{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T10:04:56Z","timestamp":1775815496331,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":43,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,12,2]],"date-time":"2024-12-02T00:00:00Z","timestamp":1733097600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100006374","name":"Natural Science Foundation of Jiangsu Province","doi-asserted-by":"publisher","award":["BK20202001"],"award-info":[{"award-number":["BK20202001"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100006374","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62372226,62002159,62272215"],"award-info":[{"award-number":["62372226,62002159,62272215"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,12,2]]},"DOI":"10.1145\/3658644.3670298","type":"proceedings-article","created":{"date-parts":[[2024,12,9]],"date-time":"2024-12-09T12:19:20Z","timestamp":1733746760000},"page":"3555-3569","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Data Poisoning Attacks to Locally Differentially Private Frequent Itemset Mining Protocols"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8427-6068","authenticated-orcid":false,"given":"Wei","family":"Tong","sequence":"first","affiliation":[{"name":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-4899-9119","authenticated-orcid":false,"given":"Haoyu","family":"Chen","sequence":"additional","affiliation":[{"name":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-9935-4988","authenticated-orcid":false,"given":"Jiacheng","family":"Niu","sequence":"additional","affiliation":[{"name":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6581-8730","authenticated-orcid":false,"given":"Sheng","family":"Zhong","sequence":"additional","affiliation":[{"name":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China"}]}],"member":"320","published-online":{"date-parts":[[2024,12,9]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Advances in Knowledge Discovery and Data Mining","author":"Agrawal Rakesh","unstructured":"Rakesh Agrawal, Heikki Mannila, Ramakrishnan Srikant, Hannu Toivonen, and A. Inkeri Verkamo. 1996. Fast Discovery of Association Rules. In Advances in Knowledge Discovery and Data Mining. AAAI\/MIT Press, USA, 307--328."},{"key":"e_1_3_2_1_2_1","volume-title":"7th International Workshop on Theory and Practice in Public Key Cryptography","volume":"2947","author":"Ambainis Andris","year":"2004","unstructured":"Andris Ambainis, Markus Jakobsson, and Helger Lipmaa. 2004. Cryptographic Randomized Response Techniques. In Public Key Cryptography - PKC 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1--4, 2004, Vol. 2947. Springer, Berlin, Heidelberg, 425--438."},{"key":"e_1_3_2_1_3_1","unstructured":"Apple. 2017. Apple Differential Privacy Technical Overview. https:\/\/www.apple.com\/privacy\/docs\/Differential_Privacy_Overview.pdf"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.14778\/3579075.3579086"},{"key":"e_1_3_2_1_5_1","volume-title":"Advances in Neural Information Processing Systems 30: NeurIPS","author":"Bassily Raef","year":"2017","unstructured":"Raef Bassily, Kobbi Nissim, Uri Stemmer, and Abhradeep Guha Thakurta. 2017. Practical Locally Private Heavy Hitters. In Advances in Neural Information Processing Systems 30: NeurIPS 2017, Long Beach, CA, USA, December 4--9, 2017. Neural Information Processing Systems Foundation, USA, 2288--2296."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2746539.2746632"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3159652.3159702"},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of the 29th International Conference on Machine Learning, ICML 2012","author":"Biggio Battista","year":"2012","unstructured":"Battista Biggio, Blaine Nelson, and Pavel Laskov. 