{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T10:05:08Z","timestamp":1775815508270,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T00:00:00Z","timestamp":1745280000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/https:\/\/doi.org\/10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2023YFB3001900"],"award-info":[{"award-number":["2023YFB3001900"]}],"id":[{"id":"10.13039\/https:\/\/doi.org\/10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Shenzhen Science and Technology Program","award":["KJZD20230923113901004"],"award-info":[{"award-number":["KJZD20230923113901004"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,4,22]]},"DOI":"10.1145\/3696410.3714619","type":"proceedings-article","created":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T16:42:02Z","timestamp":1746463322000},"page":"921-930","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Local Differentially Private Release of Infinite Streams With Temporal Relevance"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-3462-6653","authenticated-orcid":false,"given":"Runze","family":"Wang","sequence":"first","affiliation":[{"name":"School of Computer Science and Engineering, Sun Yat-sen University, Guangzhou, Guangdong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8608-381X","authenticated-orcid":false,"given":"Jiahao","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Sun Yat-sen University, Guangzhou, Guangdong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1518-002X","authenticated-orcid":false,"given":"Miao","family":"Hu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Sun Yat-sen University, Guangzhou, Guangdong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1533-0865","authenticated-orcid":false,"given":"Yipeng","family":"Zhou","sequence":"additional","affiliation":[{"name":"School of Computing, FSE, Macquarie University, Sydney, NSW, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9433-7725","authenticated-orcid":false,"given":"Di","family":"Wu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Sun Yat-sen University, Guangzhou, Guangdong, China"}]}],"member":"320","published-online":{"date-parts":[[2025,4,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623361"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2012.80"},{"key":"e_1_3_2_1_3_1","volume-title":"Invited Paper: Local Differential Privacy on Metric Spaces: Optimizing the Trade-Off with Utility. In 31st IEEE Computer Security Foundations Symposium, CSF. 262--267","author":"Alvim M\u00e1rio S.","year":"2018","unstructured":"M\u00e1rio S. Alvim, Konstantinos Chatzikokolakis, Catuscia Palamidessi, and Anna Pazii. 2018. Invited Paper: Local Differential Privacy on Metric Spaces: Optimizing the Trade-Off with Utility. In 31st IEEE Computer Security Foundations Symposium, CSF. 262--267."},{"key":"e_1_3_2_1_4_1","volume-title":"21st European Symposium on Artificial Neural Networks (ESANN).","author":"Anguita Davide","year":"2013","unstructured":"Davide Anguita, Alessandro Ghio, Luca Oneto, Xavier Parra, and Jorge Luis Reyes-Ortiz. 2013. A Public Domain Dataset for Human Activity Recognition using Smartphones. In 21st European Symposium on Artificial Neural Networks (ESANN)."},{"key":"e_1_3_2_1_5_1","unstructured":"Apple Differential Privacy Team. 2017. Learning with Privacy at Scale. https:\/\/machinelearning.apple.com\/research\/learning-with-privacy-at-scale."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.14778\/3476249.3476277"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2018.2824328"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134102"},{"key":"e_1_3_2_1_9_1","volume-title":"TSDDISCOVER: Discovering Data Dependency for Time Series Data. In 40th IEEE International Conference on Data Engineering, ICDE. 3668--3681","author":"Ding Xiaoou","year":"2024","unstructured":"Xiaoou Ding, Yingze Li, Hongzhi Wang, Chen Wang, Yida Liu, and Jianmin Wang. 2024. TSDDISCOVER: Discovering Data Dependency for Time Series Data. In 40th IEEE International Conference on Data Engineering, ICDE. 3668--3681."},{"key":"e_1_3_2_1_10_1","volume-title":"Local Privacy and Statistical Minimax Rates. In 54th Annual IEEE Symposium on Foundations of Computer Science (FOCS). 429--438","author":"Duchi John C.","unstructured":"John C. Duchi, Michael I. Jordan, and Martin J. Wainwright. 2013. Local Privacy and Statistical Minimax Rates. In 54th Annual IEEE Symposium on Foundations of Computer Science (FOCS). 429--438."},{"key":"e_1_3_2_1_11_1","volume-title":"Automata, Languages and Programming","author":"Dwork Cynthia","unstructured":"Cynthia Dwork. 2006. Differential Privacy. In Automata, Languages and Programming. Springer Berlin Heidelberg, Berlin, Heidelberg, 1--12."},{"key":"e_1_3_2_1_12_1","first-page":"3","article-title":"The Algorithmic Foundations of Differential Privacy","volume":"9","author":"Dwork Cynthia","year":"2014","unstructured":"Cynthia Dwork and Aaron Roth. 2014. The Algorithmic Foundations of Differential Privacy. Found. Trends Theor. Comput. Sci., Vol. 9, 3--4 (2014), 211--407.","journal-title":"Found. Trends Theor. Comput. Sci."