{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T05:05:54Z","timestamp":1743051954020,"version":"3.40.3"},"publisher-location":"Cham","reference-count":42,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030112370"},{"type":"electronic","value":"9783030112387"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-11238-7_2","type":"book-chapter","created":{"date-parts":[[2019,1,24]],"date-time":"2019-01-24T04:05:25Z","timestamp":1548302725000},"page":"18-39","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["MobilityMirror: Bias-Adjusted Transportation Datasets"],"prefix":"10.1007","author":[{"given":"Luke","family":"Rodriguez","sequence":"first","affiliation":[]},{"given":"Babak","family":"Salimi","sequence":"additional","affiliation":[]},{"given":"Haoyue","family":"Ping","sequence":"additional","affiliation":[]},{"given":"Julia","family":"Stoyanovich","sequence":"additional","affiliation":[]},{"given":"Bill","family":"Howe","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,23]]},"reference":[{"key":"2_CR1","unstructured":"Amazon doesn\u2019t consider the race of its customers. should it? Bloomberg (2016)"},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"Acs, G., Castelluccia, C., Chen, R.: Differentially private histogram publishing through lossy compression. In: 2012 IEEE 12th International Conference on Data Mining (ICDM), pp. 1\u201310. IEEE (2012)","DOI":"10.1109\/ICDM.2012.80"},{"key":"2_CR3","unstructured":"Angwin, J., Larson, J., Mattu, S., Kirchner, L.: Machine bias: risk assessments in criminal sentencing. ProPublica, 23 May 2016"},{"key":"2_CR4","first-page":"671","volume":"104","author":"S Barocas","year":"2016","unstructured":"Barocas, S., Selbst, A.: Big data\u2019s disparate impact. Calif. Law Rev. 104, 671 (2016)","journal-title":"Calif. Law Rev."},{"key":"2_CR5","unstructured":"Brauneis, R., Goodman, E.P.: Algorithmic transparency for the smart city. Yale J. Law Technol., forthcoming"},{"key":"2_CR6","doi-asserted-by":"crossref","unstructured":"Brock, A.M., et al.: SIG: making maps accessible and putting accessibility in maps. In: Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems, p. SIG03. ACM (2018)","DOI":"10.1145\/3170427.3185373"},{"issue":"4","key":"2_CR7","doi-asserted-by":"publisher","first-page":"653","DOI":"10.1007\/s00778-013-0344-8","volume":"23","author":"R Chen","year":"2014","unstructured":"Chen, R., Fung, B.C., Yu, P.S., Desai, B.C.: Correlated network data publication via differential privacy. VLDB J. 23(4), 653\u2013676 (2014)","journal-title":"VLDB J."},{"key":"2_CR8","doi-asserted-by":"crossref","unstructured":"Cormode, G., Procopiuc, M., Srivastava, D., Tran, T.T.: Differentially private publication of sparse data. arXiv preprint arXiv:1103.0825 (2011)","DOI":"10.1145\/2274576.2274608"},{"key":"2_CR9","doi-asserted-by":"crossref","unstructured":"Datta, A., Sen, S., Zick, Y.: Algorithmic transparency via quantitative input influence: theory and experiments with learning systems. In: IEEE SP, pp. 598\u2013617 (2016)","DOI":"10.1109\/SP.2016.42"},{"issue":"1","key":"2_CR10","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1515\/popets-2015-0007","volume":"2015","author":"A Datta","year":"2015","unstructured":"Datta, A., Tschantz, M.C., Datta, A.: Automated experiments on ad privacy settings. PoPETs 2015(1), 92\u2013112 (2015)","journal-title":"PoPETs"},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"Day, W.-Y., Li, N.: Differentially private publishing of high-dimensional data using sensitivity control. In Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, pp. 451\u2013462. ACM (2015)","DOI":"10.1145\/2714576.2714621"},{"key":"2_CR12","doi-asserted-by":"publisher","first-page":"1376","DOI":"10.1038\/srep01376","volume":"3","author":"Y-A Montjoye de","year":"2013","unstructured":"de Montjoye, Y.-A., Hidalgo, C.A., Verleysen, M., Blondel, V.D.: Unique in the crowd: the privacy bounds of human mobility. Sci. Rep. 3, 1376 (2013)","journal-title":"Sci. Rep."},{"key":"2_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11787006_1","volume-title":"Automata, Languages and Programming","author":"C Dwork","year":"2006","unstructured":"Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1\u201312. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11787006_1"},{"key":"2_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/11681878_14","volume-title":"Theory of Cryptography","author":"C Dwork","year":"2006","unstructured":"Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 265\u2013284. