{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:09:47Z","timestamp":1750219787677,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":8,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,1,4]],"date-time":"2023-01-04T00:00:00Z","timestamp":1672790400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,1,4]]},"DOI":"10.1145\/3570991.3571020","type":"proceedings-article","created":{"date-parts":[[2023,1,5]],"date-time":"2023-01-05T04:13:03Z","timestamp":1672891983000},"page":"286-287","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Techniques for Privacy-Preserving Data Aggregation in an Untrusted Distributed Environment"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7558-3779","authenticated-orcid":false,"given":"Snehkumar","family":"Shahani","sequence":"first","affiliation":[{"name":"Dept of Technology, Savitribai Phule Pune University, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2807-9967","authenticated-orcid":false,"given":"Jibi","family":"Abraham","sequence":"additional","affiliation":[{"name":"Dept of Computer and IT, College of Engineering, Pune, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6247-3493","authenticated-orcid":false,"family":"Venkateswaran","sequence":"additional","affiliation":[{"name":"Persistent Systems Ltd, India"}]}],"member":"320","published-online":{"date-parts":[[2023,1,4]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2882903.2882931"},{"volume-title":"Information Security","author":"Lee Jaewoo","key":"e_1_3_2_1_2_1","unstructured":"Jaewoo Lee and Chris Clifton. 2011. How Much Is Enough? Choosing \u03f5 for Differential Privacy. In Information Security, Xuejia Lai, Jianying Zhou, and Hui Li (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 325\u2013340."},{"key":"e_1_3_2_1_3_1","unstructured":"M. Lichman. 2013. UCI Machine Learning Repository."},{"key":"e_1_3_2_1_4_1","unstructured":"UK\u00a0Power Networks. 2014. Smart meters in London. https:\/\/www.kaggle.com\/hsankesara\/time-series-forecasting-using-seasonal-arima\/data"},{"key":"e_1_3_2_1_5_1","volume-title":"International Conference on Management of Data.","author":"Shahani Snehkumar","year":"2017","unstructured":"Snehkumar Shahani, Jibi Abraham, and R Venkateswaran. 2017. Distributed Data Aggregation with Privacy Preservation at Endpoint. In International Conference on Management of Data."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Snehkumar Shahani Jibi Abraham and R Venkateswaran. 2021. Selection and Verification of Privacy Parameters for Local Differentially Privacy Data Aggregation. (2021) 10.","DOI":"10.1145\/3471287.3471306"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102144"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Niramay Vaidya Srishti Shelke Snehkumar Shahani and Jibi Abraham. 2021. Validation and Feasibility of Differentially Private Local Aggregation of Real-Time Data Streams from Resource-Constrained Healthcare IoT Edge Devices. (2021).","DOI":"10.1007\/978-981-16-0666-3_50"}],"event":{"name":"CODS-COMAD 2023: 6th Joint International Conference on Data Science & Management of Data (10th ACM IKDD CODS and 28th COMAD)","acronym":"CODS-COMAD 2023","location":"Mumbai India"},"container-title":["Proceedings of the 6th Joint International Conference on Data Science &amp; Management of Data (10th ACM IKDD CODS and 28th COMAD)"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3570991.3571020","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3570991.3571020","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:37:53Z","timestamp":1750178273000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3570991.3571020"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1,4]]},"references-count":8,"alternative-id":["10.1145\/3570991.3571020","10.1145\/3570991"],"URL":"https:\/\/doi.org\/10.1145\/3570991.3571020","relation":{},"subject":[],"published":{"date-parts":[[2023,1,4]]},"assertion":[{"value":"2023-01-04","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}