2012. Poisoning Attacks against Support Vector Machines. In Proceedings of the 29th International Conference on Machine Learning, ICML 2012, Edinburgh, Scotland, UK, June 26 - July 1, 2012. icml.cc \/ Omnipress, USA, 1467--1474."},{"key":"e_1_3_2_1_9_1","volume-title":"Secure Multi-party Computation of Differentially Private Median. In 29th USENIX Security Symposium, USENIX Security 2020","author":"B\u00f6hler Jonas","year":"2020","unstructured":"Jonas B\u00f6hler and Florian Kerschbaum. 2020. Secure Multi-party Computation of Differentially Private Median. In 29th USENIX Security Symposium, USENIX Security 2020, August 12--14, 2020. USENIX Association, USA, 2147--2164."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484557"},{"key":"e_1_3_2_1_11_1","volume-title":"30th USENIX Security Symposium, USENIX Security 2021","author":"Cao Xiaoyu","year":"2021","unstructured":"Xiaoyu Cao, Jinyuan Jia, and Neil Zhenqiang Gong. 2021. Data Poisoning Attacks to Local Differential Privacy Protocols. In 30th USENIX Security Symposium, USENIX Security 2021, August 11--13, 2021. USENIX Association, USA, 947--964."},{"key":"e_1_3_2_1_12_1","volume-title":"Manipulation Attacks in Local Differential Privacy. In 42nd IEEE Symposium on Security and Privacy, SP 2021","author":"Cheu Albert","year":"2021","unstructured":"Albert Cheu, Adam D. Smith, and Jonathan R. Ullman. 2021. Manipulation Attacks in Local Differential Privacy. In 42nd IEEE Symposium on Security and Privacy, SP 2021, San Francisco, CA, USA, 24--27 May 2021. IEEE, USA, 883--900."},{"key":"e_1_3_2_1_13_1","volume-title":"Advances in Neural Information Processing Systems 30: NeurIPS","author":"Ding Bolin","year":"2017","unstructured":"Bolin Ding, Janardhan Kulkarni, and Sergey Yekhanin. 2017. Collecting Telemetry Data Privately. In Advances in Neural Information Processing Systems 30: NeurIPS 2017, Long Beach, CA, USA, December 4--9, 2017. Neural Information Processing Systems Foundation, USA, 3571--3580."},{"key":"e_1_3_2_1_14_1","volume-title":"Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4--7, 2006, Proceedings","volume":"3876","author":"Dwork Cynthia","unstructured":"Cynthia Dwork, Frank McSherry, Kobbi Nissim, and Adam D. Smith. 2006. Calibrating Noise to Sensitivity in Private Data Analysis. In Theory of Cryptography, Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4--7, 2006, Proceedings, Vol. 3876. Springer, Germany, 265--284."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.29012\/jpc.v7i3.405"},{"key":"e_1_3_2_1_16_1","first-page":"3","article-title":"The Algorithmic Foundations of Differential Privacy","volume":"9","author":"Dwork Cynthia","year":"2014","unstructured":"Cynthia Dwork and Aaron Roth. 2014. The Algorithmic Foundations of Differential Privacy. Found. Trends Theor. Comput. Sci. 9, 3--4 (2014), 211--407.","journal-title":"Found. Trends Theor. Comput. Sci."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660348"},{"key":"e_1_3_2_1_18_1","volume-title":"29th USENIX Security Symposium, USENIX Security 2020","author":"Fang Minghong","year":"2020","unstructured":"Minghong Fang, Xiaoyu Cao, Jinyuan Jia, and Neil Zhenqiang Gong. 2020. Local Model Poisoning Attacks to Byzantine-Robust Federated Learning. In 29th USENIX Security Symposium, USENIX Security 2020, August 12--14, 2020. USENIX Association, USA, 1605--1622."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3450066"},{"key":"e_1_3_2_1_20_1","volume-title":"39th International Colloquium, ICALP 2012, Warwick, UK, July 9--13, 2012, Proceedings, Part I","volume":"7391","author":"Hsu Justin","year":"2012","unstructured":"Justin Hsu, Sanjeev Khanna, and Aaron Roth. 2012. Distributed Private Heavy Hitters. In Automata, Languages, and Programming - 39th International Colloquium, ICALP 2012, Warwick, UK, July 9--13, 2012, Proceedings, Part I, Vol. 7391. Springer, Germany, 461--472."