{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T05:45:22Z","timestamp":1725860722536},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319402529"},{"type":"electronic","value":"9783319402536"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-40253-6_9","type":"book-chapter","created":{"date-parts":[[2016,6,29]],"date-time":"2016-06-29T15:00:31Z","timestamp":1467212431000},"page":"141-157","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Towards Privacy-Preserving Data Mining in Online Social Networks: Distance-Grained and Item-Grained Differential Privacy"],"prefix":"10.1007","author":[{"given":"Shen","family":"Yan","sequence":"first","affiliation":[]},{"given":"Shiran","family":"Pan","sequence":"additional","affiliation":[]},{"given":"Yuhang","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Wen-Tao","family":"Zhu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,6,30]]},"reference":[{"key":"9_CR1","unstructured":"Dwyer, C., Hiltz, S., Passerini, K.: Trust and privacy concern within social networking sites: a comparison of Facebook and MySpace. In: 13th Americas Conference on Information Systems (AMCIS), pp. 339:1\u2013339:13 (2007)"},{"issue":"4","key":"9_CR2","first-page":"13","volume":"24","author":"C Zhang","year":"2010","unstructured":"Zhang, C., Sun, J., Zhu, X., Fang, Y.: Privacy and security for online social networks: challenges and opportunities. Network 24(4), 13\u201318 (2010). IEEE","journal-title":"Network"},{"issue":"5","key":"9_CR3","doi-asserted-by":"publisher","first-page":"350","DOI":"10.1080\/10447318.2014.1001300","volume":"31","author":"R Fogues","year":"2015","unstructured":"Fogues, R., Such, J.M., Espinosa, A., Garcia-Fornes, A.: Open challenges in relationship-based privacy mechanisms for social network services. Int. J. Hum.-comput. Interact. 31(5), 350\u2013370 (2015)","journal-title":"Int. J. Hum.-comput. Interact."},{"issue":"1","key":"9_CR4","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1109\/TKDE.2013.109","volume":"26","author":"X Wu","year":"2014","unstructured":"Wu, X., Zhu, X., Wu, G.Q., Ding, W.: Data mining with big data. IEEE Trans. Knowl. Data Eng. 26(1), 97\u2013107 (2014). IEEE","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"4","key":"9_CR5","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1145\/1749603.1749605","volume":"42","author":"B Fung","year":"2010","unstructured":"Fung, B., Wang, K., Chen, R., Yu, P.S.: Privacy-preserving data publishing: a survey of recent developments. ACM Comput. Surv. (CSUR) 42(4), 14 (2010). ACM","journal-title":"ACM Comput. Surv. (CSUR)"},{"issue":"05","key":"9_CR6","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L.: $$k$$ -anonymity: a model for protecting privacy. Int. J. Uncertainty Fuzziness Knowl. Based Syst. 10(05), 557\u2013570 (2002)","journal-title":"Int. J. Uncertainty Fuzziness Knowl. Based Syst."},{"issue":"1","key":"9_CR7","first-page":"3:1","volume":"1","author":"A Machanavajjhala","year":"2007","unstructured":"Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: $$l$$ -diversity: privacy beyond $$k$$ -anonymity. ACM Trans. Knowl. Discov. Data (TKDD) 1(1), 3:1\u20133:52 (2007)","journal-title":"ACM Trans. Knowl. Discov. Data (TKDD)"},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"Li, N., Li, T., Venkatasubramanian, S.: $$t$$ -closeness: Privacy beyond $$k$$ -anonymity and $$l$$ -diversity. In: 23rd International Conference on Data Engineering (ICDE 2007), pp. 106\u2013115. IEEE (2007)","DOI":"10.1109\/ICDE.2007.367856"},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"Wong, R.C.W., Li, J., Fu, A.W.C., Wang, K.: ( $$\\alpha $$ , $$k$$ )-anonymity: an enhanced $$k$$ -anonymity model for privacy preserving data publishing. In: 12th SIGKDD Conference on Knowledge Discovery and Data Mining (KDD 2006), pp. 