{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T06:03:32Z","timestamp":1730268212171,"version":"3.28.0"},"reference-count":42,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,5,20]],"date-time":"2024-05-20T00:00:00Z","timestamp":1716163200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,5,20]],"date-time":"2024-05-20T00:00:00Z","timestamp":1716163200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,5,20]]},"DOI":"10.1109\/infocom52122.2024.10621436","type":"proceedings-article","created":{"date-parts":[[2024,8,12]],"date-time":"2024-08-12T17:25:41Z","timestamp":1723483541000},"page":"2289-2298","source":"Crossref","is-referenced-by-count":1,"title":["Toward Accurate Butterfly Counting with Edge Privacy Preserving in Bipartite Networks"],"prefix":"10.1109","author":[{"given":"Mengyuan","family":"Wang","sequence":"first","affiliation":[{"name":"Hunan University,College of Computer Science and Electronic Engineering,China"}]},{"given":"Hongbo","family":"Jiang","sequence":"additional","affiliation":[{"name":"Hunan University,College of Computer Science and Electronic Engineering,China"}]},{"given":"Peng","family":"Peng","sequence":"additional","affiliation":[{"name":"Hunan University,College of Computer Science and Electronic Engineering,China"}]},{"given":"Youhuan","family":"Li","sequence":"additional","affiliation":[{"name":"Hunan University,College of Computer Science and Electronic Engineering,China"}]},{"given":"Wenbin","family":"Huang","sequence":"additional","affiliation":[{"name":"Nanjing University of Information Science and Technology,School of Computer Science,China"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1145\/3219819.3220097"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1145\/3357384.3357983"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1145\/1367497.1367618"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/INFOCOM42981.2021.9488726"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1145\/2939672.2939747"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/ICDE51399.2021.00197"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/BigData.Congress.2014.13"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.14778\/3339490.3339497"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.14778\/3489496.3489502"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/TKDE.2021.3062987"},{"key":"ref11","first-page":"983","article-title":"Locally differentially private analysis of graph statistics","volume-title":"Proceedings of USENIX Security","author":"Imola"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1145\/3319535.3354253"},{"key":"ref13","first-page":"2009","article-title":"Collecting triangle counts with edge relationship local differential privacy","volume-title":"Proceedings of IEEE ICDE","author":"Yuhan"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1561\/0400000042"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/tkde.2020.3047124"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1145\/3133956.3134086"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1145\/3576915.3623088"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1109\/TMC.2022.3221463"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1109\/TITS.2023.3341252"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/TMC.2023.3255232"},{"key":"ref21","first-page":"479","article-title":"Unveiling and quantifying facebook exploitation of sensitive personal data for advertising purposes","volume-title":"Proceedings of USENIX Security","author":"Caba\u00f1as"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1109\/TMC.2023.3320669"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1109\/tnsm.2023.3317420"},{"year":"2023","article-title":"Meta\u2019s new year kicks off with $410m+ in fresh eu privacy fines","key":"ref24"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1109\/TNET.2021.3084251"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1145\/3423165"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1109\/JIOT.2018.2799545"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1109\/ICDM.2009.11"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1145\/2487575.2487601"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1145\/2623330.2623683"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1145\/2882903.2926745"},{"key":"ref32","article-title":"Efficiently estimating erdos-renyi graphs with node differential privacy","volume":"32","author":"Ullman","year":"2019","journal-title":"Advances in Neural Information Processing Systems"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1145\/3448016.3452756"},{"doi-asserted-by":"publisher","key":"ref34","DOI":"10.1109\/TMC.2023.3263229"},{"doi-asserted-by":"publisher","key":"ref35","DOI":"10.1109\/JIOT.2021.3112186"},{"doi-asserted-by":"publisher","key":"ref36","DOI":"10.1109\/INFOCOM.2019.8737584"},{"doi-asserted-by":"publisher","key":"ref37","DOI":"10.1109\/TIFS.2020.2985524"},{"doi-asserted-by":"publisher","key":"ref38","DOI":"10.14778\/3430915.3430927"},{"year":"1998","article-title":"Movielens 100k dataset","key":"ref39"},{"year":"2008","article-title":"Wikilens","key":"ref40"},{"year":"2014","author":"Leskovec","article-title":"SNAP Datasets: Stanford large network dataset collection","key":"ref41"},{"doi-asserted-by":"publisher","key":"ref42","DOI":"10.1145\/3548606.3560659"}],"event":{"name":"IEEE INFOCOM 2024 - IEEE Conference on Computer Communications","start":{"date-parts":[[2024,5,20]]},"location":"Vancouver, BC, Canada","end":{"date-parts":[[2024,5,23]]}},"container-title":["IEEE INFOCOM 2024 - IEEE Conference on Computer Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10621050\/10621073\/10621436.pdf?arnumber=10621436","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,13]],"date-time":"2024-08-13T05:32:06Z","timestamp":1723527126000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10621436\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,20]]},"references-count":42,"URL":"https:\/\/doi.org\/10.1109\/infocom52122.2024.10621436","relation":{},"subject":[],"published":{"date-parts":[[2024,5,20]]}}}