2_72_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-013-0309-y"},{"key":"e_1_3_2_2_73_1","doi-asserted-by":"publisher","DOI":"10.14778\/3430915.3430927"},{"key":"e_1_3_2_2_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/3209582.3209598"},{"key":"e_1_3_2_2_75_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00018"},{"key":"e_1_3_2_2_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/2882903.2882928"},{"key":"e_1_3_2_2_77_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611973440.68"},{"key":"e_1_3_2_2_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243742"},{"key":"e_1_3_2_2_79_1","volume-title":"PrivSyn: Differentially Private Data Synthesis. arXiv preprint arXiv:2012.15128","author":"Zhang Zhikun","year":"2020","unstructured":"Zhikun Zhang, Tianhao Wang, Ninghui Li, Jean Honorio, Michael Backes, Shibo He, Jiming Chen, and Yang Zhang. 2020. PrivSyn: Differentially Private Data Synthesis. arXiv preprint arXiv:2012.15128 (2020)."}],"event":{"name":"CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security","location":"Virtual Event Republic of Korea","acronym":"CCS '21","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3485668","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3485668","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T20:45:10Z","timestamp":1763498710000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3485668"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,12]]},"references-count":79,"alternative-id":["10.1145\/3460120.3485668","10.1145\/3460120"],"URL":"https:\/\/doi.org\/10.1145\/3460120.3485668","relation":{},"subject":[],"published":{"date-parts":[[2021,11,12]]},"assertion":[{"value":"2021-11-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}