{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:55:07Z","timestamp":1750308907139,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,10,21]],"date-time":"2022-10-21T00:00:00Z","timestamp":1666310400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,10,21]]},"DOI":"10.1145\/3573428.3573784","type":"proceedings-article","created":{"date-parts":[[2023,3,15]],"date-time":"2023-03-15T10:43:09Z","timestamp":1678876989000},"page":"1670-1674","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Study of a two-level variable model optimization algorithm based on differential privacy"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9752-7324","authenticated-orcid":false,"given":"Pengfei","family":"Wang","sequence":"first","affiliation":[{"name":"College of Computer Science, Jiangsu University of Science and Technology, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9389-7280","authenticated-orcid":false,"given":"Xun","family":"Wang","sequence":"additional","affiliation":[{"name":"College of Computer Science, Jiangsu University of Science and Technology, China"}]}],"member":"320","published-online":{"date-parts":[[2023,3,15]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1080\/02664763.2019.1637829"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1142\/S021848850200165X"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11280-021-00922-2"},{"key":"e_1_3_2_1_4_1","volume-title":"MD5, and DES[C]\/\/International Conference on Public Policy, Social Computing and Development 2017 (ICOPOSDev","author":"Dhany H W","year":"2017","unstructured":"Dhany H W, Izhari F, Fahmi H, Encryption and decryption using password based encryption, MD5, and DES[C]\/\/International Conference on Public Policy, Social Computing and Development 2017 (ICOPOSDev 2017). Atlantis Press, 2017: 278-283."},{"key":"e_1_3_2_1_5_1","first-page":"1","volume-title":"33rd International Colloquium on Automata, Languages and Programming","author":"Dwork C.","year":"2006","unstructured":"Dwork C. Differential privacy [C]\/\/Proceedings of the 33rd International Colloquium on Automata, Languages and Programming. Venice, Italy, 2006, 1-12."},{"key":"e_1_3_2_1_6_1","volume-title":"Differential privacy: on the trade-off between utility and information leakage[C]\/\/International Workshop on Formal Aspects in Security and Trust","author":"Alvim M S","year":"2011","unstructured":"Alvim M S, Andr\u00e9s M E, Chatzikokolakis K, Differential privacy: on the trade-off between utility and information leakage[C]\/\/International Workshop on Formal Aspects in Security and Trust. Springer, Berlin, Heidelberg, 2011: 39-54."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866739.1866758"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2775051.2677005"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3341697","article-title":"A three-level logic for differential privacy[J]","volume":"3","author":"Zhang H","year":"2019","unstructured":"Zhang H, Roth E, Haeberlen A, Fuzzi: A three-level logic for differential privacy[J]. Proceedings of the ACM on Programming Languages, 2019, 3(ICFP): 1-28.","journal-title":"Proceedings of the ACM on Programming Languages"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1111\/1740-9713.01528"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.3390\/ijgi10070454"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2018.2845388"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1111\/rssb.12454"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Abadi M Chu A Goodfellow I Deep learning with differential privacy[C]\/\/Proceedings of the 2016 ACM SIGSAC conference on computer and communications security. 2016: 308-318.","DOI":"10.1145\/2976749.2978318"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1198\/004017001750386279"},{"key":"e_1_3_2_1_16_1","volume-title":"Chinese text sentiment analysis using LSTM network based on L2 and Nadam [C]\/\/2017 IEEE 17th International Conference on Communication Technology (ICCT)","author":"Wang J","year":"2017","unstructured":"Wang J, Cao Z. Chinese text sentiment analysis using LSTM network based on L2 and Nadam [C]\/\/2017 IEEE 17th International Conference on Communication Technology (ICCT). IEEE, 2017: 1891-1895."},{"key":"e_1_3_2_1_17_1","volume-title":"Automatic knee osteoarthritis diagnosis from plain radiographs: a deep learning-based approach[J]. Scientific reports","author":"Tiulpin A","year":"2018","unstructured":"Tiulpin A, Thevenot J, Rahtu E, Automatic knee osteoarthritis diagnosis from plain radiographs: a deep learning-based approach[J]. Scientific reports, 2018, 8(1): 1-10."}],"event":{"name":"EITCE 2022: 2022 6th International Conference on Electronic Information Technology and Computer Engineering","acronym":"EITCE 2022","location":"Xiamen China"},"container-title":["Proceedings of the 2022 6th International Conference on Electronic Information Technology and Computer Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3573428.3573784","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3573428.3573784","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T21:26:11Z","timestamp":1750281971000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3573428.3573784"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,21]]},"references-count":17,"alternative-id":["10.1145\/3573428.3573784","10.1145\/3573428"],"URL":"https:\/\/doi.org\/10.1145\/3573428.3573784","relation":{},"subject":[],"published":{"date-parts":[[2022,10,21]]},"assertion":[{"value":"2023-03-15","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}