{"id":"https://openalex.org/W7124439359","doi":"https://doi.org/10.1109/tifs.2026.3654799","title":"Privacy-Preserving Joint Distribution Analysis for Set-Valued Data via Local Differential Privacy","display_name":"Privacy-Preserving Joint Distribution Analysis for Set-Valued Data via Local Differential Privacy","publication_year":2026,"publication_date":"2026-01-01","ids":{"openalex":"https://openalex.org/W7124439359","doi":"https://doi.org/10.1109/tifs.2026.3654799"},"language":null,"primary_location":{"id":"doi:10.1109/tifs.2026.3654799","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2026.3654799","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Yilin Wang","orcid":"https://orcid.org/0009-0004-3493-719X"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yilin Wang","raw_affiliation_strings":["School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123179304","display_name":"Xiong Li","orcid":null},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiong Li","raw_affiliation_strings":["School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123175713","display_name":"Shuai Shang","orcid":null},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shuai Shang","raw_affiliation_strings":["School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123223848","display_name":"Wei Liang","orcid":null},"institutions":[{"id":"https://openalex.org/I121296143","display_name":"Hunan University of Science and Technology","ror":"https://ror.org/02m9vrb24","country_code":"CN","type":"education","lineage":["https://openalex.org/I121296143"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Liang","raw_affiliation_strings":["School of Computer Science and Engineering, Hunan University of Science and Technology, Xiangtan, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Hunan University of Science and Technology, Xiangtan, China","institution_ids":["https://openalex.org/I121296143"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123230871","display_name":"Jinjun Chen","orcid":null},"institutions":[{"id":"https://openalex.org/I57093077","display_name":"Swinburne University of Technology","ror":"https://ror.org/031rekg67","country_code":"AU","type":"education","lineage":["https://openalex.org/I57093077"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Jinjun Chen","raw_affiliation_strings":["Swinburne University of Technology, Melbourne, Australia"],"affiliations":[{"raw_affiliation_string":"Swinburne University of Technology, Melbourne, Australia","institution_ids":["https://openalex.org/I57093077"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5123239161","display_name":"Xiaosong Zhang","orcid":null},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaosong Zhang","raw_affiliation_strings":["School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5123204039","display_name":"Keqin Li","orcid":null},"institutions":[{"id":"https://openalex.org/I157455823","display_name":"SUNY New Paltz","ror":"https://ror.org/03j3dv688","country_code":"US","type":"education","lineage":["https://openalex.org/I157455823"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Keqin Li","raw_affiliation_strings":["Department of Computer Science, State University of New York, New Paltz, NY, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, State University of New York, New Paltz, NY, USA","institution_ids":["https://openalex.org/I157455823"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":7,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I150229711"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.12062865,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"21","issue":null,"first_page":"1155","last_page":"1168"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9642999768257141,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9642999768257141,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.004800000227987766,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.0031999999191612005,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.6708999872207642},{"id":"https://openalex.org/keywords/joint-probability-distribution","display_name":"Joint probability distribution","score":0.5649999976158142},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.536300003528595},{"id":"https://openalex.org/keywords/joint","display_name":"Joint (building)","score":0.5227000117301941},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.5116000175476074},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.4146000146865845},{"id":"https://openalex.org/keywords/probability-distribution","display_name":"Probability distribution","score":0.3732999861240387},{"id":"https://openalex.org/keywords/core","display_name":"Core (optical fiber)","score":0.3677999973297119},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.3619999885559082}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8001999855041504},{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.6708999872207642},{"id":"https://openalex.org/C18653775","wikidata":"https://www.wikidata.org/wiki/Q1333358","display_name":"Joint probability distribution","level":2,"score":0.5649999976158142},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.536300003528595},{"id":"https://openalex.org/C18555067","wikidata":"https://www.wikidata.org/wiki/Q8375051","display_name":"Joint (building)","level":2,"score":0.5227000117301941},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.5116000175476074},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5102999806404114},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.4146000146865845},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4120999872684479},{"id":"https://openalex.org/C149441793","wikidata":"https://www.wikidata.org/wiki/Q200726","display_name":"Probability distribution","level":2,"score":0.3732999861240387},{"id":"https://openalex.org/C2164484","wikidata":"https://www.wikidata.org/wiki/Q5170150","display_name":"Core (optical fiber)","level":2,"score":0.3677999973297119},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.3619999885559082},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.36079999804496765},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.3418999910354614},{"id":"https://openalex.org/C197055811","wikidata":"https://www.wikidata.org/wiki/Q207522","display_name":"Probability