{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T13:28:25Z","timestamp":1767706105091,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,12,7]],"date-time":"2023-12-07T00:00:00Z","timestamp":1701907200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100006374","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-2325564, CNS-1933047"],"award-info":[{"award-number":["CNS-2325564, CNS-1933047"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,12,7]]},"DOI":"10.1145\/3628797.3628807","type":"proceedings-article","created":{"date-parts":[[2023,12,6]],"date-time":"2023-12-06T15:25:34Z","timestamp":1701876334000},"page":"16-23","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Locally Differentially Private and Fair Key-Value Aggregation"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4502-8424","authenticated-orcid":false,"given":"Yukun","family":"Dong","sequence":"first","affiliation":[{"name":"Computer and Information Sciences, University of Delaware, United States"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-9875-9519","authenticated-orcid":false,"given":"Zhengwu","family":"Lu","sequence":"additional","affiliation":[{"name":"Wuhan Engineering Science and Technology Institute, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5230-5998","authenticated-orcid":false,"given":"Rui","family":"Zhang","sequence":"additional","affiliation":[{"name":"Computer and Information Sciences, University of Delaware, United States"}]}],"member":"320","published-online":{"date-parts":[[2023,12,7]]},"reference":[{"volume-title":"NIPS\u201917.","author":"Bassily Raef","key":"e_1_3_2_1_1_1","unstructured":"Raef Bassily, Kobbi Nissim, Uri Stemmer, and Abhradeep Guha\u00a0Thakurta. 2017. Practical Locally Private Heavy Hitters. In NIPS\u201917. Long Beach, CA, USA, 2285\u20132293."},{"volume-title":"NIPS\u201917.","author":"Ding Bolin","key":"e_1_3_2_1_2_1","unstructured":"Bolin Ding, Janardhan Kulkarni, and Sergey Yekhanin. 2017. Collecting Telemetry Data Privately. In NIPS\u201917. Long Beach, California, USA, 3574\u20133583."},{"volume-title":"NIPS\u201913.","author":"Duchi C.","key":"e_1_3_2_1_3_1","unstructured":"John\u00a0C. Duchi, Michael\u00a0I. Jordan, and Martin\u00a0J. Wainwright. 2013. Local Privacy and Minimax Bounds: Sharp Rates for Probability Estimation. In NIPS\u201913. Lake Tahoe, Nevada, 1529\u20131537."},{"volume-title":"FOCS \u201913.","author":"Duchi C.","key":"e_1_3_2_1_4_1","unstructured":"J.\u00a0C. Duchi, M.\u00a0I. Jordan, and M.\u00a0J. Wainwright. 2013. Local Privacy and Statistical Minimax Rates. In FOCS \u201913. Berkeley, CA, 429\u2013438."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2666468"},{"key":"e_1_3_2_1_6_1","volume-title":"Differential Privacy: A Survey of Results. In TAMC\u201908. Xi\u2019an, China, 1\u201319.","author":"Dwork Cynthia","year":"2008","unstructured":"Cynthia Dwork. 2008. Differential Privacy: A Survey of Results. In TAMC\u201908. Xi\u2019an, China, 1\u201319."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/11761679_29"},{"volume-title":"TCC\u201906.","author":"Dwork Cynthia","key":"e_1_3_2_1_8_1","unstructured":"Cynthia Dwork, Frank McSherry, Kobbi Nissim, and Adam Smith. 2006. Calibrating Noise to Sensitivity in Private Data Analysis. In TCC\u201906. New York, NY, 265\u2013284."