{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,29]],"date-time":"2022-03-29T11:07:31Z","timestamp":1648552051045},"reference-count":43,"publisher":"Information Processing Society of Japan","issue":"0","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Information Processing"],"published-print":{"date-parts":[[2018]]},"DOI":"10.2197\/ipsjjip.26.648","type":"journal-article","created":{"date-parts":[[2018,9,16]],"date-time":"2018-09-16T01:11:59Z","timestamp":1537060319000},"page":"648-661","source":"Crossref","is-referenced-by-count":0,"title":["Privacy-Utility Tradeoff for Applications Using Energy Disaggregation of Smart-Meter Data"],"prefix":"10.2197","volume":"26","author":[{"given":"Mitsuhiro","family":"Hattori","sequence":"first","affiliation":[{"name":"Mitsubishi Electric Corporation"}]},{"given":"Takato","family":"Hirano","sequence":"additional","affiliation":[{"name":"Mitsubishi Electric Corporation"}]},{"given":"Nori","family":"Matsuda","sequence":"additional","affiliation":[{"name":"Mitsubishi Electric Corporation"}]},{"given":"Fumio","family":"Omatsu","sequence":"additional","affiliation":[{"name":"Mitsubishi Electric Corporation"}]},{"given":"Rina","family":"Shimizu","sequence":"additional","affiliation":[{"name":"Mitsubishi Electric Corporation"}]},{"given":"Ye","family":"Wang","sequence":"additional","affiliation":[{"name":"Mitsubishi Electric Research Laboratories"}]}],"member":"1012","reference":[{"key":"1","unstructured":"[1] Alcal\u00e1, J., Parson, O. and Rogers, A.: Detecting anomalies in activities of daily living of elderly residents via energy disaggregation and Cox processes, Proc. 2nd ACM International Conference on Embedded Systems for Energy-Efficient Built Environments: BuildSys '15<\/i>, ACM Press (online), DOI: 10.1145\/2821650.2821654(2015)."},{"key":"2","unstructured":"[2] Alcal\u00e1, J., Urena, J. and Hernandez, A.: Activity supervision tool using non-intrusive load monitoring systems, 2015 IEEE 20th Conference on Emerging Technologies & Factory Automation<\/i> (ETFA<\/i>), IEEE (online), DOI: 10.1109\/etfa.2015.7301622(2015)."},{"key":"3","unstructured":"[3] Atzori, L., Iera, A. and Morabito, G.: The internet of things: A survey, Computer Networks<\/i>, Vol.54, No.15, pp.2787-2805 (online), DOI: 10.1016\/j.comnet.2010.05.010(2010)."},{"key":"4","unstructured":"[4] Basciftci, Y.O., Wang, Y. and Ishwar, P.: On privacy-utility tradeoffs for constrained data release mechanisms, 2016 Information Theory and Applications Workshop<\/i> (ITA<\/i>), IEEE (online), DOI: 10.1109\/ita.2016.7888175(2016)."},{"key":"5","unstructured":"[5] Bohli, J.-M., Sorge, C. and Ugus, O.: A privacy model for smart metering, 2010 IEEE International Conference on Communications Workshops<\/i>, IEEE (online), DOI: 10.1109\/iccw.2010.5503916(2010)."},{"key":"6","doi-asserted-by":"crossref","unstructured":"[6] Boyd, S. and Vandenberghe, L.: Convex optimization<\/i>, Cambridge University Press (2004).","DOI":"10.1017\/CBO9780511804441"},{"key":"7","unstructured":"[7] Boyd, S., Vandenberghe, L. and Grant, M.: Advances in convex optimization, 2006 Chinese Control Conference<\/i>, IEEE (online), DOI: 10.1109\/chicc.2006.280567(2006)."},{"key":"8","unstructured":"[8] Calmon, F. and Fawaz, N.: Privacy against statistical inference, 2012 50th Annual Allerton Conference on Communication, Control, and Computing<\/i> (Allerton<\/i>), IEEE (online), DOI: 10.1109\/allerton.2012.6483382(2012)."},{"key":"9","unstructured":"[9] Duhigg, C.: How companies learn your secrets, The New York Times<\/i>, Vol.16, p.2012 (2012)."},{"key":"10","unstructured":"[10] Dwork, C.: Differential privacy, Automata, Languages and Programming<\/i>, Springer Berlin Heidelberg, pp.1-12 (online), DOI: 10.1007\/11787006_1(2006)."},{"key":"11","unstructured":"[11] Dwork, C.: Differential privacy: A survey of results, Lecture Notes in Computer Science<\/i>, Agrawal, M., Du, D., Duan, Z. and Li, A. (Eds.), Lecture Notes in Computer Science, Vol.4978, Springer Berlin Heidelberg, pp.1-19 (online), DOI: 10.1007\/978-3-540-79228-4_1(2008)."},{"key":"12","unstructured":"[12] Efthymiou, C. and Kalogridis, G.: Smart grid privacy via anonymization of smart metering data, 2010 1st IEEE International Conference on Smart Grid Communications<\/i>, IEEE (online), DOI: 10.1109\/smartgrid.2010.5622050(2010)."