density function","level":2,"score":0.3368000090122223},{"id":"https://openalex.org/C110121322","wikidata":"https://www.wikidata.org/wiki/Q865811","display_name":"Distribution (mathematics)","level":2,"score":0.3330000042915344},{"id":"https://openalex.org/C93226319","wikidata":"https://www.wikidata.org/wiki/Q193137","display_name":"Differential (mechanical device)","level":2,"score":0.3294000029563904},{"id":"https://openalex.org/C150807984","wikidata":"https://www.wikidata.org/wiki/Q1992074","display_name":"Bit array","level":3,"score":0.31439998745918274},{"id":"https://openalex.org/C134261354","wikidata":"https://www.wikidata.org/wiki/Q938438","display_name":"Statistical inference","level":2,"score":0.30489999055862427},{"id":"https://openalex.org/C3017597292","wikidata":"https://www.wikidata.org/wiki/Q25052250","display_name":"Privacy protection","level":2,"score":0.27390000224113464},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.2702000141143799},{"id":"https://openalex.org/C167928553","wikidata":"https://www.wikidata.org/wiki/Q1376021","display_name":"Estimation theory","level":2,"score":0.25850000977516174},{"id":"https://openalex.org/C111335779","wikidata":"https://www.wikidata.org/wiki/Q3454686","display_name":"Reduction (mathematics)","level":2,"score":0.2578999996185303},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.2574999928474426},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.2549999952316284}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2026.3654799","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2026.3654799","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.5291935801506042,"display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G3431386612","display_name":null,"funder_award_id":"62332018","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5763297898","display_name":null,"funder_award_id":"2025ZNSFSC0497","funder_id":"https://openalex.org/F4320317778","funder_display_name":"Sichuan\u00a0Provincial\u00a0Postdoctoral\u00a0Science Foundation"},{"id":"https://openalex.org/G7001977797","display_name":null,"funder_award_id":"U25A20429","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320317778","display_name":"Sichuan\u00a0Provincial\u00a0Postdoctoral\u00a0Science Foundation","ror":null},{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W2053801139","https://openalex.org/W2082894754","https://openalex.org/W2091644709","https://openalex.org/W2109426455","https://openalex.org/W2426432085","https://openalex.org/W2532967691","https://openalex.org/W2766587611","https://openalex.org/W2792345738","https://openalex.org/W2794674331","https://openalex.org/W2890248913","https://openalex.org/W2930558539","https://openalex.org/W3198790660","https://openalex.org/W3214878825","https://openalex.org/W4200633373","https://openalex.org/W4210685423","https://openalex.org/W4233751011","https://openalex.org/W4287094564","https://openalex.org/W4308641900","https://openalex.org/W4323896432","https://openalex.org/W4386075835","https://openalex.org/W4387665637","https://openalex.org/W4388858287","https://openalex.org/W4389538596","https://openalex.org/W4389610216","https://openalex.org/W4400315032","https://openalex.org/W4401878991","https://openalex.org/W4404238157"],"related_works":[],"abstract_inverted_index":{"Set-valued":[0],"data,":[1,163],"an":[2],"important":[3],"data":[4,25,46,98,142],"form":[5],"expressing":[6],"diversity":[7],"and":[8,19,81,155,222,233],"uncertainty,":[9],"is":[10,217,229],"widely":[11],"used":[12],"in":[13,195],"fields":[14],"such":[15,24],"as":[16],"recommendation":[17],"systems":[18],"social":[20],"network":[21],"analysis.":[22],"However,":[23],"often":[26],"contains":[27],"fine-grained":[28],"records,":[29],"which":[30],"may":[31],"lead":[32],"to":[33,85,120,161],"the":[34,62,87,95,108,112,127,148,201,212],"leakage":[35],"of":[36,115,129,203,215,220,224,231,235],"users\u2019":[37],"sensitive":[38],"information.":[39],"To":[40,125],"this":[41],"end,":[42],"some":[43],"privacy-preserving":[44,135,165],"set-valued":[45,141],"analysis":[47,138,168,176],"schemes":[48],"have":[49],"been":[50],"proposed.":[51],"This":[52],"paper":[53],"first":[54],"proposes":[55],"a":[56,103,134,157],"joint":[57,136,166,196],"shift":[58],"inference":[59],"attack":[60],"against":[61],"cyclic":[63],"shift-based":[64],"local":[65,116],"differential":[66,117],"privacy":[67,118],"(LDP)":[68],"protocol":[69],"introduced":[70],"by":[71],"Huang":[72],"et":[73],"al.":[74],"(10.1109/TIFS.2024.3423657),":[75],"it":[76],"exploits":[77],"deterministic":[78],"cyclic-shift":[79,109],"patterns":[80],"significant":[82],"frequency":[83],"differences":[84],"infer":[86],"user\u2019s":[88,96],"original":[89,97],"data.":[90],"Experimental":[91],"results":[92,188],"demonstrate":[93],"that":[94,178,190],"can":[99],"be":[100],"inferred":[101],"with":[102,182],"probability":[104],"exceeding":[105],"96%.":[106],"Theoretically,":[107],"mechanism":[110,154],"violates":[111],"core":[113],"requirement":[114],"due":[119],"its":[121,227,238],"non-surjective":[122],"output":[123],"space.":[124],"overcome":[126],"limitations":[128],"existing":[130],"schemes,":[131],"we":[132],"propose":[133],"distribution":[137,167,197],"scheme":[139],"for":[140],"via":[143],"LDP":[144],"(SVJDA).":[145],"It":[146],"employs":[147],"Sparse":[149],"Vector":[150],"Mean":[151],"Estimation":[152],"(SVME)":[153],"utilizes":[156],"sign-based":[158],"hashing":[159],"function":[160],"compress":[162],"allowing":[164],"while":[169,199,226],"introducing":[170],"only":[171,218],"minimal":[172,183],"additional":[173],"noise.":[174],"Theoretical":[175],"shows":[177],"SVJDA":[179,191,216],"satisfies":[180],"\u03f5-LDP":[181],"estimation":[184,198],"error.":[185],"The":[186],"experimental":[187],"confirm":[189],"achieves":[192],"higher":[193],"accuracy":[194,202],"ensuring":[200],"frequent":[204],"itemset":[205],"identification.":[206],"For":[207],"\u03f5":[208],"\u2208":[209],"[0.4,":[210],"1],":[211],"L\u221e":[213],"error":[214],"7.208%\u201321.725%":[219],"SVSM":[221,232],"2.821%\u20137.279%":[223],"LDP-RM,":[225,236],"MSE":[228],"0.00364%\u20132.338%":[230],"0.017%\u20130.068%":[234],"demonstrating":[237],"superior":[239],"performance.":[240]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2026-01-17T00:00:00"}
