{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:47:04Z","timestamp":1750308424966,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,5,27]],"date-time":"2021-05-27T00:00:00Z","timestamp":1622073600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,5,27]]},"DOI":"10.1145\/3471287.3471306","type":"proceedings-article","created":{"date-parts":[[2021,9,25]],"date-time":"2021-09-25T16:14:25Z","timestamp":1632586465000},"page":"84-89","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Selection and Verification of Privacy Parameters for Local Differentially Private Data Aggregation"],"prefix":"10.1145","author":[{"given":"Snehkumar","family":"Shahani","sequence":"first","affiliation":[{"name":"Savitribai Phule Pune University, India"}]},{"given":"Jibi","family":"Abraham","sequence":"additional","affiliation":[{"name":"College of Engineering Pune, India"}]},{"given":"R.","family":"Venkateswaran","sequence":"additional","affiliation":[{"name":"Persistent Systems Ltd, India"}]}],"member":"320","published-online":{"date-parts":[[2021,9,25]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"DREAM: DiffeRentially privatE smArt Metering. CoRR abs\/1201.2531","author":"\u00c1cs Gergely","year":"2012","unstructured":"Gergely \u00c1cs and Claude Castelluccia . 2012 . DREAM: DiffeRentially privatE smArt Metering. CoRR abs\/1201.2531 (2012). http:\/\/arxiv.org\/abs\/1201.2531 Gergely \u00c1cs and Claude Castelluccia. 2012. DREAM: DiffeRentially privatE smArt Metering. CoRR abs\/1201.2531 (2012). http:\/\/arxiv.org\/abs\/1201.2531"},{"key":"e_1_3_2_1_2_1","first-page":"1","article-title":"A Comprehensive Comparison of Multiparty Secure Additions with Differential Privacy. Dependable and Secure Computing","volume":"99","author":"Goryczka S.","year":"2015","unstructured":"S. Goryczka and L. Xiong . 2015 . A Comprehensive Comparison of Multiparty Secure Additions with Differential Privacy. Dependable and Secure Computing , IEEE Transactions on PP , 99 (2015), 1 \u2013 1 . https:\/\/doi.org\/10.1109\/TDSC.2015.2484326 S. Goryczka and L. Xiong. 2015. A Comprehensive Comparison of Multiparty Secure Additions with Differential Privacy. Dependable and Secure Computing, IEEE Transactions on PP, 99 (2015), 1\u20131. https:\/\/doi.org\/10.1109\/TDSC.2015.2484326","journal-title":"IEEE Transactions on PP"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2422604.2422611"},{"volume-title":"Theory of Cryptography, Shai Halevi and Tal Rabin (Eds.)","series-title":"Lecture Notes in Computer Science","key":"e_1_3_2_1_4_1","unstructured":"2006. In Theory of Cryptography, Shai Halevi and Tal Rabin (Eds.) . Lecture Notes in Computer Science , Vol. 3876 . 2006. In Theory of Cryptography, Shai Halevi and Tal Rabin (Eds.). Lecture Notes in Computer Science, Vol. 3876."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250790.1250803"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1198\/000313006X124640"},{"volume-title":"Information Security","author":"Lee Jaewoo","key":"e_1_3_2_1_7_1","unstructured":"Jaewoo Lee and Chris Clifton . 2011. How Much Is Enough? Choosing \u03f5 for Differential Privacy . In Information Security , Xuejia Lai, Jianying Zhou, and Hui Li (Eds.). Springer Berlin Heidelberg , Berlin, Heidelberg , 325\u2013340. Jaewoo Lee and Chris Clifton. 2011. How Much Is Enough? Choosing \u03f5 for Differential Privacy. In Information Security, Xuejia Lai, Jianying Zhou, and Hui Li (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 325\u2013340."},{"key":"e_1_3_2_1_8_1","volume-title":"Differential Privacy: An Economic Method for Choosing Epsilon. In Computer Security Foundations Symposium (CSF)","author":"Hsu Justin","year":"2014","unstructured":"Justin Hsu , Marco Gaboardi , Andreas Haeberlen , Sanjeev Khanna , Arjun Narayan , Benjamin C Pierce , and Aaron Roth . 2014 . Differential Privacy: An Economic Method for Choosing Epsilon. In Computer Security Foundations Symposium (CSF) , 2014 IEEE 27th. IEEE, 398\u2013410. Justin Hsu, Marco Gaboardi, Andreas Haeberlen, Sanjeev Khanna, Arjun Narayan, Benjamin C Pierce, and Aaron Roth. 2014. Differential Privacy: An Economic Method for Choosing Epsilon. In Computer Security Foundations Symposium (CSF), 2014 IEEE 27th. IEEE, 398\u2013410."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1257\/aer.20170627"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102144"},{"key":"e_1_3_2_1_11_1","volume-title":"International Conference on Management of Data.","author":"Shahani Snehkumar","year":"2017","unstructured":"Snehkumar Shahani , Jibi Abraham , and R Venkateswaran . 