{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,3]],"date-time":"2025-11-03T13:48:50Z","timestamp":1762177730401,"version":"3.28.0"},"reference-count":31,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,7,10]],"date-time":"2024-07-10T00:00:00Z","timestamp":1720569600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,7,10]],"date-time":"2024-07-10T00:00:00Z","timestamp":1720569600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,7,10]]},"DOI":"10.23919\/acc60939.2024.10644264","type":"proceedings-article","created":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:56:19Z","timestamp":1725558979000},"page":"4422-4427","source":"Crossref","is-referenced-by-count":3,"title":["Differentially Private Computation of Basic Reproduction Numbers in Networked Epidemic Models"],"prefix":"10.23919","author":[{"given":"Bo","family":"Chen","sequence":"first","affiliation":[{"name":"University of Florida,Department of Mechanical and Aerospace Engineering,Gainesville,FL,USA"}]},{"given":"Baike","family":"She","sequence":"additional","affiliation":[{"name":"University of Florida,Department of Mechanical and Aerospace Engineering,Gainesville,FL,USA"}]},{"given":"Calvin","family":"Hawkins","sequence":"additional","affiliation":[{"name":"University of Florida,Department of Mechanical and Aerospace Engineering,Gainesville,FL,USA"}]},{"given":"Alex","family":"Benvenuti","sequence":"additional","affiliation":[{"name":"University of Florida,Department of Mechanical and Aerospace Engineering,Gainesville,FL,USA"}]},{"given":"Brandon","family":"Fallin","sequence":"additional","affiliation":[{"name":"University of Florida,Department of Mechanical and Aerospace Engineering,Gainesville,FL,USA"}]},{"given":"Philip E.","family":"Par\u00e9","sequence":"additional","affiliation":[{"name":"Elmore Family School of Electrical and Computer engineering at Purdue University,West Lafayette,IN,USA"}]},{"given":"Matthew","family":"Hale","sequence":"additional","affiliation":[{"name":"University of Florida,Department of Mechanical and Aerospace Engineering,Gainesville,FL,USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78911-6_2"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.arcontrol.2020.09.003"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CDC45484.2021.9683146"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.arcontrol.2017.09.002"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1126\/science.1245200"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/S2589-7500(20)30133-3"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.3201\/eid2501.171901"},{"key":"ref8","article-title":"When will it be over?\u201d: An introduction to viral reproduction numbers, R0 and Re","volume":"14","author":"Aronson","year":"2020","journal-title":"The Centre for Evidence-Based Medicine"},{"key":"ref9","first-page":"983","article-title":"Locally differentially private analysis of graph statistics","volume-title":"Proc. 30th USENIX security symposium (USENIX Security 21)","author":"Imola"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2611523"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2882903.2926745"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CDC45484.2021.9683306"},{"journal-title":"U.S. Census Bureau","article-title":"Why the Census Bureau chose differential privacy","year":"2023","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2902251.2902291"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1561\/0400000042"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.29012\/jpc.850"},{"key":"ref17","article-title":"Node and edge differential privacy for graph Laplacian spectra: Mechanisms and scaling laws","author":"Hawkins","year":"2022","journal-title":"arXiv preprint"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2009.11"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2422436.2422449"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36594-2_26"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37456-2_28"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243750"},{"key":"ref23","first-page":"arXiv-2305","article-title":"Steady-state analysis of networked epidemic models","author":"Zhen Khong","year":"2023","journal-title":"arXiv e-prints"},{"key":"ref24","article-title":"Auditing differentially private machine learning: How private is private SGD?","author":"Jagielski","year":"2020","journal-title":"arXiv preprint"},{"key":"ref25","article-title":"Ad-versary instantiation: Lower bounds for differentially private machine learning","author":"Nasr","year":"2021","journal-title":"arXiv preprint"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330885"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833677"},{"key":"ref28","first-page":"35","article-title":"The truncated normal distribution","volume":"1","author":"Burkardt","year":"2014","journal-title":"Department of Scien-tific Computing Website, Florida State University"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.23919\/acc60939.2024.10644264"},{"volume-title":"Minnesota coronavirus cases and deaths","year":"2023","key":"ref30"},{"key":"ref31","article-title":"Analysis and applications of population flows in a networked SEIRS epidemic process","author":"Butler","year":"2023","journal-title":"ArXiv"}],"event":{"name":"2024 American Control Conference (ACC)","start":{"date-parts":[[2024,7,10]]},"location":"Toronto, ON, Canada","end":{"date-parts":[[2024,7,12]]}},"container-title":["2024 American Control Conference (ACC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10644130\/10644150\/10644264.pdf?arnumber=10644264","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T05:37:34Z","timestamp":1725687454000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10644264\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,10]]},"references-count":31,"URL":"https:\/\/doi.org\/10.23919\/acc60939.2024.10644264","relation":{},"subject":[],"published":{"date-parts":[[2024,7,10]]}}}