{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T06:37:03Z","timestamp":1764571023537,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,6,29]],"date-time":"2022-06-29T00:00:00Z","timestamp":1656460800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,6,29]]},"DOI":"10.1145\/3529190.3534768","type":"proceedings-article","created":{"date-parts":[[2022,7,11]],"date-time":"2022-07-11T17:06:00Z","timestamp":1657559160000},"page":"446-454","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Towards Private Medical Data Donations by Using Privacy Preserving Technologies"],"prefix":"10.1145","author":[{"given":"Arno","family":"Appenzeller","sequence":"first","affiliation":[{"name":"Karlsruhe Institute of Technology, Germany"}]},{"given":"Nick","family":"Terzer","sequence":"additional","affiliation":[{"name":"Karlsruhe Institute of Technology, Germany"}]},{"given":"Erik","family":"Krempel","sequence":"additional","affiliation":[{"name":"Fraunhofer IOSB, Germany"}]},{"given":"J\u00fcrgen","family":"Beyerer","sequence":"additional","affiliation":[{"name":"Fraunhofer IOSB, Germany"}]}],"member":"320","published-online":{"date-parts":[[2022,7,11]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Yves-Alexandre de\u00a0Montjoye\u00a0et al.2013. Unique in the Crowd: The privacy bounds of human mobility. Scientific Reports 3(2013).  Yves-Alexandre de\u00a0Montjoye\u00a0et al.2013. Unique in the Crowd: The privacy bounds of human mobility. Scientific Reports 3(2013).","DOI":"10.1038\/srep01376"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1080\/02640414.2020.1855869"},{"volume-title":"Theory of cryptography conference","author":"Dwork Cynthia","key":"e_1_3_2_1_4_1","unstructured":"Cynthia Dwork , Frank McSherry , Kobbi Nissim , and Adam Smith . 2006. Calibrating noise to sensitivity in private data analysis . In Theory of cryptography conference . Springer , 265\u2013284. Cynthia Dwork, Frank McSherry, Kobbi Nissim, and Adam Smith. 2006. Calibrating noise to sensitivity in private data analysis. In Theory of cryptography conference. Springer, 265\u2013284."},{"key":"e_1_3_2_1_5_1","first-page":"3","article-title":"The algorithmic foundations of differential privacy.Found","volume":"9","author":"Dwork Cynthia","year":"2014","unstructured":"Cynthia Dwork , Aaron Roth , 2014 . The algorithmic foundations of differential privacy.Found . Trends Theor. Comput. Sci. 9 , 3 - 4 (2014), 211\u2013407. Cynthia Dwork, Aaron Roth, 2014. The algorithmic foundations of differential privacy.Found. Trends Theor. Comput. Sci. 9, 3-4 (2014), 211\u2013407.","journal-title":"Trends Theor. Comput. Sci."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660348"},{"key":"#cr-split#-e_1_3_2_1_7_1.1","unstructured":"Robert Furberg Julia Brinton Michael Keating and Alexa Ortiz. 2016. Crowd-sourced Fitbit datasets 03.12.2016-05.12.2016. https:\/\/doi.org\/10.5281\/zenodo.53894 10.5281\/zenodo.53894"},{"key":"#cr-split#-e_1_3_2_1_7_1.2","unstructured":"Robert Furberg Julia Brinton Michael Keating and Alexa Ortiz. 2016. Crowd-sourced Fitbit datasets 03.12.2016-05.12.2016. https:\/\/doi.org\/10.5281\/zenodo.53894"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376651"},{"volume-title":"Evaluating the Utility of Differential Privacy: A Use Case Study of a Behavioral Science Dataset","author":"Hill Raquel","key":"e_1_3_2_1_9_1","unstructured":"Raquel Hill . 2015. Evaluating the Utility of Differential Privacy: A Use Case Study of a Behavioral Science Dataset . Springer International Publishing , Cham , 59\u201382. https:\/\/doi.org\/10.1007\/978-3-319-23633-9_4 10.1007\/978-3-319-23633-9_4 Raquel Hill. 2015. Evaluating the Utility of Differential Privacy: A Use Case Study of a Behavioral Science Dataset. Springer International Publishing, Cham, 59\u201382. https:\/\/doi.org\/10.1007\/978-3-319-23633-9_4"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2916503"},{"key":"e_1_3_2_1_11_1","volume-title":"Privacy-preserving aggregation of personal health data streams. PLOS ONE 13, 11 (11","author":"Kim Jong\u00a0Wook","year":"2018","unstructured":"Jong\u00a0Wook Kim , Beakcheol Jang , and Hoon Yoo . 