{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,12]],"date-time":"2025-12-12T13:07:54Z","timestamp":1765544874121,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":67,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,10,17]],"date-time":"2022-10-17T00:00:00Z","timestamp":1665964800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,10,17]]},"DOI":"10.1145\/3511808.3557278","type":"proceedings-article","created":{"date-parts":[[2022,10,16]],"date-time":"2022-10-16T01:29:57Z","timestamp":1665883797000},"page":"1685-1695","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["Cross-Network Social User Embedding with Hybrid Differential Privacy Guarantees"],"prefix":"10.1145","author":[{"given":"Jiaqian","family":"Ren","sequence":"first","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences &amp; School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"}]},{"given":"Lei","family":"Jiang","sequence":"additional","affiliation":[{"name":"The Second Research Room, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"}]},{"given":"Hao","family":"Peng","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Technology, Beihang University, Beijing, China"}]},{"given":"Lingjuan","family":"Lyu","sequence":"additional","affiliation":[{"name":"Sony AI, Tokyo, Japan"}]},{"given":"Zhiwei","family":"Liu","sequence":"additional","affiliation":[{"name":"Salesforce, Palo Alto, CA, USA"}]},{"given":"Chaochao","family":"Chen","sequence":"additional","affiliation":[{"name":"Zhejiang University, hangzhou, China"}]},{"given":"Jia","family":"Wu","sequence":"additional","affiliation":[{"name":"Macquarie University, Sydney, Australia"}]},{"given":"Xu","family":"Bai","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"}]},{"given":"Philip S.","family":"Yu","sequence":"additional","affiliation":[{"name":"University of Illinois Chicago, Chicago, IL, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,10,17]]},"reference":[{"volume-title":"Local differential privacy on metric spaces: optimizing the trade-off with utility","author":"Alvim M\u00e1rio","key":"e_1_3_2_2_1_1","unstructured":"M\u00e1rio Alvim , Konstantinos Chatzikokolakis , Catuscia Palamidessi , and Anna Pazii . 2018. Local differential privacy on metric spaces: optimizing the trade-off with utility . In CSF. IEEE , 262--267. M\u00e1rio Alvim, Konstantinos Chatzikokolakis, Catuscia Palamidessi, and Anna Pazii. 2018. Local differential privacy on metric spaces: optimizing the trade-off with utility. In CSF. IEEE, 262--267."},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"crossref","unstructured":"Athanasios Andreou Oana Goga and Patrick Loiseau. 2017. Identity vs. attribute disclosure risks for users with multiple social profiles. In ASONAM. 163--170.  Athanasios Andreou Oana Goga and Patrick Loiseau. 2017. Identity vs. attribute disclosure risks for users with multiple social profiles. In ASONAM. 163--170.","DOI":"10.1145\/3110025.3110046"},{"volume-title":"The johnson- lindenstrauss transform itself preserves differential privacy","author":"Blocki Jeremiah","key":"e_1_3_2_2_3_1","unstructured":"Jeremiah Blocki , Avrim Blum , Anupam Datta , and Or Sheffet . 2012. The johnson- lindenstrauss transform itself preserves differential privacy . In SFCS. IEEE , 410--419. Jeremiah Blocki, Avrim Blum, Anupam Datta, and Or Sheffet. 2012. The johnson- lindenstrauss transform itself preserves differential privacy. In SFCS. IEEE, 410--419."