{"id":"https://openalex.org/W4415747863","doi":"https://doi.org/10.1109/tdsc.2025.3626789","title":"MPC-FH: Privately Estimating Frequency Histogram for Advertising Measurement","display_name":"MPC-FH: Privately Estimating Frequency Histogram for Advertising Measurement","publication_year":2025,"publication_date":"2025-10-31","ids":{"openalex":"https://openalex.org/W4415747863","doi":"https://doi.org/10.1109/tdsc.2025.3626789"},"language":null,"primary_location":{"id":"doi:10.1109/tdsc.2025.3626789","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2025.3626789","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5022240408","display_name":"Pinghui Wang","orcid":"https://orcid.org/0000-0001-5779-6108"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Pinghui Wang","raw_affiliation_strings":["MOE Key Laboratory for Intelligent Networks and Network Security, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, China","MOE Key Laboratory for Intelligent Networks and Network Security, Xi&#x0027;an Jiaotong University, Xi&#x0027;an, Shaanxi, China"],"raw_orcid":"https://orcid.org/0000-0001-5779-6108","affiliations":[{"raw_affiliation_string":"MOE Key Laboratory for Intelligent Networks and Network Security, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I87445476"]},{"raw_affiliation_string":"MOE Key Laboratory for Intelligent Networks and Network Security, Xi&#x0027;an Jiaotong University, Xi&#x0027;an, Shaanxi, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111849898","display_name":"Haoxin Yang","orcid":"https://orcid.org/0009-0000-5534-110X"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haoxin Yang","raw_affiliation_strings":["MOE Key Laboratory for Intelligent Networks and Network Security, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, China","MOE Key Laboratory for Intelligent Networks and Network Security, Xi&#x0027;an Jiaotong University, Xi&#x0027;an, Shaanxi, China"],"raw_orcid":"https://orcid.org/0009-0000-5534-110X","affiliations":[{"raw_affiliation_string":"MOE Key Laboratory for Intelligent Networks and Network Security, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I87445476"]},{"raw_affiliation_string":"MOE Key Laboratory for Intelligent Networks and Network Security, Xi&#x0027;an Jiaotong University, Xi&#x0027;an, Shaanxi, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5120208046","display_name":"Dongxu Zeng","orcid":"https://orcid.org/0009-0000-4336-120X"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dongxu Zeng","raw_affiliation_strings":["MOE Key Laboratory for Intelligent Networks and Network Security, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, China","MOE Key Laboratory for Intelligent Networks and Network Security, Xi&#x0027;an Jiaotong University, Xi&#x0027;an, Shaanxi, China"],"raw_orcid":"https://orcid.org/0009-0000-4336-120X","affiliations":[{"raw_affiliation_string":"MOE Key Laboratory for Intelligent Networks and Network Security, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I87445476"]},{"raw_affiliation_string":"MOE Key Laboratory for Intelligent Networks and Network Security, Xi&#x0027;an Jiaotong University, Xi&#x0027;an, Shaanxi, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064190343","display_name":"Hong Xie","orcid":null},"institutions":[{"id":"https://openalex.org/I4210123021","display_name":"Chongqing Institute of Green and Intelligent Technology","ror":"https://ror.org/031npqv35","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210123021"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hong Xie","raw_affiliation_strings":["Chongqing Institute of Green and Intelligent Technology, Chinese Academy of Sciences, Chongqing, China"],"raw_orcid":"https://orcid.org/0000-0001-7935-7210","affiliations":[{"raw_affiliation_string":"Chongqing Institute of Green and Intelligent Technology, Chinese Academy of Sciences, Chongqing, China","institution_ids":["https://openalex.org/I4210123021"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007402211","display_name":"Junzhou Zhao","orcid":"https://orcid.org/0000-0003-3476-8248"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Junzhou Zhao","raw_affiliation_strings":["MOE Key Laboratory for Intelligent Networks and Network Security, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, China","MOE Key Laboratory for Intelligent Networks and Network Security, Xi&#x0027;an Jiaotong University, Xi&#x0027;an, Shaanxi, China"],"raw_orcid":"https://orcid.org/0000-0003-3476-8248","affiliations":[{"raw_affiliation_string":"MOE Key Laboratory for Intelligent Networks and Network Security, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I87445476"]},{"raw_affiliation_string":"MOE Key Laboratory for Intelligent Networks and Network Security, Xi&#x0027;an Jiaotong University, Xi&#x0027;an, Shaanxi, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5075845093","display_name":"Xiaohong Guan","orcid":"https://orcid.org/0000-0002-8826-0362"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaohong Guan","raw_affiliation_strings":["MOE Key Laboratory for Intelligent Networks and Network Security, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, China","MOE Key Laboratory for Intelligent Networks and Network Security, Xi&#x0027;an Jiaotong University, Xi&#x0027;an, Shaanxi, China"],"raw_orcid":"https://orcid.org/0000-0002-8826-0362","affiliations":[{"raw_affiliation_string":"MOE Key Laboratory for Intelligent Networks and Network Security, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I87445476"]},{"raw_affiliation_string":"MOE Key Laboratory for Intelligent Networks and Network Security, Xi&#x0027;an Jiaotong University, Xi&#x0027;an, Shaanxi, China","institution_ids":["https://openalex.org/I87445476"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5022240408"],"corresponding_institution_ids":["https://openalex.org/I87445476"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.16170942,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"23","issue":"2","first_page":"2501","last_page":"2518"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.39430001378059387,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.39430001378059387,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.19169999659061432,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.11270000040531158,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.7797999978065491},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.6521000266075134},{"id":"https://openalex.org/keywords/fraction","display_name":"Fraction (chemistry)","score":0.6439999938011169},{"id":"https://openalex.org/keywords/sketch","display_name":"Sketch","score":0.6389999985694885},{"id":"https://openalex.org/keywords/histogram","display_name":"Histogram","score":0.5044999718666077},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.49799999594688416},{"id":"https://openalex.org/keywords/variety","display_name":"Variety (cybernetics)","score":0.4763999879360199}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8579000234603882},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.7797999978065491},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.6521000266075134},{"id":"https://openalex.org/C149629883","wikidata":"https://www.wikidata.org/wiki/Q660926","display_name":"Fraction (chemistry)","level":2,"score":0.6439999938011169},{"id":"https://openalex.org/C2779231336","wikidata":"https://www.wikidata.org/wiki/Q7534724","display_name":"Sketch","level":2,"score":0.6389999985694885},{"id":"https://openalex.org/C53533937","wikidata":"https://www.wikidata.org/wiki/Q185020","display_name":"Histogram","level":3,"score":0.5044999718666077},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.49799999594688416},{"id":"https://openalex.org/C136197465","wikidata":"https://www.wikidata.org/wiki/Q1729295","display_name":"Variety (cybernetics)","level":2,"score":0.4763999879360199},{"id":"https://openalex.org/C18396474","wikidata":"https://www.wikidata.org/wiki/Q2465888","display_name":"Secure multi-party computation","level":3,"score":0.4562999904155731},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4122999906539917},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3837999999523163},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3813000023365021},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.29249998927116394},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.2904999852180481},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.28999999165534973},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.28220000863075256},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.27549999952316284},{"id":"https://openalex.org/C53076038","wikidata":"https://www.wikidata.org/wiki/Q2915383","display_name":"Oblivious transfer","level":3,"score":0.265500009059906}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tdsc.2025.3626789","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2025.3626789","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2455875836","display_name":null,"funder_award_id":"62272372","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G296553909","display_name":null,"funder_award_id":"U22B2019","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W132244987","https://openalex.org/W1524288918","https://openalex.org/W1557833142","https://openalex.org/W1914310517","https://openalex.org/W1981029888","https://openalex.org/W2017184465","https://openalex.org/W2025051251","https://openalex.org/W2032821770","https://openalex.org/W2053801139","https://openalex.org/W2080234606","https://openalex.org/W2144982963","https://openalex.org/W2238607431","https://openalex.org/W2761138375","https://openalex.org/W2792778965","https://openalex.org/W2794685135","https://openalex.org/W2834288129","https://openalex.org/W2911978475","https://openalex.org/W2912161124","https://openalex.org/W3006383271","https://openalex.org/W3103312471","https://openalex.org/W3111514642","https://openalex.org/W3128532268","https://openalex.org/W3189127798","https://openalex.org/W3216119699","https://openalex.org/W4205228770","https://openalex.org/W4293159253","https://openalex.org/W4294904094","https://openalex.org/W4308338766","https://openalex.org/W4308410484","https://openalex.org/W4323034424","https://openalex.org/W4385283793","https://openalex.org/W4393184003","https://openalex.org/W4414004310"],"related_works":[],"abstract_inverted_index":{"An":[0],"advertiser":[1],"typically":[2],"conducts":[3],"a":[4,45,62,79,96,106,122,145],"campaign":[5,25],"across":[6,84,110],"several":[7],"publishers.":[8,28,86],"Different":[9],"publishers":[10,43],"often":[11],"reach":[12],"different":[13],"sets":[14],"of":[15,74,82,108,147,160,165],"persons,":[16],"and":[17,113],"some":[18],"people":[19],"may":[20],"be":[21,115],"exposed":[22],"to":[23,30,36],"the":[24,68,72,137,157],"via":[26],"multiple":[27,42,111],"Due":[29],"privacy":[31],"restrictions,":[32],"it":[33],"is":[34,92,121],"prohibited":[35],"collect":[37],"all":[38,85],"audience":[39,55],"activities":[40],"from":[41],"in":[44],"centralized":[46],"manner,":[47],"therefore,":[48],"we":[49,60],"desire":[50],"secure":[51,63,124],"protocols":[52,162],"for":[53,65],"mining":[54],"activities.":[56],"In":[57,139],"this":[58],"paper,":[59],"propose":[61],"protocol":[64,88,130,153],"efficiently":[66,116],"estimating":[67],"frequency":[69],"histogram,":[70],"i.e.":[71],"fraction":[73,107],"persons":[75],"(or":[76],"users)":[77],"appearing":[78],"given":[80],"number":[81],"times":[83],"Our":[87,129],"<italic":[89,100],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[90,101],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">MPC-FH</i>":[91],"designed":[93],"based":[94],"on":[95,118,144],"novel":[97],"sketch":[98],"method":[99],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">MPS</i>":[102],"that":[103,151],"uniformly":[104],"samples":[105],"users":[109],"parties":[112],"can":[114,154],"implemented":[117],"SPDZ,":[119],"which":[120],"popular":[123],"multiparty":[125],"computation":[126,158],"(MPC)":[127],"scheme.":[128],"provides":[131],"more":[132],"strict":[133],"security":[134],"guarantees":[135],"than":[136],"state-of-the-art.":[138],"addition,":[140],"our":[141,152],"experimental":[142],"results":[143],"variety":[146],"large":[148],"datasets":[149],"demonstrate":[150],"also":[155],"accelerate":[156],"speed":[159],"existing":[161],"by":[163],"orders":[164],"magnitudes.":[166]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-31T00:00:00"}