},{"key":"13","doi-asserted-by":"crossref","unstructured":"[13] Eisenberg, B. and Sullivan, R.: Why is the sum of independent normal random variables normal?, Mathematics Magazine<\/i>, Vol.81, No.5, pp.362-366 (2008).","DOI":"10.1080\/0025570X.2008.11953577"},{"key":"14","unstructured":"[14] Erdogdu, M.A. and Fawaz, N.: Privacy-utility trade-off under continual observation, 2015 IEEE International Symposium on Information Theory<\/i> (ISIT<\/i>), pp.1801-1805, IEEE (online), DOI: 10.1109\/isit.2015.7282766(2015)."},{"key":"15","unstructured":"[15] Erdogdu, M.A., Fawaz, N. and Montanari, A.: Privacy-utility trade-off for time-series with application to smart-meter data, AAAI 2015 Workshop on Computational Sustainability<\/i> (2015)."},{"key":"16","doi-asserted-by":"crossref","unstructured":"[16] Ghahramani, Z. and Jordan, M.I.: Factorial hidden Markov models, Machine Learning<\/i>, Vol.29, No.2\/3, pp.245-273 (1997).","DOI":"10.1023\/A:1007425814087"},{"key":"17","unstructured":"[17] Guo, Z., Wang, Z.J. and Kashani, A.: Home appliance load modeling from aggregated smart meter data, IEEE Trans. Power Systems<\/i>, Vol.30, No.1, pp.254-262 (online), DOI: 10.1109\/tpwrs.2014.2327041(2015)."},{"key":"18","unstructured":"[18] Hart, G.: Nonintrusive appliance load monitoring, Proc. IEEE<\/i>, Vol.80, No.12, pp.1870-1891 (online), DOI: 10.1109\/5.192069(1992)."},{"key":"19","unstructured":"[19] Kalogridis, G. and Denic, S.Z.: Data mining and privacy of personal behaviour types in smart grid, 2011 IEEE 11th International Conference on Data Mining Workshops<\/i>, IEEE (online), DOI: 10.1109\/icdmw.2011.58(2011)."},{"key":"20","unstructured":"[20] Kelly, J.: Disaggregation of domestic smart meter energy data, PhD Thesis, University of London (2017)."},{"key":"21","unstructured":"[21] Kelly, J. and Knottenbelt, W.: Neural NILM: Deep neural networks applied to energy disaggregation, Proc. 2nd ACM International Conference on Embedded Systems for Energy-Efficient Built Environments: BuildSys '15<\/i>, ACM Press (online), DOI: 10.1145\/2821650.2821672(2015)."},{"key":"22","unstructured":"[22] Kelly, J. and Knottenbelt, W.: The UK-DALE dataset, domestic appliance-level electricity demand and whole-house demand from five UK homes, Scientific Data<\/i>, Vol.2, 150007 (online), DOI: 10.1038\/sdata.2015.7(2015)."},{"key":"23","unstructured":"[23] Kim, H., Marwah, M., Arlitt, M., Lyon, G. and Han, J.: Unsupervised disaggregation of low frequency power measurements, Proc. 2011 SIAM International Conference on Data Mining<\/i>, pp.747-758, Society for Industrial and Applied Mathematics (online), DOI: 10.1137\/1.9781611972818.64(2011)."},{"key":"24","unstructured":"[24] Li, N., Li, T. and Venkatasubramanian, S.: t-Closeness: privacy beyond k-anonymity and l-diversity, 2007 IEEE 23rd International Conference on Data Engineering<\/i>, pp.106-115, IEEE (online), DOI: 10.1109\/icde.2007.367856(2007)."},{"key":"25","unstructured":"[25] Li, S., Khisti, A. and Mahajan, A.: Privacy-optimal strategies for smart metering systems with a rechargeable battery, 2016 American Control Conference<\/i> (ACC<\/i>), IEEE (online), DOI: 10.1109\/acc.2016.7525225(2016)."},{"key":"26","doi-asserted-by":"crossref","unstructured":"[26] Lu, R.: Privacy-enhancing aggregation techniques for smart grid communications<\/i>, Springer International Publishing (2016).","DOI":"10.1007\/978-3-319-32899-7"},{"key":"27","unstructured":"[27] Machanavajjhala, A., Kifer, D., Gehrke, J. and Venkitasubramaniam, M.: l-diversity: Privacy beyond k-anonymity, ACM Trans. Knowledge Discovery from Data<\/i>, Vol.1, No.1, 3-es (online), DOI: 10.1145\/1217299.1217302(2007)."},{"key":"28","unstructured":"[28] Parson, O., Ghosh, S., Weal, M. and Rogers, A.: Non-intrusive load monitoring using prior models of general appliance types, AAAI 2012<\/i>, pp.356-362 (2012)."},{"key":"29","unstructured":"[29] Parson, O., Ghosh, S., Weal, M. and Rogers, A.: An unsupervised training method for non-intrusive appliance load monitoring, Artificial Intelligence<\/i>, Vol.217, pp.1-19 (online), DOI: 10.1016\/j.artint.2014.07.010(2014)."},{"key":"30","unstructured":"[30] Pillitteri, V.Y. and Brewer, T.L.: Guidelines for smart grid cybersecurity, Internal Report NISTIR 7628 Revision 1, National Institute of Standards and Technology (2014)."