{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:02:02Z","timestamp":1750309322328,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,4,8]],"date-time":"2024-04-08T00:00:00Z","timestamp":1712534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"European Union - NextGenerationEU","award":["CN_00000013","CUP D13C22001340001"],"award-info":[{"award-number":["CN_00000013","CUP D13C22001340001"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,4,8]]},"DOI":"10.1145\/3605098.3636024","type":"proceedings-article","created":{"date-parts":[[2024,5,21]],"date-time":"2024-05-21T17:59:16Z","timestamp":1716314356000},"page":"1415-1424","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Collection and Analysis of Sensitive Data with Privacy Protection by a Distributed Randomized Response Protocol"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0978-0691","authenticated-orcid":false,"given":"Faisal","family":"Imran","sequence":"first","affiliation":[{"name":"Department of Software Engineering, Bahria University, Islamabad, Pakistan"},{"name":"Computer Science, University of Torino, Torino, Torino, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0434-4850","authenticated-orcid":false,"given":"Rosa","family":"Meo","sequence":"additional","affiliation":[{"name":"Computer Science, University of Torino, Torino, Torino, Italy"}]}],"member":"320","published-online":{"date-parts":[[2024,5,21]]},"reference":[{"volume-title":"An introduction to categorical data analysis","author":"Agresti Alan","unstructured":"Alan Agresti. 2018. An introduction to categorical data analysis. John Wiley & Sons.","key":"e_1_3_2_1_1_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.1145\/1265530.1265569"},{"key":"e_1_3_2_1_3_1","volume-title":"Practical locally private heavy hitters. arXiv preprint arXiv:1707.04982","author":"Bassily Raef","year":"2017","unstructured":"Raef Bassily, Kobbi Nissim, Uri Stemmer, and Abhradeep Thakurta. 2017. Practical locally private heavy hitters. arXiv preprint arXiv:1707.04982 (2017)."},{"doi-asserted-by":"crossref","unstructured":"T. Bedford and R. M. Cooke. 2001. Probability density decomposition for conditionally dependent random variables modeled by vines. Annals of Mathematics and Artificial intelligence (2001) 245--268.","key":"e_1_3_2_1_4_1","DOI":"10.1023\/A:1016725902970"},{"key":"e_1_3_2_1_5_1","volume-title":"R Martin Chavez, and Gregory F Cooper.","author":"Beinlich Ingo A","year":"1989","unstructured":"Ingo A Beinlich, Henri Jacques Suermondt, R Martin Chavez, and Gregory F Cooper. 1989. The ALARM monitoring system: A case study with two probabilistic inference techniques for belief networks. In AIME 89. Springer, 247--256."},{"volume-title":"Convex optimization","author":"Boyd Stephen","unstructured":"Stephen Boyd, Stephen P Boyd, and Lieven Vandenberghe. 2004. Convex optimization. Cambridge university press.","key":"e_1_3_2_1_6_1"},{"key":"e_1_3_2_1_7_1","volume-title":"Collecting telemetry data privately. arXiv preprint arXiv:1712.01524","author":"Ding Bolin","year":"2017","unstructured":"Bolin Ding, Janardhan Kulkarni, and Sergey Yekhanin. 2017. Collecting telemetry data privately. arXiv preprint arXiv:1712.01524 (2017)."},{"volume-title":"Theory of cryptography conference","author":"Dwork Cynthia","unstructured":"Cynthia Dwork, Frank McSherry, Kobbi Nissim, and Adam Smith. 2006. Calibrating noise to sensitivity in private data analysis. In Theory of cryptography conference. Springer, 265--284.","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","first-page":"3","article-title":"The algorithmic foundations of differential privacy","volume":"9","author":"Dwork Cynthia","year":"2014","unstructured":"Cynthia Dwork, Aaron Roth, et al. 2014. The algorithmic foundations of differential privacy. Foundations and Trends in Theoretical Computer Science 9, 3--4 (2014), 211--407.","journal-title":"Foundations and Trends in Theoretical Computer Science"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1145\/2660267.2660348"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1145\/2736277.2741122"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1515\/popets-2016-0015"},{"key":"e_1_3_2_1_13_1","volume-title":"International conference on machine learning. PMLR, 2111--2120","author":"Gaboardi Marco","year":"2016","unstructured":"Marco Gaboardi, Hyun Lim, Ryan Rogers, and Salil Vadhan. 