{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T22:03:22Z","timestamp":1772834602459,"version":"3.50.1"},"reference-count":49,"publisher":"Association for Computing Machinery (ACM)","issue":"9","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Proc. VLDB Endow."],"published-print":{"date-parts":[[2022,5]]},"abstract":"<jats:p>\n            How can we explore the unknown properties of high-dimensional sensitive relational data while preserving privacy? We study how to construct an explorable privacy-preserving materialized view under differential privacy. No existing state-of-the-art methods simultaneously satisfy the following essential properties in data exploration: workload independence, analytical reliability (i.e., providing error bound for each search query), applicability to high-dimensional data, and space efficiency. To solve the above issues, we propose HDPView, which creates a differentially private materialized view by well-designed recursive bisected partitioning on an original data cube, i.e., count tensor. Our method searches for block partitioning to minimize the error for the counting query, in addition to randomizing the convergence, by choosing the effective cutting points in a differentially private way, resulting in a less noisy and compact view. Furthermore, we ensure formal privacy guarantee and analytical reliability by providing the error bound for arbitrary counting queries on the materialized views. HDPView has the following desirable properties: (a)\n            <jats:italic>Workload independence<\/jats:italic>\n            , (b)\n            <jats:italic>Analytical reliability<\/jats:italic>\n            , (c)\n            <jats:italic>Noise resistance on high-dimensional data<\/jats:italic>\n            , (d)\n            <jats:italic>Space efficiency.<\/jats:italic>\n            To demonstrate the above properties and the suitability for data exploration, we conduct extensive experiments with eight types of range counting queries on eight real datasets. HDPView outperforms the state-of-the-art methods in these evaluations.\n          <\/jats:p>","DOI":"10.14778\/3538598.3538601","type":"journal-article","created":{"date-parts":[[2022,7,27]],"date-time":"2022-07-27T17:12:31Z","timestamp":1658941951000},"page":"1766-1778","source":"Crossref","is-referenced-by-count":7,"title":["HDPView"],"prefix":"10.14778","volume":"15","author":[{"given":"Fumiyuki","family":"Kato","sequence":"first","affiliation":[{"name":"Kyoto University"}]},{"given":"Tsubasa","family":"Takahashi","sequence":"additional","affiliation":[{"name":"LINE Corporation"}]},{"given":"Shun","family":"Takagi","sequence":"additional","affiliation":[{"name":"Kyoto University"}]},{"given":"Yang","family":"Cao","sequence":"additional","affiliation":[{"name":"Kyoto University"}]},{"given":"Seng Pei","family":"Liew","sequence":"additional","affiliation":[{"name":"LINE Corporation"}]},{"given":"Masatoshi","family":"Yoshikawa","sequence":"additional","affiliation":[{"name":"Kyoto University"}]}],"member":"320","published-online":{"date-parts":[[2022,7,27]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"Adult Data Set - UCI Machine Learning Repository","unstructured":"1996. Adult Data Set - UCI Machine Learning Repository . http:\/\/archive.ics.uci.edu\/ml\/datasets\/Adult. accessed on 2022-05-10. 1996. Adult Data Set - UCI Machine Learning Repository. http:\/\/archive.ics.uci.edu\/ml\/datasets\/Adult. accessed on 2022-05-10."},{"key":"e_1_2_1_2_1","unstructured":"2014. electricity - OpenML. https:\/\/www.openml.org\/d\/151. accessed on 2022-05-10.  2014. electricity - OpenML. https:\/\/www.openml.org\/d\/151. accessed on 2022-05-10."},{"key":"e_1_2_1_3_1","unstructured":"2014. jm1 - OpenML. https:\/\/www.openml.org\/d\/1053. accessed on 2022-05-10.  2014. jm1 - OpenML. https:\/\/www.openml.org\/d\/1053. accessed on 2022-05-10."},{"key":"e_1_2_1_4_1","unstructured":"2015. phoneme - OpenML. https:\/\/www.openml.org\/d\/1489. accessed on 2022-05-10.  2015. phoneme - OpenML. https:\/\/www.openml.org\/d\/1489. accessed on 2022-05-10."