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11681878_14"},{"key":"2_CR15","doi-asserted-by":"crossref","unstructured":"Feldman, M., Friedler, S.A., Moeller, J., Scheidegger, C., Venkatasubramanian, S.: Certifying and removing disparate impact. In: Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2015, pp. 259\u2013268. ACM, New York (2015)","DOI":"10.1145\/2783258.2783311"},{"key":"2_CR16","doi-asserted-by":"crossref","unstructured":"Ferris, B., Watkins, K., Borning, A.: OneBusAway: results from providing real-time arrival information for public transit. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 1807\u20131816. ACM (2010)","DOI":"10.1145\/1753326.1753597"},{"key":"2_CR17","doi-asserted-by":"crossref","unstructured":"Galhotra, S., Brun, Y., Meliou, A.: Fairness testing: testing software for discrimination. In: Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, ESEC\/FSE 2017, Paderborn, Germany, 4\u20138 September 2017, pp. 498\u2013510 (2017)","DOI":"10.1145\/3106237.3106277"},{"key":"2_CR18","doi-asserted-by":"crossref","unstructured":"Ge, Y., Knittel, C.R., MacKenzie, D., Zoepf, S.: Racial and gender discrimination in transportation network companies. Working Paper 22776, National Bureau of Economic Research, October 2016","DOI":"10.3386\/w22776"},{"issue":"6","key":"2_CR19","doi-asserted-by":"publisher","first-page":"1673","DOI":"10.1137\/09076828X","volume":"41","author":"A Ghosh","year":"2012","unstructured":"Ghosh, A., Roughgarden, T., Sundararajan, M.: Universally utility-maximizing privacy mechanisms. SIAM J. Comput. 41(6), 1673\u20131693 (2012)","journal-title":"SIAM J. Comput."},{"issue":"1\u20132","key":"2_CR20","doi-asserted-by":"publisher","first-page":"1021","DOI":"10.14778\/1920841.1920970","volume":"3","author":"M Hay","year":"2010","unstructured":"Hay, M., Rastogi, V., Miklau, G., Suciu, D.: Boosting the accuracy of differentially private histograms through consistency. Proc. VLDB Endow. 3(1\u20132), 1021\u20131032 (2010)","journal-title":"Proc. VLDB Endow."},{"key":"2_CR21","unstructured":"Kilbertus, N., Carulla, M.R., Parascandolo, G., Hardt, M., Janzing, D., Sch\u00f6lkopf, B.: Avoiding discrimination through causal reasoning. In: Advances in Neural Information Processing Systems, pp. 656\u2013666 (2017)"},{"issue":"2","key":"2_CR22","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1145\/3022181","volume":"60","author":"K Kirkpatrick","year":"2017","unstructured":"Kirkpatrick, K.: It\u2019s not the algorithm, it\u2019s the data. Commun. ACM 60(2), 21\u201323 (2017)","journal-title":"Commun. ACM"},{"key":"2_CR23","doi-asserted-by":"crossref","unstructured":"Kumar, R., Vassilvitskii, S.: Generalized distances between rankings. In: Proceedings of the 19th International Conference on World Wide Web, WWW 2010, Raleigh, North Carolina, USA, 26\u201330 April 2010, pp. 571\u2013580 (2010)","DOI":"10.1145\/1772690.1772749"},{"key":"2_CR24","unstructured":"Kusner, M.J., Loftus, J., Russell, C., Silva, R.: Counterfactual fairness. In: Advances in Neural Information Processing Systems, pp. 4069\u20134079 (2017)"},{"key":"2_CR25","doi-asserted-by":"crossref","unstructured":"Lu, W., Miklau, G., Gupta, V.: Generating private synthetic databases for untrusted system evaluation. In: 2014 IEEE 30th International Conference on Data Engineering (ICDE), pp. 652\u2013663. IEEE (2014)","DOI":"10.1109\/ICDE.2014.6816689"},{"key":"2_CR26","doi-asserted-by":"publisher","first-page":"1782","DOI":"10.1109\/TKDE.2014.2334313","volume":"27","author":"S Ma","year":"2015","unstructured":"Ma, S., Zheng, Y., Wolfson, O.: Real-time city-scale taxi ridesharing. IEEE Trans. Knowl. Data Eng. 27, 1782\u20131795 (2015)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"2_CR27","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-2227-2","volume-title":"Low Rank Approximation: Algorithms, Implementation, Applications","author":"I Markovsky","year":"2011","unstructured":"Markovsky, I.: Low Rank Approximation: Algorithms, Implementation, Applications. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-1-4471-2227-2"},{"issue":"2","key":"2_CR28","doi-asserted-by":"publisher","first-page":"205395171560249","DOI":"10.1177\/2053951715602495","volume":"2","author":"DA McFarland","year":"2015","unstructured":"McFarland, D.A., McFarland, H.R.: Big data and the danger of being precisely inaccurate. Big Data Soc. 2(2), 2053951715602495 (2015)","journal-title":"Big Data Soc."},{"issue":"3","key":"2_CR29","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1007\/s41650-017-0014-x","volume":"2","author":"X Meng","year":"2017","unstructured":"Meng, X., Li, H., Cui, J.: Different strategies for differentially private histogram publication. J. Commun. Inf. Netw. 2(3), 68\u201377 (2017)","journal-title":"J. Commun. Inf. Netw."