2016. Differentially private chi-squared hypothesis testing: Goodness of fit and independence testing. In International conference on machine learning. PMLR, 2111--2120."},{"key":"e_1_3_2_1_14_1","volume-title":"Differentially private multi-party computation: Optimality of non-interactive randomized response. arXiv preprint arXiv:1407.1546","author":"Kairouz Peter","year":"2014","unstructured":"Peter Kairouz, Sewoong Oh, and Pramod Viswanath. 2014. Differentially private multi-party computation: Optimality of non-interactive randomized response. arXiv preprint arXiv:1407.1546 (2014)."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.1214\/15-AOS1358"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_16_1","DOI":"10.1145\/2783258.2783366"},{"key":"e_1_3_2_1_17_1","volume-title":"Papers from Neural Information Processing Systems (NIPS)","author":"Leen Todd K","year":"2000","unstructured":"Todd K Leen, Thomas G Dietterich, and Volker Tresp. 2001. Advances in Neural Information Processing Systems 13, Papers from Neural Information Processing Systems (NIPS) 2000, Denver, CO."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_18_1","DOI":"10.1109\/WCNC.2018.8377050"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.1109\/18.61115"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_20_1","DOI":"10.1145\/2588555.2588575"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_21_1","DOI":"10.1145\/2976749.2978409"},{"volume-title":"Bayesian networks: with examples in R","author":"Scutari Marco","unstructured":"Marco Scutari and Jean-Baptiste Denis. 2014. Bayesian networks: with examples in R. CRC press.","key":"e_1_3_2_1_22_1"},{"key":"e_1_3_2_1_23_1","volume-title":"Bayesian analysis in expert systems. Statistical science","author":"Spiegelhalter David J","year":"1993","unstructured":"David J Spiegelhalter, A Philip Dawid, Steffen L Lauritzen, and Robert G Cowell. 1993. Bayesian analysis in expert systems. Statistical science (1993), 219--247."},{"unstructured":"Differentially Privacy Team. 2017. Learning with Privacy at Scale Differential Privacy Team. \"https:\/\/docs-assets.developer.apple.com\/ml-research\/papers\/learning-with-privacy-at-scale.pdf\"","key":"e_1_3_2_1_24_1"},{"volume-title":"26th {USENIX} Security Symposium ({USENIX} Security 17). 729--745.","author":"Wang Tianhao","unstructured":"Tianhao Wang, Jeremiah Blocki, Ninghui Li, and Somesh Jha. 2017. Locally differentially private protocols for frequency estimation. In 26th {USENIX} Security Symposium ({USENIX} Security 17). 729--745.","key":"e_1_3_2_1_25_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_26_1","DOI":"10.1080\/01621459.1965.10480775"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_27_1","DOI":"10.1111\/j.1467-9868.2005.00503.x"}],"event":{"sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"acronym":"SAC '24","name":"SAC '24: 39th ACM\/SIGAPP Symposium on Applied Computing","location":"Avila Spain"},"container-title":["Proceedings of the 39th ACM\/SIGAPP Symposium on Applied Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3605098.3636024","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3605098.3636024","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:03:59Z","timestamp":1750291439000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3605098.3636024"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,8]]},"references-count":27,"alternative-id":["10.1145\/3605098.3636024","10.1145\/3605098"],"URL":"https:\/\/doi.org\/10.1145\/3605098.3636024","relation":{},"subject":[],"published":{"date-parts":[[2024,4,8]]},"assertion":[{"value":"2024-05-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}