},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1162\/tacl_a_00051"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"crossref","unstructured":"Kseniya Buraya Aleksandr Farseev Andrey Filchenkov and Tat-Seng Chua. 2017. Towards user personality profiling from multiple social networks. In AAAI. 4909--4910.  Kseniya Buraya Aleksandr Farseev Andrey Filchenkov and Tat-Seng Chua. 2017. Towards user personality profiling from multiple social networks. In AAAI. 4909--4910.","DOI":"10.1609\/aaai.v31i1.11105"},{"volume-title":"Joint User Modeling Across Aligned Heterogeneous Sites Using Neural Networks","author":"Cao Xuezhi","key":"e_1_3_2_2_6_1","unstructured":"Xuezhi Cao and Yong Yu. 2017. Joint User Modeling Across Aligned Heterogeneous Sites Using Neural Networks . In ECML-PKDD. Springer , 799--815. Xuezhi Cao and Yong Yu. 2017. Joint User Modeling Across Aligned Heterogeneous Sites Using Neural Networks. In ECML-PKDD. Springer, 799--815."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3501816"},{"key":"e_1_3_2_2_8_1","volume-title":"Survey and open problems in privacy preserving knowledge graph: Merging, query, representation, completion and applications. arXiv preprint arXiv:2011.10180","author":"Chen Chaochao","year":"2020","unstructured":"Chaochao Chen , Jamie Cui , Guanfeng Liu , Jia Wu , and Li Wang . 2020. Survey and open problems in privacy preserving knowledge graph: Merging, query, representation, completion and applications. arXiv preprint arXiv:2011.10180 ( 2020 ). Chaochao Chen, Jamie Cui, Guanfeng Liu, Jia Wu, and Li Wang. 2020. Survey and open problems in privacy preserving knowledge graph: Merging, query, representation, completion and applications. arXiv preprint arXiv:2011.10180 (2020)."},{"key":"e_1_3_2_2_9_1","volume-title":"Arik Friedman, and Roksana Boreli.","author":"Chen Terence","year":"2012","unstructured":"Terence Chen , Mohamed Ali Kaafar , Arik Friedman, and Roksana Boreli. 2012 . Is more always merrier? A deep dive into online social footprints. In WOSN. 67--72. Terence Chen, Mohamed Ali Kaafar, Arik Friedman, and Roksana Boreli. 2012. Is more always merrier? A deep dive into online social footprints. In WOSN. 67--72."},{"key":"e_1_3_2_2_10_1","unstructured":"Xiaokai Chu Xinxin Fan Di Yao Zhihua Zhu Jianhui Huang and Jingping Bi. 2019. Cross-network embedding for multi-network alignment. In WWW. 273--284.  Xiaokai Chu Xinxin Fan Di Yao Zhihua Zhu Jianhui Huang and Jingping Bi. 2019. Cross-network embedding for multi-network alignment. In WWW. 273--284."},{"key":"e_1_3_2_2_11_1","volume-title":"Exploiting Data Sparsity in Secure Cross-Platform Social Recommendation. NIPS 34","author":"Cui Jinming","year":"2021","unstructured":"Jinming Cui , Chaochao Chen , Lingjuan Lyu , Carl Yang , and Wang Li. 2021. Exploiting Data Sparsity in Secure Cross-Platform Social Recommendation. NIPS 34 ( 2021 ). Jinming Cui, Chaochao Chen, Lingjuan Lyu, Carl Yang, and Wang Li. 2021. Exploiting Data Sparsity in Secure Cross-Platform Social Recommendation. NIPS 34 (2021)."},{"key":"e_1_3_2_2_12_1","volume-title":"Collecting telemetry data privately. NIPS 30","author":"Ding Bolin","year":"2017","unstructured":"Bolin Ding , Janardhan Kulkarni , and Sergey Yekhanin . 2017. Collecting telemetry data privately. NIPS 30 ( 2017 ). Bolin Ding, Janardhan Kulkarni, and Sergey Yekhanin. 2017. Collecting telemetry data privately. NIPS 30 (2017)."},{"volume-title":"Local privacy and statistical minimax rates","author":"Duchi John C","key":"e_1_3_2_2_13_1","unstructured":"John C Duchi , Michael I Jordan , and Martin J Wainwright . 2013. Local privacy and statistical minimax rates . In FOCS. IEEE , 429--438. John C Duchi, Michael I Jordan, and Martin J Wainwright. 