},{"key":"31","doi-asserted-by":"crossref","unstructured":"[31] Quinn, E.L.: Smart metering and privacy: Existing laws and competing policies, SSRN Electronic Journal<\/i> (2009).","DOI":"10.2139\/ssrn.1462285"},{"key":"32","unstructured":"[32] Rajagopalan, S.R., Sankar, L., Mohajer, S. and Poor, H.V.: Smart meter privacy: A utility-privacy framework, 2011 IEEE International Conference on Smart Grid Communications<\/i> (SmartGridComm<\/i>), IEEE (online), DOI: 10.1109\/smartgridcomm.2011.6102315(2011)."},{"key":"33","unstructured":"[33] Rial, A. and Danezis, G.: Privacy-preserving smart metering, Proc. 10th Annual ACM Workshop on Privacy in the Electronic Society - WPES '11<\/i>, ACM Press (online), DOI: 10.1145\/2046556.2046564(2011)."},{"key":"34","doi-asserted-by":"publisher","unstructured":"[34] Salamatian, S., Zhang, A., Calmon, F., Bhamidipati, S., Fawaz, N., Kveton, B., Oliveira, P. and Taft, N.: Managing Your private and public data: Bringing down inference attacks against your privacy, IEEE Journal of Selected Topics in Signal Processing<\/i>, Vol.9, No.7, pp.1240-1255 (online), DOI: 10.1109\/jstsp.2015.2442227 (2015).","DOI":"10.1109\/JSTSP.2015.2442227"},{"key":"35","doi-asserted-by":"publisher","unstructured":"[35] Samarati, P.: Protecting respondents identities in microdata release, IEEE Trans. Knowledge and Data Engineering<\/i>, Vol.13, No.6, pp.1010-1027 (online), DOI: 10.1109\/69.971193 (2001).","DOI":"10.1109\/69.971193"},{"key":"36","unstructured":"[36] Schneier, B.: Data and goliath: The hidden battles to collect your data and control your world<\/i>, W.W. Norton & Company (2015)."},{"key":"37","unstructured":"[37] Song, H., Kalogridis, G. and Fan, Z.: Short paper: Time-dependent power load disaggregation with applications to daily activity monitoring, 2014 IEEE World Forum on Internet of Things<\/i> (WF<\/i>-IoT), IEEE (online), DOI: 10.1109\/wf-iot.2014.6803150(2014)."},{"key":"38","unstructured":"[38] Sweeney, L.: k-anonymity: A model for protecting privacy, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems<\/i>, Vol.10, No.5, pp.557-570 (online), DOI: 10.1142\/s0218488502001648(2002)."},{"key":"39","unstructured":"[39] Tan, O., Gunduz, D. and Poor, H.V.: Increasing smart meter privacy through energy harvesting and storage devices, IEEE Journal on Selected Areas in Communications<\/i>, Vol.31, No.7, pp.1331-1341 (online), DOI: 10.1109\/jsac.2013.130715(2013)."},{"key":"40","unstructured":"[40] Xiao, X. and Tao, Y.: m-invariance: Towards privacy preserving re-publication of dynamic datasets, Proc. 2007 ACM SIGMOD International Conference on Management of Data: SIGMOD '07<\/i>, pp.689-700, ACM Press (online), DOI: 10.1145\/1247480.1247556(2007)."},{"key":"41","unstructured":"[41] Yang, L., Chen, X., Zhang, J. and Poor, H.V.: Cost-effective and privacy-preserving energy management for smart meters, IEEE Trans. Smart Grid<\/i>, Vol.6, No.1, pp.486-495 (online), DOI: 10.1109\/tsg.2014.2343611(2015)."},{"key":"42","unstructured":"[42] Yang, W., Li, N., Qi, Y., Qardaji, W., McLaughlin, S. and McDaniel, P.: Minimizing private data disclosures in the smart grid, Proc. 2012 ACM Conference on Computer and Communications Security: CCS '12<\/i>, pp.415-427, ACM Press (online), DOI: 10.1145\/2382196.2382242(2012)."},{"key":"43","unstructured":"[43] Yao, J. and Venkitasubramaniam, P.: The privacy analysis of battery control mechanisms in demand response: Revealing state approach and rate distortion bounds, IEEE Trans. Smart Grid<\/i>, Vol.6, No.5, pp.2417-2425 (online), DOI: 10.1109\/tsg.2015.2438035(2015)."}],"container-title":["Journal of Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/ipsjjip\/26\/0\/26_648\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T01:05:54Z","timestamp":1638320754000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/ipsjjip\/26\/0\/26_648\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"references-count":43,"journal-issue":{"issue":"0","published-print":{"date-parts":[[2018]]}},"URL":"https:\/\/doi.org\/10.2197\/ipsjjip.26.648","relation":{},"ISSN":["1882-6652"],"issn-type":[{"value":"1882-6652","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]}}}