},{"key":"e_1_3_2_1_9_1","volume-title":"The algorithmic foundations of differential privacy. Foundations and Trends\u00ae in Theoretical Computer Science 9, 3\u20134 (August","author":"Dwork Cynthia","year":"2014","unstructured":"Cynthia Dwork, Aaron Roth, 2014. The algorithmic foundations of differential privacy. Foundations and Trends\u00ae in Theoretical Computer Science 9, 3\u20134 (August 2014), 211\u2013407."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660348"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2016-0015"},{"key":"e_1_3_2_1_12_1","first-page":"967","article-title":"PCKV: Locally Differentially Private Correlated Key-Value Data Collection with Optimized Utility","volume":"20","author":"Gu Xiaolan","year":"2020","unstructured":"Xiaolan Gu, Ming Li, Yueqiang Cheng, Li Xiong, and Yang Cao. 2020. PCKV: Locally Differentially Private Correlated Key-Value Data Collection with Optimized Utility. In USENIX Security 20. 967\u2013984.","journal-title":"USENIX Security"},{"key":"e_1_3_2_1_13_1","unstructured":"Raj Jain Dah\u00a0Ming Chiu and Hawe WR. 1998. A Quantitative Measure Of Fairness And Discrimination For Resource Allocation In Shared Computer Systems. CoRR cs.NI\/9809099 (01 1998)."},{"volume-title":"SIGMOD\u201918.","author":"Kulkarni Tejas","key":"e_1_3_2_1_14_1","unstructured":"Tejas Kulkarni, Graham Cormode, and Divesh Srivastava. 2018. Marginal Release Under Local Differential Privacy. In SIGMOD\u201918. Houston, TX, USA, 131\u2013146."},{"volume-title":"SIGMOD \u201920.","author":"Li Zitao","key":"e_1_3_2_1_15_1","unstructured":"Zitao Li, Tianhao Wang, Milan Lopuha\u00e4-Zwakenberg, Ninghui Li, and Boris \u0160koric. 2020. Estimating Numerical Distributions under Local Differential Privacy. In SIGMOD \u201920. Portland, OR, USA, 621\u2013635."},{"key":"e_1_3_2_1_16_1","volume-title":"Collecting and Analyzing Data from Smart Device Users with Local Differential Privacy. CoRR abs\/1606.05053","author":"Nguy\u00ean T.","year":"2016","unstructured":"Th\u00f4ng\u00a0T. Nguy\u00ean, Xiaokui Xiao, Yin Yang, Siu\u00a0Cheung Hui, Hyejin Shin, and Junbum Shin. 2016. Collecting and Analyzing Data from Smart Device Users with Local Differential Privacy. CoRR abs\/1606.05053 (2016)."},{"volume-title":"CCS \u201916.","author":"Qin Zhan","key":"e_1_3_2_1_17_1","unstructured":"Zhan Qin, Yin Yang, Ting Yu, Issa Khalil, Xiaokui Xiao, and Kui Ren. 2016. Heavy Hitter Estimation over Set-Valued Data with Local Differential Privacy. In CCS \u201916. Vienna, Austria, 192\u2013203."},{"volume-title":"CCS \u201917.","author":"Qin Zhan","key":"e_1_3_2_1_18_1","unstructured":"Zhan Qin, Ting Yu, Yin Yang, Issa Khalil, Xiaokui Xiao, and Kui Ren. 2017. Generating Synthetic Decentralized Social Graphs with Local Differential Privacy. In CCS \u201917. Dallas, Texas, USA, 425\u2013438."},{"key":"e_1_3_2_1_19_1","volume-title":"Conditional Analysis for Key-Value Data with Local Differential Privacy. CoRR abs\/1907.05014","author":"Sun Lin","year":"2019","unstructured":"Lin Sun, Jun Zhao, Xiaojun Ye, Shuo Feng, Teng Wang, and Tao Bai. 2019. Conditional Analysis for Key-Value Data with Local Differential Privacy. CoRR abs\/1907.05014 (2019)."},{"key":"e_1_3_2_1_20_1","first-page":"594","article-title":"Learning new words","volume":"9","author":"Thakurta Abhradeep\u00a0Guha","year":"2017","unstructured":"Abhradeep\u00a0Guha Thakurta, Andrew\u00a0H Vyrros, Umesh\u00a0S Vaishampayan, Gaurav Kapoor, Julien Freudiger, Vivek\u00a0Rangarajan Sridhar, and Doug Davidson. 