2013. Local privacy and statistical minimax rates. In FOCS. IEEE, 429--438."},{"volume-title":"Calibrating noise to sensitivity in private data analysis","author":"Dwork Cynthia","key":"e_1_3_2_2_14_1","unstructured":"Cynthia Dwork , Frank McSherry , Kobbi Nissim , and Adam Smith . 2006. Calibrating noise to sensitivity in private data analysis . In TCC. Springer , 265--284. Cynthia Dwork, Frank McSherry, Kobbi Nissim, and Adam Smith. 2006. Calibrating noise to sensitivity in private data analysis. In TCC. Springer, 265--284."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660348"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"crossref","unstructured":"Oluwaseyi Feyisetan Borja Balle Thomas Drake and Tom Diethe. 2020. Privacy- and utility-preserving textual analysis via calibrated multivariate perturbations. In WSDM. 178--186.  Oluwaseyi Feyisetan Borja Balle Thomas Drake and Tom Diethe. 2020. Privacy- and utility-preserving textual analysis via calibrated multivariate perturbations. In WSDM. 178--186.","DOI":"10.1145\/3336191.3371856"},{"volume-title":"Leveraging hierarchical representations for preserving privacy and utility in text","author":"Feyisetan Oluwaseyi","key":"e_1_3_2_2_17_1","unstructured":"Oluwaseyi Feyisetan , Tom Diethe , and Thomas Drake . 2019. Leveraging hierarchical representations for preserving privacy and utility in text . In ICDM. IEEE , 210--219. Oluwaseyi Feyisetan, Tom Diethe, and Thomas Drake. 2019. Leveraging hierarchical representations for preserving privacy and utility in text. In ICDM. IEEE, 210--219."},{"key":"e_1_3_2_2_18_1","unstructured":"Tianxi Ji Changqing Luo Yifan Guo Jinlong Ji Weixian Liao and Pan Li. 2019. Differentially private community detection in attributed social networks. In ACML. PMLR 16--31.  Tianxi Ji Changqing Luo Yifan Guo Jinlong Ji Weixian Liao and Pan Li. 2019. Differentially private community detection in attributed social networks. In ACML. PMLR 16--31."},{"key":"e_1_3_2_2_19_1","volume-title":"Xing Xie, and Shiqiang Yang.","author":"Jiang Meng","year":"2016","unstructured":"Meng Jiang , Peng Cui , Nicholas Jing Yuan , Xing Xie, and Shiqiang Yang. 2016 . Little Is Much: Bridging Cross-Platform Behaviors through Overlapped Crowds. In AAAI , Vol. 30 . Meng Jiang, Peng Cui, Nicholas Jing Yuan, Xing Xie, and Shiqiang Yang. 2016. Little Is Much: Bridging Cross-Platform Behaviors through Overlapped Crowds. In AAAI, Vol. 30."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"crossref","unstructured":"Zach Jorgensen Ting Yu and Graham Cormode. 2016. Publishing attributed social graphs with formal privacy guarantees. In SIGMOD. 107--122.  Zach Jorgensen Ting Yu and Graham Cormode. 2016. Publishing attributed social graphs with formal privacy guarantees. In SIGMOD. 107--122.","DOI":"10.1145\/2882903.2915215"},{"key":"e_1_3_2_2_21_1","volume-title":"Many Facebook Users Are Sharing Less Content. Recuperado de https:\/\/www. emarketer. com\/content\/many-facebook-users-are-sharing-less-content-because-of-privacy-concerns","author":"Kats Rimma","year":"2018","unstructured":"Rimma Kats . 2018. Many Facebook Users Are Sharing Less Content. Recuperado de https:\/\/www. emarketer. com\/content\/many-facebook-users-are-sharing-less-content-because-of-privacy-concerns ( 2018 ). Rimma Kats. 2018. Many Facebook Users Are Sharing Less Content. Recuperado de https:\/\/www. emarketer. com\/content\/many-facebook-users-are-sharing-less-content-because-of-privacy-concerns (2018)."