},{"key":"e_1_2_1_5_1","volume-title":"Metro Interstate Traffic","unstructured":"2019. Metro Interstate Traffic Volume Data Set - UCI Machine Learning Repository. http:\/\/archive.ics.uci.edu\/ml\/datasets\/Metro+Interstate+Traffic+Volume. accessed on 2022-05- 10 . 2019. Metro Interstate Traffic Volume Data Set - UCI Machine Learning Repository. http:\/\/archive.ics.uci.edu\/ml\/datasets\/Metro+Interstate+Traffic+Volume. accessed on 2022-05-10."},{"key":"e_1_2_1_6_1","unstructured":"2020. Bitcoin Data Set - UCI Machine Learning Repository. https:\/\/archive.ics.uci.edu\/ml\/datasets\/BitcoinHeistRansomwareAddressDataset. accessed on 2022-05-10.  2020. Bitcoin Data Set - UCI Machine Learning Repository. https:\/\/archive.ics.uci.edu\/ml\/datasets\/BitcoinHeistRansomwareAddressDataset. accessed on 2022-05-10."},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3226070"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2018.2855136"},{"key":"e_1_2_1_10_1","series-title":"SIAM review 18, 4","volume-title":"Set partitioning: A survey","author":"Balas Egon","year":"1976","unstructured":"Egon Balas and Manfred W Padberg . 1976. Set partitioning: A survey . SIAM review 18, 4 ( 1976 ), 710--760. Egon Balas and Manfred W Padberg. 1976. Set partitioning: A survey. SIAM review 18, 4 (1976), 710--760."},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.14778\/3055540.3055542"},{"key":"e_1_2_1_12_1","unstructured":"Kamalika Chaudhuri Jacob Imola and Ashwin Machanavajjhala. 2019. Capacity bounded differential privacy. In Advances in Neural Information Processing Systems. 3469--3478.  Kamalika Chaudhuri Jacob Imola and Ashwin Machanavajjhala. 2019. Capacity bounded differential privacy. In Advances in Neural Information Processing Systems. 3469--3478."},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2783379"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2012.16"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/11787006_1"},{"key":"e_1_2_1_16_1","first-page":"3","article-title":"The algorithmic foundations of differential privacy","volume":"9","author":"Dwork Cynthia","year":"2014","unstructured":"Cynthia Dwork , Aaron Roth , 2014 . The algorithmic foundations of differential privacy . Found. Trends Theor. Comput. Sci. 9 , 3 - 4 (2014), 211--407. Cynthia Dwork, Aaron Roth, et al. 2014. The algorithmic foundations of differential privacy. Found. Trends Theor. Comput. Sci. 9, 3-4 (2014), 211--407.","journal-title":"Found. Trends Theor. Comput. Sci."},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.14778\/3407790.3407802"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3299869.3300092"},{"key":"e_1_2_1_19_1","volume-title":"Kamino: Constraint-Aware Differentially Private Data Synthesis. arXiv preprint arXiv:2012.15713","author":"Ge Chang","year":"2020","unstructured":"Chang Ge , Shubhankar Mohapatra , Xi He , and Ihab F Ilyas . 2020 . Kamino: Constraint-Aware Differentially Private Data Synthesis. arXiv preprint arXiv:2012.15713 (2020). Chang Ge, Shubhankar Mohapatra, Xi He, and Ihab F Ilyas. 2020. Kamino: Constraint-Aware Differentially Private Data Synthesis. arXiv preprint arXiv:2012.15713 (2020)."},{"key":"e_1_2_1_20_1","volume-title":"DP-MERF: Differentially Private Mean Embeddings with RandomFeatures for Practical Privacy-preserving Data Generation. In International Conference on Artificial Intelligence and Statistics. PMLR","author":"Harder Frederik","year":"2021","unstructured":"Frederik Harder , Kamil Adamczewski , and Mijung Park . 2021 . DP-MERF: Differentially Private Mean Embeddings with RandomFeatures for Practical Privacy-preserving Data Generation. In International Conference on Artificial Intelligence and Statistics. PMLR , 1819--1827. Frederik Harder, Kamil Adamczewski, and Mijung Park. 2021. DP-MERF: Differentially Private Mean Embeddings with RandomFeatures for Practical Privacy-preserving Data Generation. In International Conference on Artificial Intelligence and Statistics. PMLR, 1819--1827."},{"key":"e_1_2_1_21_1","volume-title":"Boosting the accuracy of differentially-private histograms through consistency. arXiv preprint arXiv:0904.0942","author":"Hay Michael","year":"2009","unstructured":"Michael Hay , Vibhor Rastogi , Gerome Miklau , and Dan Suciu . 