},{"key":"2_CR30","unstructured":"MetroLab Network. First, do no harm: Ethical guidelines for applying predictive tools within human services (2018, forthcoming). http:\/\/www.alleghenycountyanalytics.us\/"},{"key":"2_CR31","doi-asserted-by":"crossref","unstructured":"Nabi, R., Shpitser, I.: Fair inference on outcomes. In: Proceedings of the AAAI Conference on Artificial Intelligence. AAAI Conference on Artificial Intelligence, vol. 2018, p. 1931. NIH Public Access (2018)","DOI":"10.1609\/aaai.v32i1.11553"},{"key":"2_CR32","unstructured":"NYC Taxi and Limousine Commission. TLC trip record data (2018). http:\/\/www.nyc.gov\/html\/tlc\/html\/about\/trip_record_data.shtml . Accessed 2 June 2018"},{"key":"2_CR33","doi-asserted-by":"crossref","unstructured":"Rastogi, V., Nath, S.: Differentially private aggregation of distributed time-series with transformation and encryption. In: Proceedings of the 2010 ACM SIGMOD International Conference on Management of data, pp. 735\u2013746. ACM (2010)","DOI":"10.1145\/1807167.1807247"},{"issue":"469","key":"2_CR34","doi-asserted-by":"publisher","first-page":"322","DOI":"10.1198\/016214504000001880","volume":"100","author":"DB Rubin","year":"2005","unstructured":"Rubin, D.B.: Causal inference using potential outcomes: design, modeling, decisions. J. Am. Stat. Assoc. 100(469), 322\u2013331 (2005)","journal-title":"J. Am. Stat. Assoc."},{"key":"2_CR35","doi-asserted-by":"crossref","unstructured":"Salimi, B., Gehrke, J., Suciu, D.: Bias in OLAP queries: detection, explanation, and removal. In: Proceedings of the 2018 International Conference on Management of Data, pp. 1021\u20131035. ACM (2018)","DOI":"10.1145\/3183713.3196914"},{"issue":"5","key":"2_CR36","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1145\/2447976.2447990","volume":"56","author":"L Sweeney","year":"2013","unstructured":"Sweeney, L.: Discrimination in online Ad delivery. Commun. ACM 56(5), 44\u201354 (2013)","journal-title":"Commun. ACM"},{"issue":"8","key":"2_CR37","doi-asserted-by":"publisher","first-page":"1200","DOI":"10.1109\/TKDE.2010.247","volume":"23","author":"X Xiao","year":"2011","unstructured":"Xiao, X., Wang, G., Gehrke, J.: Differential privacy via wavelet transforms. IEEE Trans. Knowl. Data Eng. 23(8), 1200\u20131214 (2011)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"2_CR38","unstructured":"Xiao, Y., Xiong, L., Fan, L., Goryczka, S.: Dpcube: differentially private histogram release through multidimensional partitioning. arXiv preprint arXiv:1202.5358 (2012)"},{"issue":"6","key":"2_CR39","doi-asserted-by":"publisher","first-page":"797","DOI":"10.1007\/s00778-013-0309-y","volume":"22","author":"J Xu","year":"2013","unstructured":"Xu, J., Zhang, Z., Xiao, X., Yang, Y., Yu, G., Winslett, M.: Differentially private histogram publication. VLDB J. 22(6), 797\u2013822 (2013)","journal-title":"VLDB J."},{"key":"2_CR40","unstructured":"Zemel, R.S., Wu, Y., Swersky, K., Pitassi, T., Dwork, C.: Learning fair representations. In: ICML, pp. 325\u2013333 (2013)"},{"issue":"12","key":"2_CR41","doi-asserted-by":"publisher","first-page":"e0168604","DOI":"10.1371\/journal.pone.0168604","volume":"11","author":"Y Zhang","year":"2016","unstructured":"Zhang, Y., Thomas, T., Brussel, M., van Maarseveen, M.: Expanding bicycle-sharing systems: lessons learnt from an analysis of usage. PLoS One 11(12), e0168604 (2016)","journal-title":"PLoS One"},{"issue":"4","key":"2_CR42","doi-asserted-by":"publisher","first-page":"1060","DOI":"10.1007\/s10618-017-0506-1","volume":"31","author":"I Zliobaite","year":"2017","unstructured":"Zliobaite, I.: Measuring discrimination in algorithmic decision making. Data Min. Knowl. Discov. 31(4), 1060\u20131089 (2017)","journal-title":"Data Min. Knowl. Discov."}],"container-title":["Communications in Computer and Information Science","Big Social Data and Urban Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-11238-7_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,13]],"date-time":"2023-09-13T03:56:29Z","timestamp":1694577389000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-11238-7_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030112370","9783030112387"],"references-count":42,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-11238-7_2","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"23 January 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"BiDU","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Workshop on Big Social Data and Urban Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Rio de Janeiro","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Brazil","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 August 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 August 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"bidu2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/sites.google.com\/view\/bidu2018\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}