{"id":"https://openalex.org/W4319780057","doi":"https://doi.org/10.1109/imcom56909.2023.10035583","title":"Local Hashing and Fake Data for Privacy-Aware Frequency Estimation","display_name":"Local Hashing and Fake Data for Privacy-Aware Frequency Estimation","publication_year":2023,"publication_date":"2023-01-03","ids":{"openalex":"https://openalex.org/W4319780057","doi":"https://doi.org/10.1109/imcom56909.2023.10035583"},"language":"en","primary_location":{"id":"doi:10.1109/imcom56909.2023.10035583","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/imcom56909.2023.10035583","pdf_url":null,"source":{"id":"https://openalex.org/S4363608560","display_name":"2023 17th International Conference on Ubiquitous Information Management and Communication (IMCOM)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 17th International Conference on Ubiquitous Information Management and Communication (IMCOM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5012839765","display_name":"Gatha Varma","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Gatha Varma","raw_affiliation_strings":["Amity Institute of Information Technology, Amity University,Uttar Pradesh,India","Amity Institute of Information Technology, Amity University, Uttar Pradesh, India"],"affiliations":[{"raw_affiliation_string":"Amity Institute of Information Technology, Amity University,Uttar Pradesh,India","institution_ids":[]},{"raw_affiliation_string":"Amity Institute of Information Technology, Amity University, Uttar Pradesh, India","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5012839765"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.1129,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.2024987,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"4"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.993399977684021,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10203","display_name":"Recommender Systems and Techniques","score":0.9890000224113464,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/categorical-variable","display_name":"Categorical variable","score":0.716813862323761},{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.7095040678977966},{"id":"https://openalex.org/keywords/randomized-response","display_name":"Randomized response","score":0.6958699226379395},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6695783734321594},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.5504539608955383},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5241925120353699},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.4944334030151367},{"id":"https://openalex.org/keywords/data-set","display_name":"Data set","score":0.46580320596694946},{"id":"https://openalex.org/keywords/curse-of-dimensionality","display_name":"Curse of dimensionality","score":0.45442700386047363},{"id":"https://openalex.org/keywords/estimator","display_name":"Estimator","score":0.42932701110839844},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.33770352602005005},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.2681432366371155},{"id":"https://openalex.org/keywords/statistics","display_name":"Statistics","score":0.2628333568572998},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.19437092542648315},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.19382241368293762},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.18197137117385864}],"concepts":[{"id":"https://openalex.org/C5274069","wikidata":"https://www.wikidata.org/wiki/Q2285707","display_name":"Categorical variable","level":2,"score":0.716813862323761},{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.7095040678977966},{"id":"https://openalex.org/C2776441110","wikidata":"https://www.wikidata.org/wiki/Q1436628","display_name":"Randomized response","level":3,"score":0.6958699226379395},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6695783734321594},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.5504539608955383},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5241925120353699},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.4944334030151367},{"id":"https://openalex.org/C58489278","wikidata":"https://www.wikidata.org/wiki/Q1172284","display_name":"Data set","level":2,"score":0.46580320596694946},{"id":"https://openalex.org/C111030470","wikidata":"https://www.wikidata.org/wiki/Q1430460","display_name":"Curse of