},{"key":"e_1_3_2_1_21_1","volume-title":"Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning. In 2018 IEEE Symposium on Security and Privacy, SP 2018","author":"Jagielski Matthew","year":"2018","unstructured":"Matthew Jagielski, Alina Oprea, Battista Biggio, Chang Liu, Cristina Nita-Rotaru, and Bo Li. 2018. Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning. In 2018 IEEE Symposium on Security and Privacy, SP 2018, Proceedings, San Francisco, CA, USA, 21--23 May 2018. IEEE Computer Society, USA, 19--35."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2008.27"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-81242-3_3"},{"key":"e_1_3_2_1_24_1","unstructured":"KDD Cup 2000. 2000. BMS-POS: Online retailer website clickstream analysis. https:\/\/www.kdd.org\/kdd-cup\/view\/kdd-cup-2000"},{"key":"e_1_3_2_1_25_1","volume-title":"Data Poisoning Attacks on Factorization-Based Collaborative Filtering. In Annual Conference on Neural Information Processing Systems 2016","author":"Li Bo","year":"2016","unstructured":"Bo Li, Yining Wang, Aarti Singh, and Yevgeniy Vorobeychik. 2016. Data Poisoning Attacks on Factorization-Based Collaborative Filtering. In Annual Conference on Neural Information Processing Systems 2016, Barcelona, Spain, December 5--10, 2016. Neural Information Processing Systems Foundation, USA, 1885--1893."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3511808.3557327"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/3620237.3620335"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-59410-7_33"},{"key":"e_1_3_2_1_29_1","volume-title":"CSCML 2022, Be?er Sheva, Israel, June 30 - July 1, 2022, Proceedings (Lecture Notes in Computer Science","volume":"486","author":"Pihur Vasyl","year":"2022","unstructured":"Vasyl Pihur, Aleksandra Korolova, Frederick Liu, Subhash Sankuratripati, Moti Yung, Dachuan Huang, and Ruogu Zeng. 2022. Differentially-Private \"Draw and Discard\" Machine Learning: Training Distributed Model from Enormous Crowds. In Cyber Security, Cryptology, and Machine Learning - 6th International Symposium, CSCML 2022, Be?er Sheva, Israel, June 30 - July 1, 2022, Proceedings (Lecture Notes in Computer Science, Vol. 13301). Springer, Cham, 468--486."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978409"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3305873"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2021\/217"},{"key":"e_1_3_2_1_33_1","volume-title":"A Comprehensive Survey on Poisoning Attacks and Countermeasures in Machine Learning. ACM Comput. Surv. 55, 8","author":"Tian Zhiyi","year":"2023","unstructured":"Zhiyi Tian, Lei Cui, Jie Liang, and Shui Yu. 2023. A Comprehensive Survey on Poisoning Attacks and Countermeasures in Machine Learning. ACM Comput. Surv. 55, 8 (2023), 166:1--166:35."},{"key":"e_1_3_2_1_34_1","volume-title":"Data Poisoning Attacks to Locally Differentially Private Frequent Itemset Mining Protocols. https:\/\/drive.google.com\/file\/d\/1gzp00t1fMjmx9ShuxlCxhPgCDNOa2Jmh\/view?usp=drive_link. [Online","author":"Tong Wei","year":"2024","unstructured":"Wei Tong, Haoyu Chen, Jiacheng Niu, and Sheng Zhong. 2024. Data Poisoning Attacks to Locally Differentially Private Frequent Itemset Mining Protocols. https:\/\/drive.google.com\/file\/d\/1gzp00t1fMjmx9ShuxlCxhPgCDNOa2Jmh\/view?usp=drive_link. [Online; accessed 28-June-2024]."