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3013200"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611975482.151"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660348"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2396761.2398595"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2013.96"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098060"},{"key":"e_1_3_2_1_19_1","volume-title":"Otus: A Gaze Model-based Privacy Control Framework for Eye Tracking Applications. In IEEE Conference on Computer Communications (INFOCOM). 560--569","author":"Hu Miao","year":"2022","unstructured":"Miao Hu, Zhenxiao Luo, Yipeng Zhou, Xuezheng Liu, and Di Wu. 2022. Otus: A Gaze Model-based Privacy Control Framework for Eye Tracking Applications. In IEEE Conference on Computer Communications (INFOCOM). 560--569."},{"key":"e_1_3_2_1_20_1","unstructured":"Matthew Joseph Aaron Roth Jonathan R. Ullman and Bo Waggoner. 2018. Local Differential Privacy for Evolving Data. In Advances in Neural Information Processing Systems (NeurIPS). 2381--2390."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.14778\/2732977.2732989"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2806416.2806441"},{"key":"e_1_3_2_1_23_1","volume-title":"30th USENIX Security Symposium (USENIX Security). 1793--1810","author":"Li Jingjie","year":"2021","unstructured":"Jingjie Li, Amrita Roy Chowdhury, Kassem Fawaz, and Younghyun Kim. 2021. Kal(\u03b5)ido: Real-Time Privacy Control for Eye-Tracking Systems. In 30th USENIX Security Symposium (USENIX Security). 1793--1810."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11390-021-1344-6"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1807167.1807247"},{"key":"e_1_3_2_1_26_1","volume-title":"LDP-IDS: Local Differential Privacy for Infinite Data Streams. In SIGMOD: International Conference on Management of Data. 1064--1077","author":"Ren Xuebin","year":"2022","unstructured":"Xuebin Ren, Liang Shi, Weiren Yu, Shusen Yang, Cong Zhao, and Zongben Xu. 2022. LDP-IDS: Local Differential Privacy for Infinite Data Streams. In SIGMOD: International Conference on Management of Data. 1064--1077."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3314111.3319915"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2016.7524458"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484750"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2018.2861765"},{"key":"e_1_3_2_1_31_1","volume-title":"Universal Access in Human-Computer Interaction. Design for All and Accessibility Practice","author":"Wong Wilkey","unstructured":"Wilkey Wong, Mike Bartels, and Nina Chrobot. 2014. Practical Eye Tracking of the Ecommerce Website User Experience. In Universal Access in Human-Computer Interaction. Design for All and Accessibility Practice. Springer International Publishing, 109--118."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3290486"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813640"},{"key":"e_1_3_2_1_34_1","volume-title":"Man Ho Au, and Qiao Xue","author":"Ye Qingqing","year":"2023","unstructured":"Qingqing Ye, Haibo Hu, Kai Huang, Man Ho Au, and Qiao Xue. 2023. Stateful Switch: Optimized Time Series Release with Local Differential Privacy. In IEEE INFOCOM - IEEE Conference on Computer Communications. 1--10."},{"key":"e_1_3_2_1_35_1","volume-title":"Beyond Value Perturbation: Local Differential Privacy in the Temporal Setting. In 40th IEEE Conference on Computer Communications (INFOCOM). 1--10","author":"Ye Qingqing","year":"2021","unstructured":"Qingqing Ye, Haibo Hu, Ninghui Li, Xiaofeng Meng, Huadi Zheng, and Haotian Yan. 2021. Beyond Value Perturbation: Local Differential Privacy in the Temporal Setting. In 40th IEEE Conference on Computer Communications (INFOCOM). 1--10."},{"key":"e_1_3_2_1_36_1","first-page":"63","article-title":"A Survey of Traffic Prediction: from Spatio-Temporal Data to Intelligent Transportation. Data Sci","volume":"6","author":"Yuan Haitao","year":"2021","unstructured":"Haitao Yuan and Guoliang Li. 2021. A Survey of Traffic Prediction: from Spatio-Temporal Data to Intelligent Transportation. Data Sci. Eng., Vol. 6, 1 (2021), 63--85.","journal-title":"Eng."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.14778\/3115404.3115410"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2848659"}],"event":{"name":"WWW '25: The ACM Web Conference 2025","location":"Sydney NSW Australia","acronym":"WWW '25","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"]},"container-title":["Proceedings of the ACM on Web Conference 2025"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3696410.3714619","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3696410.3714619","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:18:34Z","timestamp":1750295914000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3696410.3714619"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,22]]},"references-count":38,"alternative-id":["10.1145\/3696410.3714619","10.1145\/3696410"],"URL":"https:\/\/doi.org\/10.1145\/3696410.3714619","relation":{},"subject":[],"published":{"date-parts":[[2025,4,22]]},"assertion":[{"value":"2025-04-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}