dimensionality","level":2,"score":0.45442700386047363},{"id":"https://openalex.org/C185429906","wikidata":"https://www.wikidata.org/wiki/Q1130160","display_name":"Estimator","level":2,"score":0.42932701110839844},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.33770352602005005},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.2681432366371155},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.2628333568572998},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.19437092542648315},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.19382241368293762},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.18197137117385864},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/imcom56909.2023.10035583","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/imcom56909.2023.10035583","pdf_url":null,"source":{"id":"https://openalex.org/S4363608560","display_name":"2023 17th International Conference on Ubiquitous Information Management and Communication (IMCOM)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 17th International Conference on Ubiquitous Information Management and Communication (IMCOM)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W1981029888","https://openalex.org/W2794674331","https://openalex.org/W2963366347","https://openalex.org/W2964117144","https://openalex.org/W2964138696","https://openalex.org/W3112149836","https://openalex.org/W3200389235","https://openalex.org/W4289517316","https://openalex.org/W6769755587","https://openalex.org/W6779722125"],"related_works":["https://openalex.org/W2172150932","https://openalex.org/W3143451908","https://openalex.org/W2941926315","https://openalex.org/W2305285309","https://openalex.org/W1547696260","https://openalex.org/W2590885329","https://openalex.org/W2185188965","https://openalex.org/W2385431910","https://openalex.org/W3124597164","https://openalex.org/W2250140425"],"abstract_inverted_index":{"Data":[0],"collected":[1,32,69],"from":[2,58],"services":[3],"and":[4,131,149,175,200],"application":[5],"users":[6],"contain":[7],"identifying":[8],"attributes.":[9],"The":[10,27,163,181],"categorical":[11,41],"attributes":[12,42],"of":[13,23,30,40,51,103,156,179],"user":[14,66,85],"data":[15,33,67,86],"capture":[16],"information":[17],"contained":[18],"in":[19,37],"a":[20,55,101,112,176],"fixed":[21],"set":[22,59,102],"domain":[24],"values":[25,159],"<tex>$\\boldsymbol{D}_{\\boldsymbol{m}}$</tex>.":[26,60],"statistical":[28],"analysis":[29],"the":[31,38,48,62,65,84,89,116,138,154,167,186],"drives":[34],"modeling,":[35],"which":[36,143],"case":[39],"is":[43,68,80,98,111],"frequency":[44,71,141],"estimation.":[45],"It":[46],"gives":[47],"approximate":[49],"number":[50],"individuals":[52],"who":[53],"reported":[54],"specific":[56],"value":[57],"Under":[61],"conditions":[63],"where":[64],"repeatedly,":[70],"estimation":[72],"may":[73],"exhibit":[74],"disclosure":[75],"potential":[76],"risks.":[77,96],"Therefore":[78],"it":[79],"important":[81],"to":[82,124,191],"privatize":[83],"such":[87],"that":[88],"statistics":[90],"are":[91,122],"relevant":[92],"yet":[93],"minimize":[94],"privacy":[95,127,202],"This":[97],"achieved":[99],"by":[100,153,170,185],"algorithms":[104],"called":[105],"Frequency":[106],"Oracles.":[107],"Local":[108,146],"Differential":[109],"Privacy":[110],"widely-used":[113],"technique":[114],"for":[115,172,197,204],"concerning":[117],"circumstances.":[118],"Additionally,":[119],"several":[120],"methods":[121],"used":[123,144],"amplify":[125],"its":[126],"guarantees":[128],"including":[129],"sampling":[130],"randomization.":[132],"In":[133],"this":[134],"paper,":[135],"I":[136],"propose":[137],"first":[139],"sample-based":[140],"oracle":[142],"Optimized":[145],"Hashing":[147],"(OLH)":[148],"was":[150,189],"further":[151],"enhanced":[152],"replacement":[155],"some":[157],"attribute":[158],"with":[160],"fake":[161],"data.":[162],"adaptive":[164],"solution":[165,188],"utilized":[166],"benefits":[168],"offered":[169],"OLH":[171],"large-dimensioned":[173],"dataset":[174],"variance":[177],"independent":[178],"dimensionality.":[180],"privacy-utility":[182],"trade-off":[183],"given":[184],"proposed":[187],"found":[190],"be":[192],"better":[193],"than":[194],"existing":[195],"solutions":[196],"certain":[198],"general":[199],"strict":[201],"regimes":[203],"multi-dimensional":[205],"datasets.":[206]},"counts_by_year":[{"year":2023,"cited_by_count":1}],"updated_date":"2025-12-24T23:09:58.560324","created_date":"2025-10-10T00:00:00"}