2017. Learning new words. US Patent 9,594,741.","journal-title":"US Patent"},{"key":"e_1_3_2_1_21_1","first-page":"705","article-title":"Emoji frequency detection and deep link frequency","volume":"9","author":"Thakurta Abhradeep\u00a0Guha","year":"2017","unstructured":"Abhradeep\u00a0Guha Thakurta, Andrew\u00a0H Vyrros, Umesh\u00a0S Vaishampayan, Gaurav Kapoor, Julien Freudinger, Vipul\u00a0Ved Prakash, Arnaud Legendre, and Steven Duplinsky. 2017. Emoji frequency detection and deep link frequency. US Patent 9,705,908.","journal-title":"US Patent"},{"volume-title":"ICDE\u201918.","author":"Wang Ning","key":"e_1_3_2_1_22_1","unstructured":"Ning Wang, Xiaokui Xiao, Yin Yang, Ta\u00a0Duy Hoang, Hyejin Shin, Junbum Shin, and Ge Yu. 2018. PrivTrie: Effective Frequent Term Discovery under Local Differential Privacy. In ICDE\u201918. Paris, France, 821\u2013832."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"Ning Wang Xiaokui Xiao Yin Yang Jun Zhao Siu\u00a0Cheung Hui Hyejin Shin Junbum Shin and Ge Yu. 2019. Collecting and analyzing multidimensional data with local differential privacy. In ICDE\u201919. Macau China 638\u2013649.","DOI":"10.1109\/ICDE.2019.00063"},{"volume-title":"USENIX Security 17.","author":"Wang Tianhao","key":"e_1_3_2_1_24_1","unstructured":"Tianhao Wang, Jeremiah Blocki, Ninghui Li, and Somesh Jha. 2017. Locally Differentially Private Protocols for Frequency Estimation. In USENIX Security 17. Vancouver, BC, 729\u2013745."},{"volume-title":"SP\u201918.","author":"Wang Tianhao","key":"e_1_3_2_1_25_1","unstructured":"Tianhao Wang, Ninghui Li, and Somesh Jha. 2018. Locally Differentially Private Frequent Itemset Mining. In SP\u201918. San Francisco, CA, USA, 127\u2013143."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2927695"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1965.10480775"},{"volume-title":"SP\u201919.","author":"Ye Qingqing","key":"e_1_3_2_1_28_1","unstructured":"Qingqing Ye, Haibo Hu, Xiaofeng Meng, and Huadi Zheng. 2019. PrivKV: Key-Value Data Collection with Local Differential Privacy. In SP\u201919. San Francisco, CA, 317\u2013331."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3107512"},{"key":"e_1_3_2_1_30_1","volume-title":"CALM: Consistent Adaptive Local Marginal for Marginal Release Under Local Differential Privacy. In CCS \u201918.","author":"Zhang Zhikun","year":"2018","unstructured":"Zhikun Zhang, Tianhao Wang, Ninghui Li, Shibo He, and Jiming Chen. 2018. CALM: Consistent Adaptive Local Marginal for Marginal Release Under Local Differential Privacy. In CCS \u201918. Toronto, Canada, 212\u2013229."}],"event":{"name":"SOICT 2023: The 12th International Symposium on Information and Communication Technology","acronym":"SOICT 2023","location":"Ho Chi Minh Vietnam"},"container-title":["Proceedings of the 12th International Symposium on Information and Communication Technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3628797.3628807","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3628797.3628807","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T12:23:43Z","timestamp":1755779023000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3628797.3628807"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,7]]},"references-count":30,"alternative-id":["10.1145\/3628797.3628807","10.1145\/3628797"],"URL":"https:\/\/doi.org\/10.1145\/3628797.3628807","relation":{},"subject":[],"published":{"date-parts":[[2023,12,7]]},"assertion":[{"value":"2023-12-07","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}