{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,28]],"date-time":"2024-11-28T01:47:49Z","timestamp":1732758469491,"version":"3.29.0"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031696503"},{"type":"electronic","value":"9783031696510"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-69651-0_4","type":"book-chapter","created":{"date-parts":[[2024,9,12]],"date-time":"2024-09-12T07:30:40Z","timestamp":1726126240000},"page":"51-66","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Asymptotic Utility of\u00a0Spectral Anonymization"],"prefix":"10.1007","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-3812-0871","authenticated-orcid":false,"given":"Katariina","family":"Perkonoja","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-2150-2769","authenticated-orcid":false,"given":"Joni","family":"Virta","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,9,13]]},"reference":[{"key":"4_CR1","unstructured":"Awan, J., Kenney, A., Reimherr, M., Slavkovi\u0107, A.: Benefits and pitfalls of the exponential mechanism with applications to Hilbert spaces and functional PCA. In: Proceedings of the 36th International Conference on Machine Learning, vol.\u00a097, pp. 374\u2014384. PMLR (2019)"},{"key":"4_CR2","volume-title":"Discrete Multivariate Analysis: Theory and Practice","author":"YM Bishop","year":"2007","unstructured":"Bishop, Y.M., Fienberg, S.E., Holland, P.W.: Discrete Multivariate Analysis: Theory and Practice. Springer, New York (2007)"},{"key":"4_CR3","doi-asserted-by":"crossref","unstructured":"Calvi\u00f1o, A., Aldeguer, P., Domingo-Ferrer, J.: Factor analysis for anonymization. In: 2017 IEEE International Conference on Data Mining Workshops (ICDMW), pp. 984\u2013991 (2017)","DOI":"10.1109\/ICDMW.2017.139"},{"key":"4_CR4","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1016\/S0377-0427(03)00643-5","volume":"164\u2013165","author":"J Domingo-Ferrer","year":"2004","unstructured":"Domingo-Ferrer, J., Torra, V.: Disclosure risk assessment in statistical data protection. J. Comput. Appl. Math. 164\u2013165, 285\u2013293 (2004)","journal-title":"J. Comput. Appl. Math."},{"key":"4_CR5","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/978-3-031-13945-1_3","volume-title":"Privacy in Statistical Databases","author":"M Dunsche","year":"2022","unstructured":"Dunsche, M., Kutta, T., Dette, H.: Multivariate mean comparison under differential privacy. In: Domingo-Ferrer, J., Laurent, M. (eds.) PSD 2022. LNCS, vol. 13463, pp. 31\u201345. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-13945-1_3"},{"key":"4_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11787006_1","volume-title":"Automata, Languages and Programming","author":"C Dwork","year":"2006","unstructured":"Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1\u201312. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11787006_1"},{"key":"4_CR7","doi-asserted-by":"publisher","DOI":"10.1007\/1-4020-3419-9","volume-title":"Advanced Multivariate Statistics with Matrices","author":"T Kollo","year":"2005","unstructured":"Kollo, T., von Rosen, D.: Advanced Multivariate Statistics with Matrices. Springer, Dordrecht (2005)"},{"key":"4_CR8","doi-asserted-by":"crossref","unstructured":"Kundu, S., Suthaharan, S.: Privacy-preserving predictive model using factor analysis for neuroscience applications. In: IEEE International Conference on Big Data Security on Cloud (BigDataSecurity), High Performance and Smart Computing (HPSC) and Intelligent Data and Security (IDS), pp. 67\u201373. IEEE (2019)","DOI":"10.1109\/BigDataSecurity-HPSC-IDS.2019.00023"},{"issue":"3","key":"4_CR9","doi-asserted-by":"publisher","first-page":"437","DOI":"10.1109\/TKDE.2009.88","volume":"22","author":"TA Lasko","year":"2009","unstructured":"Lasko, T.A., Vinterbo, S.A.: Spectral anonymization of data. IEEE Trans. Knowl. Data Eng. 22(3), 437\u2013446 (2009)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"4_CR10","doi-asserted-by":"crossref","unstructured":"Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: l-diversity. ACM Trans. Knowl. Discov. Data 1, 3-es (2007)","DOI":"10.1145\/1217299.1217302"},{"issue":"5","key":"4_CR11","doi-asserted-by":"publisher","first-page":"658","DOI":"10.1287\/mnsc.1050.0503","volume":"52","author":"K Muralidhar","year":"2006","unstructured":"Muralidhar, K., Sarathy, R.: Data shuffling-a new masking approach for numerical data. Manag. Sci. 52(5), 658\u2013670 (2006)","journal-title":"Manag. Sci."