},{"key":"e_1_3_2_2_22_1","unstructured":"Guillaume Lample Alexis Conneau Marc'Aurelio Ranzato Ludovic Denoyer and Herv\u00e9 J\u00e9gou. 2018. Word translation without parallel data. In ICLR.  Guillaume Lample Alexis Conneau Marc'Aurelio Ranzato Ludovic Denoyer and Herv\u00e9 J\u00e9gou. 2018. Word translation without parallel data. In ICLR."},{"volume-title":"t-closeness: Privacy beyond k-anonymity and l-diversity","author":"Li Ninghui","key":"e_1_3_2_2_23_1","unstructured":"Ninghui Li , Tiancheng Li , and Suresh Venkatasubramanian . 2007. t-closeness: Privacy beyond k-anonymity and l-diversity . In ICDE. IEEE , 106--115. Ninghui Li, Tiancheng Li, and Suresh Venkatasubramanian. 2007. t-closeness: Privacy beyond k-anonymity and l-diversity. In ICDE. IEEE, 106--115."},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"crossref","unstructured":"Zhehan Liang Yu Rong Chenxin Li Yunlong Zhang Yue Huang Tingyang Xu Xinghao Ding and Junzhou Huang. 2021. Unsupervised Large-Scale Social Network Alignment via Cross Network Embedding. In CIKM. 1008--1017.  Zhehan Liang Yu Rong Chenxin Li Yunlong Zhang Yue Huang Tingyang Xu Xinghao Ding and Junzhou Huang. 2021. Unsupervised Large-Scale Social Network Alignment via Cross Network Embedding. In CIKM. 1008--1017.","DOI":"10.1145\/3459637.3482310"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2018.2819980"},{"volume-title":"Exploring user behaviour across multiple social networks","author":"Lim Bang Hui","key":"e_1_3_2_2_26_1","unstructured":"Bang Hui Lim , Dongyuan Lu , Tao Chen , and Min-Yen Kan . 2015. # mytweet via instagram : Exploring user behaviour across multiple social networks . In ASONAM. IEEE , 113--120. Bang Hui Lim, Dongyuan Lu, Tao Chen, and Min-Yen Kan. 2015. # mytweet via instagram: Exploring user behaviour across multiple social networks. In ASONAM. IEEE, 113--120."},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3331184.3331191"},{"key":"e_1_3_2_2_28_1","unstructured":"Li Liu William K Cheung Xin Li and Lejian Liao. 2016. Aligning Users across Social Networks Using Network Embedding. In IJCAI. 1774--1780.  Li Liu William K Cheung Xin Li and Lejian Liao. 2016. Aligning Users across Social Networks Using Network Embedding. In IJCAI. 1774--1780."},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"crossref","unstructured":"Meng Liu Hongyang Gao and Shuiwang Ji. 2020. Towards deeper graph neural networks. In SIGKDD. 338--348.  Meng Liu Hongyang Gao and Shuiwang Ji. 2020. Towards deeper graph neural networks. In SIGKDD. 338--348.","DOI":"10.1145\/3394486.3403076"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2018.11.104"},{"key":"e_1_3_2_2_31_1","volume-title":"Yu","author":"Liu Zhiwei","year":"2021","unstructured":"Zhiwei Liu , Liangwei Yang , Ziwei Fan , Hao Peng , and Philip S . Yu . 2021 . Federated social recommendation with graph neural network. ACM TIST ( 2021). Zhiwei Liu, Liangwei Yang, Ziwei Fan, Hao Peng, and Philip S. Yu. 2021. Federated social recommendation with graph neural network. ACM TIST (2021)."},{"key":"e_1_3_2_2_32_1","unstructured":"Wentian Lu and Gerome Miklau. 2014. Exponential random graph estimation under differential privacy. In SIGKDD. 921--930.  Wentian Lu and Gerome Miklau. 2014. Exponential random graph estimation under differential privacy. In SIGKDD. 921--930."},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.findings-emnlp.213"},{"key":"e_1_3_2_2_34_1","unstructured":"Lingjuan Lyu Yitong Li Xuanli He and Tong Xiao. 2020. Towards differentially private text representations. In SIGIR. 1813--1816.  