2018. Privacy-preserving aggregation of personal health data streams. PLOS ONE 13, 11 (11 2018 ), 1\u201315. https:\/\/doi.org\/10.1371\/journal.pone.0207639 10.1371\/journal.pone.0207639 Jong\u00a0Wook Kim, Beakcheol Jang, and Hoon Yoo. 2018. Privacy-preserving aggregation of personal health data streams. PLOS ONE 13, 11 (11 2018), 1\u201315. https:\/\/doi.org\/10.1371\/journal.pone.0207639"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-016-0462-0"},{"key":"e_1_3_2_1_13_1","unstructured":"Yunhui Long Suxin Lin Zhuolin Yang Carl\u00a0A. Gunter and Bo Li. 2019. Scalable Differentially Private Generative Student Model via PATE. CoRR abs\/1906.09338(2019). arXiv:1906.09338http:\/\/arxiv.org\/abs\/1906.09338  Yunhui Long Suxin Lin Zhuolin Yang Carl\u00a0A. Gunter and Bo Li. 2019. Scalable Differentially Private Generative Student Model via PATE. CoRR abs\/1906.09338(2019). arXiv:1906.09338http:\/\/arxiv.org\/abs\/1906.09338"},{"key":"e_1_3_2_1_14_1","volume-title":"5555. Data Level Privacy Preserving: A Stochastic Perturbation Approach based on Differential Privacy","author":"Ma C.","year":"2021","unstructured":"C. Ma , L. Yuan , L. Han , M. Ding , R. Bhaskar , and J. Li . 5555. Data Level Privacy Preserving: A Stochastic Perturbation Approach based on Differential Privacy . IEEE Transactions on Knowledge and Data Engineering 01 (dec 5555), 1\u20131. https:\/\/doi.org\/10.1109\/TKDE. 2021 .3137047 10.1109\/TKDE.2021.3137047 C. Ma, L. Yuan, L. Han, M. Ding, R. Bhaskar, and J. Li. 5555. Data Level Privacy Preserving: A Stochastic Perturbation Approach based on Differential Privacy. IEEE Transactions on Knowledge and Data Engineering01 (dec 5555), 1\u20131. https:\/\/doi.org\/10.1109\/TKDE.2021.3137047"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/S2589-7500(19)30222-5"},{"key":"#cr-split#-e_1_3_2_1_16_1.1","doi-asserted-by":"crossref","unstructured":"Latanya Sweeney. 2013. Matching known patients to health records in Washington State data. (2013). https:\/\/doi.org\/10.2139\/ssrn.2289850 10.2139\/ssrn.2289850","DOI":"10.2139\/ssrn.2289850"},{"key":"#cr-split#-e_1_3_2_1_16_1.2","doi-asserted-by":"crossref","unstructured":"Latanya Sweeney. 2013. Matching known patients to health records in Washington State data. (2013). https:\/\/doi.org\/10.2139\/ssrn.2289850","DOI":"10.2139\/ssrn.2289850"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1136\/bjsports-2017-097628"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1139\/h05-147"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/CompComm.2018.8780925"},{"key":"e_1_3_2_1_20_1","volume-title":"Randomized response: A survey technique for eliminating evasive answer bias. 60, 309","author":"Warner L","year":"1965","unstructured":"Stanley\u00a0 L Warner . 1965. Randomized response: A survey technique for eliminating evasive answer bias. 60, 309 ( 1965 ), 63\u201369. Stanley\u00a0L Warner. 1965. Randomized response: A survey technique for eliminating evasive answer bias. 60, 309 (1965), 63\u201369."}],"event":{"name":"PETRA '22: The15th International Conference on PErvasive Technologies Related to Assistive Environments","acronym":"PETRA '22","location":"Corfu Greece"},"container-title":["Proceedings of the 15th International Conference on PErvasive Technologies Related to Assistive Environments"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3529190.3534768","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3529190.3534768","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:02:20Z","timestamp":1750186940000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3529190.3534768"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,29]]},"references-count":22,"alternative-id":["10.1145\/3529190.3534768","10.1145\/3529190"],"URL":"https:\/\/doi.org\/10.1145\/3529190.3534768","relation":{},"subject":[],"published":{"date-parts":[[2022,6,29]]},"assertion":[{"value":"2022-07-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}