{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T14:27:04Z","timestamp":1775744824111,"version":"3.50.1"},"reference-count":32,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2023,4,1]],"date-time":"2023-04-01T00:00:00Z","timestamp":1680307200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2023,4,1]],"date-time":"2023-04-01T00:00:00Z","timestamp":1680307200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2023,4,1]],"date-time":"2023-04-01T00:00:00Z","timestamp":1680307200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2023,4,1]],"date-time":"2023-04-01T00:00:00Z","timestamp":1680307200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2023,4,1]],"date-time":"2023-04-01T00:00:00Z","timestamp":1680307200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2023,4,1]],"date-time":"2023-04-01T00:00:00Z","timestamp":1680307200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,4,1]],"date-time":"2023-04-01T00:00:00Z","timestamp":1680307200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61772131"],"award-info":[{"award-number":["61772131"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Information Sciences"],"published-print":{"date-parts":[[2023,4]]},"DOI":"10.1016\/j.ins.2022.12.037","type":"journal-article","created":{"date-parts":[[2022,12,22]],"date-time":"2022-12-22T11:13:15Z","timestamp":1671707595000},"page":"402-420","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":23,"special_numbering":"C","title":["Multidimensional grid-based clustering with local differential privacy"],"prefix":"10.1016","volume":"623","author":[{"given":"Nan","family":"Fu","sequence":"first","affiliation":[]},{"given":"Weiwei","family":"Ni","sequence":"additional","affiliation":[]},{"given":"Haibo","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Sen","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.ins.2022.12.037_b0005","doi-asserted-by":"crossref","unstructured":"J.C. Duchi, M.I. Jordan, M.J. Wainwright, Local privacy and statistical minimax rates, in: 2013 IEEE 54th Annual Symposium on Foundations of Computer Science, IEEE, 2013, pp. 429\u2013438.","DOI":"10.1109\/FOCS.2013.53"},{"key":"10.1016\/j.ins.2022.12.037_b0010","doi-asserted-by":"crossref","unstructured":"\u00da. Erlingsson, V. Pihur, A. Korolova, Rappor: Randomized aggregatable privacy-preserving ordinal response, in: Proceedings of the 2014 ACM SIGSAC conference on computer and communications security, 2014, pp. 1054\u20131067.","DOI":"10.1145\/2660267.2660348"},{"key":"10.1016\/j.ins.2022.12.037_b0015","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1016\/j.ins.2019.06.021","article-title":"Locally differentially private item-based collaborative filtering","volume":"502","author":"Guo","year":"2019","journal-title":"Inf. Sci."},{"key":"10.1016\/j.ins.2022.12.037_b0020","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1016\/j.ins.2019.04.036","article-title":"Privacy-preserved distinct content collection in human-assisted ubiquitous computing systems","volume":"493","author":"Zheng","year":"2019","journal-title":"Inf. Sci."},{"key":"10.1016\/j.ins.2022.12.037_b0025","unstructured":"C. Dwork, Differential privacy, lecture notes in computer science."},{"key":"10.1016\/j.ins.2022.12.037_b0030","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1016\/j.ins.2019.07.001","article-title":"The optimal upper bound of the number of queries for laplace mechanism under differential privacy","volume":"503","author":"Li","year":"2019","journal-title":"Inf. Sci."},{"key":"10.1016\/j.ins.2022.12.037_b0035","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1016\/j.ins.2020.10.051","article-title":"Differentially private data publishing for arbitrarily partitioned data","volume":"553","author":"Wang","year":"2021","journal-title":"Inf. Sci."},{"key":"10.1016\/j.ins.2022.12.037_b0040","doi-asserted-by":"crossref","first-page":"347","DOI":"10.1016\/j.ins.2021.01.058","article-title":"Correlated tuple data release via differential privacy","volume":"560","author":"Wang","year":"2021","journal-title":"Inf. Sci."},{"key":"10.1016\/j.ins.2022.12.037_b0045","unstructured":"K. Nissim, U. Stemmer, Clustering algorithms for the centralized and local models, in: Algorithmic Learning Theory, PMLR, 2018, pp. 619\u2013653."},{"key":"10.1016\/j.ins.2022.12.037_b0050","first-page":"5431","article-title":"Differentially private k-means with constant multiplicative error","volume":"31","author":"Stemmer","year":"2018","journal-title":"Adv. Neural Inform. Process. Syst."},{"key":"10.1016\/j.ins.2022.12.037_b0055","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2019.101699","article-title":"Distributed k-means clustering guaranteeing local differential privacy","volume":"90","author":"Xia","year":"2020","journal-title":"Comput. Secur."},{"key":"10.1016\/j.ins.2022.12.037_b0060","doi-asserted-by":"crossref","unstructured":"Z. Qin, Y. Yang, T. Yu, I. Khalil, X. Xiao, K. Ren, Heavy hitter estimation over set-valued data with local differential privacy, in: ACM SIGSAC Conference on Computer & Communications Security, 2016, pp. 192\u2013203.","DOI":"10.1145\/2976749.2978409"},{"key":"10.1016\/j.ins.2022.12.037_b0065","unstructured":"T. Wang, N. Li, S. Jha, Locally differentially private heavy hitter identification, IEEE Trans. Dependable Secure Comput."