},{"key":"e_1_3_2_1_35_1","volume-title":"PrivSet: Set-Valued Data Analyses with Locale Differential Privacy. In 2018 IEEE Conference on Computer Communications, INFOCOM 2018","author":"Wang Shaowei","year":"2018","unstructured":"Shaowei Wang, Liusheng Huang, Yiwen Nie, Pengzhan Wang, Hongli Xu, and Wei Yang. 2018. PrivSet: Set-Valued Data Analyses with Locale Differential Privacy. In 2018 IEEE Conference on Computer Communications, INFOCOM 2018, Honolulu, HI, USA, April 16--19, 2018. IEEE, USA, 1088--1096."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.14778\/3389133.3389140"},{"key":"e_1_3_2_1_37_1","volume-title":"Locally Differentially Private Protocols for Frequency Estimation. In 26th USENIX Security Symposium, USENIX Security 2017","author":"Wang Tianhao","year":"2017","unstructured":"Tianhao Wang, Jeremiah Blocki, Ninghui Li, and Somesh Jha. 2017. Locally Differentially Private Protocols for Frequency Estimation. In 26th USENIX Security Symposium, USENIX Security 2017, Vancouver, BC, Canada, August 16--18, 2017. USENIX Association, USA, 729--745."},{"key":"e_1_3_2_1_38_1","volume-title":"Locally Differentially Private Frequent Itemset Mining. In 2018 IEEE Symposium on Security and Privacy, SP 2018","author":"Wang Tianhao","year":"2018","unstructured":"Tianhao Wang, Ninghui Li, and Somesh Jha. 2018. Locally Differentially Private Frequent Itemset Mining. In 2018 IEEE Symposium on Security and Privacy, SP 2018, Proceedings, San Francisco, CA,USA, 21--23 May 2018. IEEE Computer Society, USA, 127--143."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2927695"},{"key":"e_1_3_2_1_40_1","volume-title":"Locally Differentially Private Frequency Estimation with Consistency. In 27th Annual Network and Distributed System Security Symposium, NDSS 2020","author":"Wang Tianhao","year":"2020","unstructured":"Tianhao Wang, Milan Lopuha\u00e4-Zwakenberg, Zitao Li, Boris Skoric, and Ninghui Li. 2020. Locally Differentially Private Frequency Estimation with Consistency. In 27th Annual Network and Distributed System Security Symposium, NDSS 2020, San Diego, CA, USA, February 23--26, 2020. The Internet Society, USA, 16 pages."},{"key":"e_1_3_2_1_41_1","volume-title":"31st USENIX Security Symposium, USENIX Security 2022","author":"Wu Yongji","year":"2022","unstructured":"Yongji Wu, Xiaoyu Cao, Jinyuan Jia, and Neil Zhenqiang Gong. 2022. Poisoning Attacks to Local Differential Privacy Protocols for Key-Value Data. In 31st USENIX Security Symposium, USENIX Security 2022, Boston, MA, USA, August 10--12, 2022. USENIX Association, USA, 519--536."},{"key":"e_1_3_2_1_42_1","volume-title":"PrivKV: Key-Value Data Collection with Local Differential Privacy. In 2019 IEEE Symposium on Security and Privacy, SP 2019","author":"Ye Qingqing","year":"2019","unstructured":"Qingqing Ye, Haibo Hu, Xiaofeng Meng, and Huadi Zheng. 2019. PrivKV: Key-Value Data Collection with Local Differential Privacy. In 2019 IEEE Symposium on Security and Privacy, SP 2019, San Francisco, CA, USA, May 19--23, 2019. IEEE, USA, 317--331."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3324726"}],"event":{"name":"CCS '24: ACM SIGSAC Conference on Computer and Communications Security","location":"Salt Lake City UT USA","acronym":"CCS '24","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3670298","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3658644.3670298","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T06:03:38Z","timestamp":1755842618000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3670298"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,2]]},"references-count":43,"alternative-id":["10.1145\/3658644.3670298","10.1145\/3658644"],"URL":"https:\/\/doi.org\/10.1145\/3658644.3670298","relation":{},"subject":[],"published":{"date-parts":[[2024,12,2]]},"assertion":[{"value":"2024-12-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}