{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:17:11Z","timestamp":1750220231344,"version":"3.41.0"},"reference-count":17,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["XRDS"],"published-print":{"date-parts":[[2022,3]]},"abstract":"<jats:p>With the worldwide emergence of data protection regulations, how to conduct law-regulated big data analytics becomes a challenging and fundamental problem. This article introduces the principle of least sensing, a promising sensing paradigm toward legally regulated big data analytics.<\/jats:p>","DOI":"10.1145\/3522696","type":"journal-article","created":{"date-parts":[[2022,4,7]],"date-time":"2022-04-07T23:08:32Z","timestamp":1649372912000},"page":"56-59","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["The principle of least sensing"],"prefix":"10.1145","volume":"28","author":[{"given":"Leye","family":"Wang","sequence":"first","affiliation":[{"name":"Peking University, Hong Kong University of Science and Technology"}]}],"member":"320","published-online":{"date-parts":[[2022,4,7]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2289850"},{"key":"e_1_2_1_2_1","volume-title":"et al. The rise of people-centric sensing","author":"Campbell A. T.","year":"2008","unstructured":"Campbell , A. T. et al. The rise of people-centric sensing . IEEE internet Computing 12, 4 ( 2008 ), 12--21. Campbell, A. T. et al. The rise of people-centric sensing. IEEE internet Computing 12, 4 (2008), 12--21."},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2018.1151018"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1975.9939"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2014.6871668"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2011.6069707"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2448096.2448107"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2016.7509395"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.06.010"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487575.2488188"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2750858.2807513"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155516"},{"key":"e_1_2_1_13_1","first-page":"89","article-title":"WiBorder: Precise Wi-Fi based boundary sensing via through-wall discrimination. Proc. ACM interact","volume":"4","author":"Li S.","year":"2020","unstructured":"Li , S. , Liu , Z. , Zhang , Y. , Lv , Q. , Niu , X. , Wang , L. , and Zhang , D . WiBorder: Precise Wi-Fi based boundary sensing via through-wall discrimination. Proc. ACM interact . Mob. Wearable Ubiquitous Technol. , 4 , 89 ( 2020 ), 1--89:30. Li, S., Liu, Z., Zhang, Y., Lv, Q., Niu, X., Wang, L., and Zhang, D. WiBorder: Precise Wi-Fi based boundary sensing via through-wall discrimination. Proc. ACM interact. Mob. Wearable Ubiquitous Technol., 4, 89 (2020), 1--89:30.","journal-title":"Mob. Wearable Ubiquitous Technol."},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1218772110"},{"key":"e_1_2_1_15_1","first-page":"45","article-title":"Is hidden safe? Location protection against machine-learning prediction attacks in social networks","author":"Han X.","year":"2021","unstructured":"Han , X. , Wang , L. , and Fan , W . Is hidden safe? Location protection against machine-learning prediction attacks in social networks . MIS Q. , 45 ( 2021 ). Han, X., Wang, L., and Fan, W. Is hidden safe? Location protection against machine-learning prediction attacks in social networks. MIS Q., 45 (2021).","journal-title":"MIS Q."},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.33"},{"key":"e_1_2_1_17_1","volume-title":"Building an Anonymization Pipeline: Creating Safe Data","author":"Arbuckle L.","year":"2020","unstructured":"Arbuckle , L. and El Emam , K. Building an Anonymization Pipeline: Creating Safe Data . O'Reilly Media , 2020 . Arbuckle, L. and El Emam, K. Building an Anonymization Pipeline: Creating Safe Data. O'Reilly Media, 2020."}],"container-title":["XRDS: Crossroads, The ACM Magazine for Students"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3522696","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3522696","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:15Z","timestamp":1750188615000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3522696"}},"subtitle":["a privacy-friendly sensing paradigm for urban big data analytics"],"short-title":[],"issued":{"date-parts":[[2022,3]]},"references-count":17,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2022,3]]}},"alternative-id":["10.1145\/3522696"],"URL":"https:\/\/doi.org\/10.1145\/3522696","relation":{},"ISSN":["1528-4972","1528-4980"],"issn-type":[{"type":"print","value":"1528-4972"},{"type":"electronic","value":"1528-4980"}],"subject":[],"published":{"date-parts":[[2022,3]]},"assertion":[{"value":"2022-04-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}