{"id":"https://openalex.org/W4411552088","doi":"https://doi.org/10.1109/cscwd64889.2025.11033606","title":"A Personalized Secondary Perturbation Mechanism Based on Local Differential Privacy","display_name":"A Personalized Secondary Perturbation Mechanism Based on Local Differential Privacy","publication_year":2025,"publication_date":"2025-05-05","ids":{"openalex":"https://openalex.org/W4411552088","doi":"https://doi.org/10.1109/cscwd64889.2025.11033606"},"language":"en","primary_location":{"id":"doi:10.1109/cscwd64889.2025.11033606","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cscwd64889.2025.11033606","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 28th International Conference on Computer Supported Cooperative Work in Design (CSCWD)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5002782706","display_name":"Dan Lu","orcid":"https://orcid.org/0000-0002-7537-3173"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Dan Lu","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences,Beijing,China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences,Beijing,China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100665756","display_name":"Yan Wang","orcid":"https://orcid.org/0000-0001-7689-4942"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yan Wang","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences,Beijing,China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences,Beijing,China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103391171","display_name":"Degang Sun","orcid":"https://orcid.org/0009-0003-3418-8558"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Degang Sun","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences,Beijing,China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences,Beijing,China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5002782706"],"corresponding_institution_ids":["https://openalex.org/I19820366","https://openalex.org/I4210156404"],"apc_list":null,"apc_paid":null,"fwci":2.8843,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.91576256,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1106","last_page":"1111"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.8264999985694885,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.8264999985694885,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.7423633337020874},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6376416087150574},{"id":"https://openalex.org/keywords/mechanism","display_name":"Mechanism (biology)","score":0.551223874092102},{"id":"https://openalex.org/keywords/privacy-protection","display_name":"Privacy protection","score":0.4310971796512604},{"id":"https://openalex.org/keywords/perturbation","display_name":"Perturbation (astronomy)","score":0.411540150642395},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2944643795490265},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.20010635256767273},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.18993261456489563},{"id":"https://openalex.org/keywords/quantum-mechanics","display_name":"Quantum mechanics","score":0.07495439052581787}],"concepts":[{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.7423633337020874},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6376416087150574},{"id":"https://openalex.org/C89611455","wikidata":"https://www.wikidata.org/wiki/Q6804646","display_name":"Mechanism (biology)","level":2,"score":0.551223874092102},{"id":"https://openalex.org/C3017597292","wikidata":"https://www.wikidata.org/wiki/Q25052250","display_name":"Privacy protection","level":2,"score":0.4310971796512604},{"id":"https://openalex.org/C177918212","wikidata":"https://www.wikidata.org/wiki/Q803623","display_name":"Perturbation (astronomy)","level":2,"score":0.411540150642395},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2944643795490265},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.20010635256767273},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.18993261456489563},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.07495439052581787}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cscwd64889.2025.11033606","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cscwd64889.2025.11033606","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 28th International Conference on Computer Supported Cooperative Work in Design (CSCWD)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W1873763122","https://openalex.org/W1994952354","https://openalex.org/W2012873258","https://openalex.org/W2016594572","https://openalex.org/W2082894754","https://openalex.org/W2097272254","https://openalex.org/W2110953678","https://openalex.org/W2440056311","https://openalex.org/W2612729617","https://openalex.org/W2746057509","https://openalex.org/W2775133720","https://openalex.org/W2911978475","https://openalex.org/W2924254303","https://openalex.org/W4211007335","https://openalex.org/W4285144537","https://openalex.org/W4387917756","https://openalex.org/W4388895114","https://openalex.org/W6636500457"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W3010781909","https://openalex.org/W4200233390","https://openalex.org/W4315705624","https://openalex.org/W3116386889","https://openalex.org/W4313218046","https://openalex.org/W2605443953","https://openalex.org/W2943138144","https://openalex.org/W1604340626","https://openalex.org/W3127289135"],"abstract_inverted_index":{"With":[0],"the":[1,117,120],"development":[2],"of":[3,119],"location-based":[4],"services":[5],"(LBS)":[6],"in":[7],"mobile":[8],"internet":[9],"and":[10,65,116],"smart":[11],"devices,":[12],"privacy":[13,20,63,84,89,102,128],"leakage":[14],"concerns":[15],"are":[16],"escalating.":[17],"While":[18],"differential":[19,83],"has":[21],"gained":[22],"traction":[23],"for":[24,52,100],"location":[25,45,57,87],"protection":[26],"due":[27],"to":[28,48,85,122],"its":[29],"rigorous":[30],"guarantees,":[31],"existing":[32],"methods":[33],"face":[34],"two":[35],"critical":[36],"challenges:":[37],"repeatedly":[38],"applying":[39],"identical":[40],"mechanisms":[41],"at":[42],"a":[43,94],"single":[44],"enables":[46],"attackers":[47],"leverage":[49],"background":[50],"knowledge":[51],"inference":[53,114],"attacks,":[54],"compromising":[55],"true":[56],"privacy;":[58],"meanwhile,":[59],"they":[60],"lack":[61],"personalized":[62,101],"configurations":[64],"associated":[66],"service":[67,95,124],"quality":[68,96,125],"metrics.":[69],"To":[70],"address":[71],"these":[72],"issues,":[73],"we":[74,92],"propose":[75],"PSPLDP,":[76],"implementing":[77],"dual":[78],"Laplace":[79],"perturbation":[80],"under":[81],"local":[82],"fulfill":[86],"specific":[88],"requirements.":[90],"And":[91],"introduce":[93],"evaluation":[97],"metric":[98,121],"suitable":[99],"settings.":[103,129],"Experiments":[104],"on":[105],"real":[106],"world":[107],"datasets":[108],"demonstrate":[109],"our":[110],"method's":[111],"effectiveness":[112],"against":[113],"attacks":[115],"capability":[118],"quantify":[123],"across":[126],"diverse":[127]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