Lingjuan Lyu Yitong Li Xuanli He and Tong Xiao. 2020. Towards differentially private text representations. In SIGIR. 1813--1816."},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2022.3177307"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1217299.1217302"},{"key":"e_1_3_2_2_37_1","first-page":"1823","article-title":"Predict anchor links across social networks via an embedding approach","volume":"16","author":"Man Tong","year":"2016","unstructured":"Tong Man , Huawei Shen , Shenghua Liu , Xiaolong Jin , and Xueqi Cheng . 2016 . Predict anchor links across social networks via an embedding approach . In IJCAI , Vol. 16. 1823 -- 1829 . Tong Man, Huawei Shen, Shenghua Liu, Xiaolong Jin, and Xueqi Cheng. 2016. Predict anchor links across social networks via an embedding approach. In IJCAI, Vol. 16. 1823--1829.","journal-title":"IJCAI"},{"key":"e_1_3_2_2_38_1","unstructured":"Tomas Mikolov Kai Chen Gregory S. Corrado and Jeffrey Dean. 2013. Efficient Estimation of Word Representations in Vector Space. In ICLR.  Tomas Mikolov Kai Chen Gregory S. Corrado and Jeffrey Dean. 2013. Efficient Estimation of Word Representations in Vector Space. In ICLR."},{"volume-title":"Deanonymizing social networks","author":"Narayanan Arvind","key":"e_1_3_2_2_39_1","unstructured":"Arvind Narayanan and Vitaly Shmatikov . 2009. Deanonymizing social networks . In SSP. IEEE , 173--187. Arvind Narayanan and Vitaly Shmatikov. 2009. Deanonymizing social networks. In SSP. IEEE, 173--187."},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1743546.1743558"},{"key":"e_1_3_2_2_41_1","first-page":"26","article-title":"Network structure release under differential privacy","volume":"9","author":"Nguyen Hiep","year":"2016","unstructured":"Hiep Nguyen , Abdessamad Imine , and Micha\u00ebl Rusinowitch . 2016 . Network structure release under differential privacy . Transactions on Data Privacy 9 , 3 (2016), 26 . Hiep Nguyen, Abdessamad Imine, and Micha\u00ebl Rusinowitch. 2016. Network structure release under differential privacy. Transactions on Data Privacy 9, 3 (2016), 26.","journal-title":"Transactions on Data Privacy"},{"volume-title":"Differ- entially private publication of social graphs at linear cost","author":"Nguyen Hiep H","key":"e_1_3_2_2_42_1","unstructured":"Hiep H Nguyen , Abdessamad Imine , and Micha\u00ebl Rusinowitch . 2015. Differ- entially private publication of social graphs at linear cost . In ASONAM. IEEE , 596--599. Hiep H Nguyen, Abdessamad Imine, and Micha\u00ebl Rusinowitch. 2015. Differ- entially private publication of social graphs at linear cost. In ASONAM. IEEE, 596--599."},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"crossref","unstructured":"Hao Peng Haoran Li Yangqiu Song Vincent Zheng and Jianxin Li. 2021. Differ- entially private federated knowledge graphs embedding. In CIKM. 1416--1425.  Hao Peng Haoran Li Yangqiu Song Vincent Zheng and Jianxin Li. 2021. Differ- entially private federated knowledge graphs embedding. In CIKM. 1416--1425.","DOI":"10.1145\/3459637.3482252"},{"key":"e_1_3_2_2_44_1","volume-title":"Glove: Global vectors for word representation. In EMNLP. 1532--1543.","author":"Pennington Jeffrey","year":"2014","unstructured":"Jeffrey Pennington , Richard Socher , and Christopher D Manning . 2014 . Glove: Global vectors for word representation. In EMNLP. 1532--1543. Jeffrey Pennington, Richard Socher, and Christopher D Manning. 2014. Glove: Global vectors for word representation. In EMNLP. 1532--1543."