},{"key":"4_CR12","doi-asserted-by":"crossref","unstructured":"Ninghui, L., Tiancheng, L., Venkatasubramanian, S.: t-closeness: privacy beyond k-anonymity and l-diversity. In: Proceedings of the 23rd International Conference on Data Engineering, pp. 106\u2013115 (2007)","DOI":"10.1109\/ICDE.2007.367856"},{"key":"4_CR13","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1214\/11-PS182","volume":"8","author":"N Ross","year":"2011","unstructured":"Ross, N.: Fundamentals of Stein\u2019s method. Probab. Surv. 8, 210\u2013293 (2011)","journal-title":"Probab. Surv."},{"key":"4_CR14","unstructured":"Seeman, J., Reimherr, M., Slavkovi\u0107, A.: Exact privacy guarantees for Markov chain implementations of the exponential mechanism with artificial atoms. In: Advances in Neural Information Processing Systems, vol.\u00a034, pp. 13125\u201313136. Curran Associates, Inc. (2021)"},{"issue":"2","key":"4_CR15","first-page":"229","volume":"24","author":"N Shlomo","year":"2008","unstructured":"Shlomo, N., De Waal, T.: Protection of micro-data subject to edit constraints against statistical disclosure. J. Off. Stat. 24(2), 229\u2013253 (2008)","journal-title":"J. Off. Stat."},{"issue":"3","key":"4_CR16","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1137\/0717034","volume":"17","author":"GW Stewart","year":"1980","unstructured":"Stewart, G.W.: The efficient generation of random orthogonal matrices with an application to condition estimators. SIAM J. Numer. Anal. 17(3), 403\u2013409 (1980)","journal-title":"SIAM J. Numer. Anal."},{"key":"4_CR17","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl.-Based Syst. 10, 557\u2013570 (2002)","journal-title":"Int. J. Uncertain. Fuzziness Knowl.-Based Syst."},{"issue":"2","key":"4_CR18","doi-asserted-by":"publisher","first-page":"429","DOI":"10.1093\/biomet\/69.2.429","volume":"69","author":"DE Tyler","year":"1982","unstructured":"Tyler, D.E.: Radial estimates and the test for sphericity. Biometrika 69(2), 429\u2013436 (1982)","journal-title":"Biometrika"},{"key":"4_CR19","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1090\/conm\/287\/04793","volume":"287","author":"MA Viana","year":"2001","unstructured":"Viana, M.A.: The covariance structure of random permutation matrices. Contemp. Math. 287, 303\u2013326 (2001)","journal-title":"Contemp. Math."},{"key":"4_CR20","unstructured":"Xiao, H., Ye, Y., Devadas, S.: Local differential privacy in decentralized optimization. arXiv preprint (2019)"}],"container-title":["Lecture Notes in Computer Science","Privacy in Statistical Databases"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-69651-0_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,28]],"date-time":"2024-11-28T01:14:57Z","timestamp":1732756497000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-69651-0_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031696503","9783031696510"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-69651-0_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"13 September 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"PSD","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Privacy in Statistical Databases","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Antibes Juan-les-Pins","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 September 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 September 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"psd2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/crises-deim.urv.cat\/psd2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}