2009. Boosting the accuracy of differentially-private histograms through consistency. arXiv preprint arXiv:0904.0942 ( 2009 ). Michael Hay, Vibhor Rastogi, Gerome Miklau, and Dan Suciu. 2009. Boosting the accuracy of differentially-private histograms through consistency. arXiv preprint arXiv:0904.0942 (2009)."},{"key":"e_1_2_1_22_1","volume-title":"Chorus: Differential privacy via query rewriting. arXiv preprint arXiv:1809.07750","author":"Johnson Noah","year":"2018","unstructured":"Noah Johnson , Joseph P Near , Joseph M Hellerstein , and Dawn Song . 2018 . Chorus: Differential privacy via query rewriting. arXiv preprint arXiv:1809.07750 (2018). Noah Johnson, Joseph P Near, Joseph M Hellerstein, and Dawn Song. 2018. Chorus: Differential privacy via query rewriting. arXiv preprint arXiv:1809.07750 (2018)."},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3187009.3177733"},{"key":"e_1_2_1_24_1","volume-title":"Extensions of Lipschitz mappings into a Hilbert space 26. Contemporary mathematics 26","author":"Johnson William B","year":"1984","unstructured":"William B Johnson and Joram Lindenstrauss . 1984. Extensions of Lipschitz mappings into a Hilbert space 26. Contemporary mathematics 26 ( 1984 ). William B Johnson and Joram Lindenstrauss. 1984. Extensions of Lipschitz mappings into a Hilbert space 26. Contemporary mathematics 26 (1984)."},{"key":"e_1_2_1_25_1","volume-title":"International Conference on Learning Representations.","author":"Jordon James","unstructured":"James Jordon , Jinsung Yoon , and Mihaela van der Schaar. 2018. PATE-GAN: generating synthetic data with differential privacy guarantees . In International Conference on Learning Representations. James Jordon, Jinsung Yoon, and Mihaela van der Schaar. 2018. PATE-GAN: generating synthetic data with differential privacy guarantees. In International Conference on Learning Representations."},{"key":"e_1_2_1_26_1","volume-title":"Seng Pei Liew, and Masatoshi Yoshikawa","author":"Kato Fumiyuki","year":"2022","unstructured":"Fumiyuki Kato , Tsubasa Takahashi , Shun Takagi , Yang Cao , Seng Pei Liew, and Masatoshi Yoshikawa . 2022 . HDPView: Differentially Private Materialized View for Exploring High Dimensional Relational Data . arXiv preprint arXiv:2203.06791 (2022). Fumiyuki Kato, Tsubasa Takahashi, Shun Takagi, Yang Cao, Seng Pei Liew, and Masatoshi Yoshikawa. 2022. HDPView: Differentially Private Materialized View for Exploring High Dimensional Relational Data. arXiv preprint arXiv:2203.06791 (2022)."},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.14778\/3342263.3342274"},{"key":"e_1_2_1_28_1","unstructured":"Jure Leskovec. 2011. Gowalla Dataset. http:\/\/snap.stanford.edu\/data\/loc-Gowalla.html. accessed on 2022-05-10.  Jure Leskovec. 2011. Gowalla Dataset. http:\/\/snap.stanford.edu\/data\/loc-Gowalla.html. accessed on 2022-05-10."},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.14778\/2732269.2732271"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-015-0398-x"},{"key":"e_1_2_1_31_1","volume-title":"Optimizing Error of High-Dimensional Statistical Queries under Differential Privacy. 11, 10","author":"McKenna Ryan","year":"2018","unstructured":"Ryan McKenna , Gerome Miklau , Michael Hay , and Ashwin Machanavajjhala . 2018. Optimizing Error of High-Dimensional Statistical Queries under Differential Privacy. 11, 10 ( 2018 ). Ryan McKenna, Gerome Miklau, Michael Hay, and Ashwin Machanavajjhala. 2018. Optimizing Error of High-Dimensional Statistical Queries under Differential Privacy. 11, 10 (2018)."},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1559845.1559850"},{"key":"e_1_2_1_33_1","volume-title":"Semi-supervised knowledge transfer for deep learning from private training data. arXiv preprint arXiv:1610.05755","author":"Papernot Nicolas","year":"2016","unstructured":"Nicolas Papernot , Mart\u00edn Abadi , Ulfar Erlingsson , Ian Goodfellow , and Kunal Talwar . 2016. Semi-supervised knowledge transfer for deep learning from private training data. arXiv preprint arXiv:1610.05755 ( 2016 ). Nicolas Papernot, Mart\u00edn Abadi, Ulfar Erlingsson, Ian Goodfellow, and Kunal Talwar. 