},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623732"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"crossref","unstructured":"Fuxin Ren Zhongbao Zhang Jiawei Zhang Sen Su Li Sun Guozhen Zhu and Congying Guo. 2020. BANANA: when Behavior ANAlysis meets social Network Alignment. In IJCAI. 1438--1444.  Fuxin Ren Zhongbao Zhang Jiawei Zhang Sen Su Li Sun Guozhen Zhu and Congying Guo. 2020. BANANA: when Behavior ANAlysis meets social Network Alignment. In IJCAI. 1438--1444.","DOI":"10.24963\/ijcai.2020\/200"},{"key":"e_1_3_2_2_47_1","volume-title":"Simhash: Hash-based similarity detection. Technical report, Google","author":"Sadowski Caitlin","year":"2007","unstructured":"Caitlin Sadowski and Greg Levin . 2007 . Simhash: Hash-based similarity detection. Technical report, Google (2007). Caitlin Sadowski and Greg Levin. 2007. Simhash: Hash-based similarity detection. Technical report, Google (2007)."},{"key":"e_1_3_2_2_48_1","unstructured":"Alessandra Sala Xiaohan Zhao Christo Wilson Haitao Zheng and Ben Y Zhao. 2011. Sharing graphs using differentially private graph models. In SIGCOMM. 81--98.  Alessandra Sala Xiaohan Zhao Christo Wilson Haitao Zheng and Ben Y Zhao. 2011. Sharing graphs using differentially private graph models. In SIGCOMM. 81--98."},{"key":"e_1_3_2_2_49_1","volume-title":"Ivan Titov, and Max Welling.","author":"Schlichtkrull Michael","year":"2018","unstructured":"Michael Schlichtkrull , Thomas N Kipf , Peter Bloem , Rianne Van Den Berg , Ivan Titov, and Max Welling. 2018 . Modeling relational data with graph convolutional networks. In ESWC. Springer , 593--607. Michael Schlichtkrull, Thomas N Kipf, Peter Bloem, Rianne Van Den Berg, Ivan Titov, and Max Welling. 2018. Modeling relational data with graph convolutional networks. In ESWC. Springer, 593--607."},{"key":"e_1_3_2_2_50_1","first-page":"557","article-title":"k-anonymity: A model for protecting privacy","volume":"10","author":"Sweeney Latanya","year":"2002","unstructured":"Latanya Sweeney . 2002 . k-anonymity: A model for protecting privacy . IJUFKS 10 , 05 (2002), 557 -- 570 . Latanya Sweeney. 2002. k-anonymity: A model for protecting privacy. IJUFKS 10, 05 (2002), 557--570.","journal-title":"IJUFKS"},{"key":"e_1_3_2_2_51_1","volume-title":"Mehmet Emre Gursoy, and Wenqi Wei","author":"Truex Stacey","year":"2020","unstructured":"Stacey Truex , Ling Liu , Ka-Ho Chow , Mehmet Emre Gursoy, and Wenqi Wei . 2020 . LDP-Fed: Federated learning with local differential privacy. In EdgeSys . 61--66. Stacey Truex, Ling Liu, Ka-Ho Chow, Mehmet Emre Gursoy, and Wenqi Wei. 2020. LDP-Fed: Federated learning with local differential privacy. In EdgeSys. 61--66."},{"key":"e_1_3_2_2_52_1","unstructured":"Tianhao Wang Jeremiah Blocki Ninghui Li and Somesh Jha. 2017. Locally differentially private protocols for frequency estimation. In USENIX Security 17. 729--745.  Tianhao Wang Jeremiah Blocki Ninghui Li and Somesh Jha. 2017. Locally differentially private protocols for frequency estimation. In USENIX Security 17. 729--745."},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.5555\/2612167.2612168"},{"key":"e_1_3_2_2_54_1","volume-title":"Differentially Private Attributed Network Releasing Based on Early Fusion. Security and Communication Networks 2021","author":"Wang Yuye","year":"2021","unstructured":"Yuye Wang , Jing Yang , and Jianpei Zhan . 2021. Differentially Private Attributed Network Releasing Based on Early Fusion. Security and Communication Networks 2021 ( 2021 ). Yuye Wang, Jing Yang, and Jianpei Zhan. 2021. Differentially Private Attributed Network Releasing Based on Early Fusion. Security and Communication Networks 2021 (2021)."