754\u2013759. ACM (2006)","DOI":"10.1145\/1150402.1150499"},{"issue":"1","key":"9_CR10","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1145\/1866739.1866758","volume":"54","author":"C Dwork","year":"2011","unstructured":"Dwork, C.: A firm foundation for private data analysis. Commun. ACM 54(1), 86\u201395 (2011). ACM","journal-title":"Commun. ACM"},{"key":"9_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11787006_1","volume-title":"Automata, Languages and Programming","author":"C Dwork","year":"2006","unstructured":"Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1\u201312. Springer, Heidelberg (2006)"},{"issue":"4","key":"9_CR12","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1145\/1594977.1592585","volume":"39","author":"R Baden","year":"2009","unstructured":"Baden, R., Bender, A., Spring, N., Bhattacharjee, B., Starin, D.: Persona: an online social network with user-defined privacy. ACM SIGCOMM Comput. Commun. Rev. 39(4), 135\u2013146 (2009). ACM","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"issue":"9","key":"9_CR13","doi-asserted-by":"publisher","first-page":"1598","DOI":"10.1109\/TKDE.2011.124","volume":"24","author":"Y Li","year":"2012","unstructured":"Li, Y., Chen, M., Li, Q., Zhang, W.: Enabling multilevel trust in privacy preserving data mining. IEEE Trans. Knowl. Data Eng. 24(9), 1598\u20131612 (2012). IEEE","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"9_CR14","doi-asserted-by":"crossref","unstructured":"Ebadi, H., Sands, D., Schneider, G.: Differential privacy: now it\u2019s getting personal. In: 42nd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL 2015), pp. 69\u201381 (2015)","DOI":"10.1145\/2775051.2677005"},{"key":"9_CR15","doi-asserted-by":"crossref","unstructured":"Jorgensen, Z., Yu, T., Cormode, G.: Conservative or liberal? Personalized differential privacy. In: 31st International Conference on Data Engineering (ICDE 2015), pp. 13\u201317. IEEE (2015)","DOI":"10.1109\/ICDE.2015.7113353"},{"key":"9_CR16","unstructured":"Koufogiannis, F., Pappas, G.: Diffusing private data over networks (2015). arXiv preprint arXiv:1511.06253"},{"key":"9_CR17","unstructured":"Alaggan, M., Gambs, S., Kermarrec, A.M.: Heterogeneous differential privacy. arXiv preprint (2015). arXiv:1504.06998"},{"key":"9_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/11681878_14","volume-title":"Theory of Cryptography","author":"C Dwork","year":"2006","unstructured":"Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 265\u2013284. Springer, Heidelberg (2006)"},{"issue":"2","key":"9_CR19","doi-asserted-by":"publisher","first-page":"141","DOI":"10.14778\/1921071.1921080","volume":"4","author":"M Yuan","year":"2010","unstructured":"Yuan, M., Chen, L., Yu, P.S.: Personalized privacy protection in social networks. Proc. VLDB Endowment 4(2), 141\u2013150 (2010). ACM","journal-title":"Proc. VLDB Endowment"},{"key":"9_CR20","unstructured":"Koufogiannis, F., Han, S., Pappas, G.J.: Gradual release of sensitive data under differential privacy (2015). arXiv preprint arXiv:1504.00429"},{"key":"9_CR21","doi-asserted-by":"crossref","unstructured":"Zhang, N., Li, M., Lou, W.: Distributed data mining with differential privacy. In: IEEE International Conference on Communications (ICC 2011). IEEE (2011)","DOI":"10.1109\/icc.2011.5962863"}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-40253-6_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,18]],"date-time":"2023-08-18T22:15:52Z","timestamp":1692396952000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-40253-6_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319402529","9783319402536"],"references-count":21,"URL":"http:\/\/dx.doi.org\/10.1007\/978-3-319-40253-6_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"30 June 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}