2017 . Distributed Data Aggregation with Privacy Preservation at Endpoint . In International Conference on Management of Data. Snehkumar Shahani, Jibi Abraham, and R Venkateswaran. 2017. Distributed Data Aggregation with Privacy Preservation at Endpoint. In International Conference on Management of Data."},{"key":"e_1_3_2_1_12_1","first-page":"3","article-title":"The Algorithmic Foundations of Differential Privacy","volume":"9","author":"Dwork Cynthia","year":"2013","unstructured":"Cynthia Dwork and Aaron Roth . 2013 . The Algorithmic Foundations of Differential Privacy . Theoretical Computer Science 9 , 3 - 4 (2013), 211\u2013407. Cynthia Dwork and Aaron Roth. 2013. The Algorithmic Foundations of Differential Privacy. Theoretical Computer Science 9, 3-4 (2013), 211\u2013407.","journal-title":"Theoretical Computer Science"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijforecast.2006.03.001"},{"volume-title":"Parallel Problem Solving from Nature - PPSN VIII, Xin Yao, Edmund K","author":"Branke J\u00fcrgen","key":"e_1_3_2_1_14_1","unstructured":"J\u00fcrgen Branke , Kalyanmoy Deb , Henning Dierolf , and Matthias Osswald . 2004. Finding Knees in Multi-objective Optimization . In Parallel Problem Solving from Nature - PPSN VIII, Xin Yao, Edmund K . Burke, Jos\u00e9 A. Lozano, Jim Smith, Juan Juli\u00e1n Merelo-Guerv\u00f3s, John A. Bullinaria, Jonathan E. Rowe, Peter Ti\u0148o, Ata Kab\u00e1n, and Hans-Paul Schwefel (Eds.). Springer Berlin Heidelberg , Berlin, Heidelberg , 722\u2013731. J\u00fcrgen Branke, Kalyanmoy Deb, Henning Dierolf, and Matthias Osswald. 2004. Finding Knees in Multi-objective Optimization. In Parallel Problem Solving from Nature - PPSN VIII, Xin Yao, Edmund K. Burke, Jos\u00e9 A. Lozano, Jim Smith, Juan Juli\u00e1n Merelo-Guerv\u00f3s, John A. Bullinaria, Jonathan E. Rowe, Peter Ti\u0148o, Ata Kab\u00e1n, and Hans-Paul Schwefel (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 722\u2013731."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2011.20"},{"key":"e_1_3_2_1_16_1","volume-title":"Dataset supporting blood pressure prediction for the management of chronic hemodialysis. Scientific Data 6, 1 (09","author":"Lin Cheng-Jui","year":"2019","unstructured":"Cheng-Jui Lin , Ying-Ying Chen , Chi-Feng Pan , Vincent Wu , and Chih-Jen Wu. 2019. Dataset supporting blood pressure prediction for the management of chronic hemodialysis. Scientific Data 6, 1 (09 Dec 2019 ), 313. https:\/\/doi.org\/10.1038\/s41597-019-0319-8 Cheng-Jui Lin, Ying-Ying Chen, Chi-Feng Pan, Vincent Wu, and Chih-Jen Wu. 2019. Dataset supporting blood pressure prediction for the management of chronic hemodialysis. Scientific Data 6, 1 (09 Dec 2019), 313. https:\/\/doi.org\/10.1038\/s41597-019-0319-8"},{"key":"e_1_3_2_1_17_1","volume-title":"Handbook of mathematics","author":"Ilja","year":"2013","unstructured":"Bronshtein, Ilja N., and Konstantin A. Semendyayev . Handbook of mathematics . Springer Science & Business Media , 2013 . Bronshtein, Ilja N., and Konstantin A. Semendyayev. Handbook of mathematics. Springer Science & Business Media, 2013."},{"volume-title":"Principles of Economics","author":"Marshall A.","key":"e_1_3_2_1_18_1","unstructured":"A. Marshall . 2013. Principles of Economics . Palgrave Macmillan UK. https:\/\/books.google.co.in\/books?id=2EHFAgAAQBAJ A. Marshall. 2013. Principles of Economics. Palgrave Macmillan UK. https:\/\/books.google.co.in\/books?id=2EHFAgAAQBAJ"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44839-X_82"}],"event":{"name":"ICISDM 2021: 2021 the 5th International Conference on Information System and Data Mining","acronym":"ICISDM 2021","location":"Silicon Valley CA USA"},"container-title":["2021 the 5th International Conference on Information System and Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3471287.3471306","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3471287.3471306","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T17:49:31Z","timestamp":1750268971000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3471287.3471306"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,27]]},"references-count":19,"alternative-id":["10.1145\/3471287.3471306","10.1145\/3471287"],"URL":"https:\/\/doi.org\/10.1145\/3471287.3471306","relation":{},"subject":[],"published":{"date-parts":[[2021,5,27]]},"assertion":[{"value":"2021-09-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}