},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"crossref","unstructured":"Qian Xiao Rui Chen and Kian-Lee Tan. 2014. Differentially private network data release via structural inference. In SIGKDD. 911--920.  Qian Xiao Rui Chen and Kian-Lee Tan. 2014. Differentially private network data release via structural inference. In SIGKDD. 911--920.","DOI":"10.1145\/2623330.2623642"},{"key":"e_1_3_2_2_56_1","first-page":"4788","article-title":"Privacy-Preserving Federated Depression Detection From Multisource Mobile Health Data","volume":"18","author":"Xu Xiaohang","year":"2021","unstructured":"Xiaohang Xu , Hao Peng , Md Zakirul Alam Bhuiyan , Zhifeng Hao , Lianzhong Liu , Lichao Sun , and Lifang He . 2021 . Privacy-Preserving Federated Depression Detection From Multisource Mobile Health Data . IEEE ISSN 18 , 7 (2021), 4788 -- 4797 . Xiaohang Xu, Hao Peng, Md Zakirul Alam Bhuiyan, Zhifeng Hao, Lianzhong Liu, Lichao Sun, and Lifang He. 2021. Privacy-Preserving Federated Depression Detection From Multisource Mobile Health Data. IEEE ISSN 18, 7 (2021), 4788--4797.","journal-title":"IEEE ISSN"},{"volume-title":"Friend transfer: Cold-start friend recommendation with cross-platform transfer learning of social knowledge","author":"Yan Ming","key":"e_1_3_2_2_57_1","unstructured":"Ming Yan , Jitao Sang , Tao Mei , and Changsheng Xu. 2013. Friend transfer: Cold-start friend recommendation with cross-platform transfer learning of social knowledge . In ICME. IEEE , 1--6. Ming Yan, Jitao Sang, Tao Mei, and Changsheng Xu. 2013. Friend transfer: Cold-start friend recommendation with cross-platform transfer learning of social knowledge. In ICME. IEEE, 1--6."},{"key":"e_1_3_2_2_58_1","first-page":"1","article-title":"A unified video recommendation by cross-network user modeling","volume":"12","author":"Yan Ming","year":"2016","unstructured":"Ming Yan , Jitao Sang , Changsheng Xu , and M Shamim Hossain . 2016 . A unified video recommendation by cross-network user modeling . TOMM 12 , 4 (2016), 1 -- 24 . Ming Yan, Jitao Sang, Changsheng Xu, and M Shamim Hossain. 2016. A unified video recommendation by cross-network user modeling. TOMM 12, 4 (2016), 1--24.","journal-title":"TOMM"},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"crossref","unstructured":"Carl Yang Haonan Wang Ke Zhang Liang Chen and Lichao Sun. 2021. Secure Deep Graph Generation with Link Differential Privacy. In IJCAI. 3271--3278.  Carl Yang Haonan Wang Ke Zhang Liang Chen and Lichao Sun. 2021. Secure Deep Graph Generation with Link Differential Privacy. In IJCAI. 3271--3278.","DOI":"10.24963\/ijcai.2021\/450"},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3404835.3463028"},{"volume-title":"Differential Privacy-Preserving User Linkage across Online Social Networks","author":"Yao Xin","key":"e_1_3_2_2_61_1","unstructured":"Xin Yao , Rui Zhang , and Yanchao Zhang . 2021. Differential Privacy-Preserving User Linkage across Online Social Networks . In IWQOS. IEEE , 1--10. Xin Yao, Rui Zhang, and Yanchao Zhang. 2021. Differential Privacy-Preserving User Linkage across Online Social Networks. In IWQOS. IEEE, 1--10."},{"key":"e_1_3_2_2_62_1","volume-title":"Chow","author":"Yue Xiang","year":"2021","unstructured":"Xiang Yue , Minxin Du , Tianhao Wang , Yaliang Li , Huan Sun , and Sherman S. M . Chow . 2021 . Differential Privacy for Text Analytics via Natural Text Sanitization. In ACL-IJCNLP. Xiang Yue, Minxin Du, Tianhao Wang, Yaliang Li, Huan Sun, and Sherman S. M. Chow. 2021. Differential Privacy for Text Analytics via Natural Text Sanitization. In ACL-IJCNLP."