2016. Semi-supervised knowledge transfer for deep learning from private training data. arXiv preprint arXiv:1610.05755 (2016)."},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2013.6544872"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2588555.2588575"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2812146"},{"key":"e_1_2_1_37_1","volume-title":"Shraddha Sahay, and Parvez Ahammad.","author":"Rogers Ryan","year":"2020","unstructured":"Ryan Rogers , Subbu Subramaniam , Sean Peng , David Durfee , Seunghyun Lee , Santosh Kumar Kancha , Shraddha Sahay, and Parvez Ahammad. 2020 . LinkedIn's Audience Engagements API : A privacy preserving data analytics system at scale. arXiv preprint arXiv:2002.05839 (2020). Ryan Rogers, Subbu Subramaniam, Sean Peng, David Durfee, Seunghyun Lee, Santosh Kumar Kancha, Shraddha Sahay, and Parvez Ahammad. 2020. LinkedIn's Audience Engagements API: A privacy preserving data analytics system at scale. arXiv preprint arXiv:2002.05839 (2020)."},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3394486.3403148"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE51399.2021.00022"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330894"},{"key":"e_1_2_1_41_1","volume-title":"William Lam, Damien Desfontaines, Daniel Simmons-Marengo, and Bryant Gipson.","author":"Wilson Royce J","year":"2019","unstructured":"Royce J Wilson , Celia Yuxin Zhang , William Lam, Damien Desfontaines, Daniel Simmons-Marengo, and Bryant Gipson. 2019 . Differentially private sql with bounded user contribution. arXiv preprint arXiv:1909.01917 (2019). Royce J Wilson, Celia Yuxin Zhang, William Lam, Damien Desfontaines, Daniel Simmons-Marengo, and Bryant Gipson. 2019. Differentially private sql with bounded user contribution. arXiv preprint arXiv:1909.01917 (2019)."},{"key":"e_1_2_1_42_1","volume-title":"DPCube: Differentially private histogram release through multidimensional partitioning. arXiv preprint arXiv:1202.5358","author":"Xiao Yonghui","year":"2012","unstructured":"Yonghui Xiao , Li Xiong , Liyue Fan , and Slawomir Goryczka . 2012. DPCube: Differentially private histogram release through multidimensional partitioning. arXiv preprint arXiv:1202.5358 ( 2012 ). Yonghui Xiao, Li Xiong, Liyue Fan, and Slawomir Goryczka. 2012. DPCube: Differentially private histogram release through multidimensional partitioning. arXiv preprint arXiv:1202.5358 (2012)."},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2737966"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2013.6544871"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134428"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2882903.2882928"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611973440.68"},{"key":"e_1_2_1_48_1","volume-title":"PrivSyn: Differentially Private Data Synthesis. In USENIX Security Symposium.","author":"Zhang Zhikun","year":"2021","unstructured":"Zhikun Zhang , Tianhao Wang , Ninghui Li , Jean Honorio , Michael Backes , Shibo He , Jiming Chen , and Yang Zhang . 2021 . PrivSyn: Differentially Private Data Synthesis. In USENIX Security Symposium. Zhikun Zhang, Tianhao Wang, Ninghui Li, Jean Honorio, Michael Backes, Shibo He, Jiming Chen, and Yang Zhang. 2021. PrivSyn: Differentially Private Data Synthesis. In USENIX Security Symposium."},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2955503"}],"container-title":["Proceedings of the VLDB Endowment"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.14778\/3538598.3538601","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,28]],"date-time":"2022-12-28T09:23:18Z","timestamp":1672219398000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.14778\/3538598.3538601"}},"subtitle":["differentially private materialized view for exploring high dimensional relational data"],"short-title":[],"issued":{"date-parts":[[2022,5]]},"references-count":49,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2022,5]]}},"alternative-id":["10.14778\/3538598.3538601"],"URL":"https:\/\/doi.org\/10.14778\/3538598.3538601","relation":{},"ISSN":["2150-8097"],"issn-type":[{"value":"2150-8097","type":"print"}],"subject":[],"published":{"date-parts":[[2022,5]]}}}