},{"key":"e_1_3_2_2_63_1","volume-title":"Yu","author":"Zhang Jiawei","year":"2013","unstructured":"Jiawei Zhang , Xiangnan Kong , and Philip S . Yu . 2013 . Predicting social links for new users across aligned heterogeneous social networks. In ICDM. IEEE , 1289--1294. Jiawei Zhang, Xiangnan Kong, and Philip S. Yu. 2013. Predicting social links for new users across aligned heterogeneous social networks. In ICDM. IEEE, 1289--1294."},{"key":"e_1_3_2_2_64_1","volume-title":"Yu","author":"Zhang Jiawei","year":"2017","unstructured":"Jiawei Zhang , Congying Xia , Chenwei Zhang , Limeng Cui , Yanjie Fu , and Philip S . Yu . 2017 . BL-MNE: emerging heterogeneous social network embedding through broad learning with aligned autoencoder. In ICDM. IEEE , 605--614. Jiawei Zhang, Congying Xia, Chenwei Zhang, Limeng Cui, Yanjie Fu, and Philip S. Yu. 2017. BL-MNE: emerging heterogeneous social network embedding through broad learning with aligned autoencoder. In ICDM. IEEE, 605--614."},{"key":"e_1_3_2_2_65_1","doi-asserted-by":"crossref","unstructured":"Shijie Zhang Hongzhi Yin Tong Chen Zi Huang Lizhen Cui and Xiangliang Zhang. 2021. Graph Embedding for Recommendation against Attribute Inference Attacks. In WWW. 3002--3014.  Shijie Zhang Hongzhi Yin Tong Chen Zi Huang Lizhen Cui and Xiangliang Zhang. 2021. Graph Embedding for Recommendation against Attribute Inference Attacks. In WWW. 3002--3014.","DOI":"10.1145\/3442381.3449813"},{"key":"e_1_3_2_2_66_1","doi-asserted-by":"crossref","unstructured":"Wei Zhang Wen Wang Jun Wang and Hongyuan Zha. 2018. User-guided hierarchical attention network for multi-modal social image popularity prediction. In WWW. 1277--1286.  Wei Zhang Wen Wang Jun Wang and Hongyuan Zha. 2018. User-guided hierarchical attention network for multi-modal social image popularity prediction. In WWW. 1277--1286.","DOI":"10.1145\/3178876.3186026"},{"key":"e_1_3_2_2_67_1","volume-title":"Vertically federated graph neural network for privacy-preserving node classification. arXiv preprint arXiv:2005.11903","author":"Zhou Jun","year":"2020","unstructured":"Jun Zhou , Chaochao Chen , Longfei Zheng , Huiwen Wu , Jia Wu , Xiaolin Zheng , Bingzhe Wu , Ziqi Liu , and Li Wang . 2020. Vertically federated graph neural network for privacy-preserving node classification. arXiv preprint arXiv:2005.11903 ( 2020 ). Jun Zhou, Chaochao Chen, Longfei Zheng, Huiwen Wu, Jia Wu, Xiaolin Zheng, Bingzhe Wu, Ziqi Liu, and Li Wang. 2020. Vertically federated graph neural network for privacy-preserving node classification. arXiv preprint arXiv:2005.11903 (2020)."}],"event":{"name":"CIKM '22: The 31st ACM International Conference on Information and Knowledge Management","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGIR ACM Special Interest Group on Information Retrieval"],"location":"Atlanta GA USA","acronym":"CIKM '22"},"container-title":["Proceedings of the 31st ACM International Conference on Information &amp; Knowledge Management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3511808.3557278","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3511808.3557278","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:49:28Z","timestamp":1750182568000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3511808.3557278"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,17]]},"references-count":67,"alternative-id":["10.1145\/3511808.3557278","10.1145\/3511808"],"URL":"https:\/\/doi.org\/10.1145\/3511808.3557278","relation":{},"subject":[],"published":{"date-parts":[[2022,10,17]]},"assertion":[{"value":"2022-10-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}