},{"key":"10.1016\/j.ins.2022.12.037_b0070","doi-asserted-by":"crossref","unstructured":"T. Wang, N. Li, S. Jha, Locally differentially private frequent itemset mining, in: 2018 IEEE Symposium on Security and Privacy, IEEE, 2018, pp. 127\u2013143.","DOI":"10.1109\/SP.2018.00035"},{"key":"10.1016\/j.ins.2022.12.037_b0075","series-title":"IEEE INFOCOM 2018-IEEE Conference on Computer Communications","first-page":"1088","article-title":"Privset: Set-valued data analyses with locale differential privacy","author":"Wang","year":"2018"},{"key":"10.1016\/j.ins.2022.12.037_b0080","series-title":"International Conference on Wireless Algorithms, Systems, and Applications","first-page":"390","article-title":"Estimating clustering coefficient of multiplex graphs with local differential privacy","author":"Liu","year":"2021"},{"key":"10.1016\/j.ins.2022.12.037_b0085","unstructured":"T.T. Nguy\u00ean, X. Xiao, Y. Yang, S.C. Hui, H. Shin, J. Shin, Collecting and analyzing data from smart device users with local differential privacy, arXiv preprint arXiv:1606.05053."},{"key":"10.1016\/j.ins.2022.12.037_b0090","unstructured":"B. Ding, J. Kulkarni, S. Yekhanin, Collecting telemetry data privately, arXiv preprint arXiv:1712.01524."},{"key":"10.1016\/j.ins.2022.12.037_b0095","doi-asserted-by":"crossref","unstructured":"B. Ding, H. Nori, P. Li, J. Allen, Comparing population means under local differential privacy: with significance and power, in: Proceedings of the AAAI Conference on Artificial Intelligence, Vol. 32, 2018.","DOI":"10.1609\/aaai.v32i1.11301"},{"key":"10.1016\/j.ins.2022.12.037_b0100","series-title":"2019 IEEE 35th International Conference on Data Engineering (ICDE)","first-page":"638","article-title":"Collecting and analyzing multidimensional data with local differential privacy","author":"Wang","year":"2019"},{"key":"10.1016\/j.ins.2022.12.037_b0105","doi-asserted-by":"crossref","unstructured":"U. Stemmer, Locally private k-means clustering, in: Proceedings of the Fourteenth Annual ACM-SIAM Symposium on Discrete Algorithms, SIAM, 2020, pp. 548\u2013559.","DOI":"10.1137\/1.9781611975994.33"},{"key":"10.1016\/j.ins.2022.12.037_b0110","unstructured":"L. Sun, J. Zhao, X. Ye, Distributed clustering in the anonymized space with local differential privacy, arXiv preprint arXiv:1906.11441."},{"key":"10.1016\/j.ins.2022.12.037_b0115","doi-asserted-by":"crossref","first-page":"45773","DOI":"10.1109\/ACCESS.2019.2909048","article-title":"An optimizing and differentially private clustering algorithm for mixed data in sdn-based smart grid","volume":"7","author":"Lv","year":"2019","journal-title":"IEEE Access"},{"key":"10.1016\/j.ins.2022.12.037_b0120","doi-asserted-by":"crossref","unstructured":"W. Li, H. Chen, R. Zhao, C. Hu, A federated recommendation system based on local differential privacy clustering, in: 2021 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Internet of People and Smart City Innovation, IEEE, 2021, pp. 364\u2013369.","DOI":"10.1109\/SWC50871.2021.00056"},{"key":"10.1016\/j.ins.2022.12.037_b0125","doi-asserted-by":"crossref","unstructured":"H. Sun, X. Xiao, I. Khalil, Y. Yang, Z. Qin, H. Wang, T. Yu, Analyzing subgraph statistics from extended local views with decentralized differential privacy, in: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019, pp. 703\u2013717.","DOI":"10.1145\/3319535.3354253"},{"key":"10.1016\/j.ins.2022.12.037_b0130","series-title":"2020 IEEE 36th International Conference on Data Engineering (ICDE)","first-page":"1922","article-title":"Towards locally differentially private generic graph metric estimation","author":"Ye","year":"2020"},{"key":"10.1016\/j.ins.2022.12.037_b0135","doi-asserted-by":"crossref","unstructured":"F.D. McSherry, Privacy integrated queries: an extensible platform for privacy-preserving data analysis, in: Proceedings of the 2009 ACM SIGMOD International Conference on Management of data, 2009, pp. 19\u201330.","DOI":"10.1145\/1559845.1559850"},{"key":"10.1016\/j.ins.2022.12.037_b0140","series-title":"Locally differentially private protocols for frequency estimation","first-page":"729","author":"Wang","year":"2017"},{"issue":"309","key":"10.1016\/j.ins.2022.12.037_b0145","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1080\/01621459.1965.10480775","article-title":"Randomized response: A survey technique for eliminating evasive answer bias","volume":"60","author":"Warner","year":"1965","journal-title":"J. Am. Stat. Assoc."},{"key":"10.1016\/j.ins.2022.12.037_b0150","first-page":"1702","article-title":"Extension clustering algorithm based on relative grid density difference","volume":"6","author":"Huang","year":"2014","journal-title":"Appl. Res. Comput."},{"issue":"1","key":"10.1016\/j.ins.2022.12.037_b0155","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1214\/aoms\/1177732360","article-title":"The large-sample distribution of the likelihood ratio for testing composite hypotheses","volume":"9","author":"Wilks","year":"1938","journal-title":"Ann. Math. Stat."},{"key":"10.1016\/j.ins.2022.12.037_b0160","first-page":"1072","article-title":"Normalized mutual information-based registration using k-means clustering-based histogram binning","volume":"vol. 5032","author":"Knops","year":"2003"}],"container-title":["Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0020025522015328?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0020025522015328?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,9,17]],"date-time":"2025-09-17T06:00:57Z","timestamp":1758088857000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0020025522015328"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4]]},"references-count":32,"alternative-id":["S0020025522015328"],"URL":"https:\/\/doi.org\/10.1016\/j.ins.2022.12.037","relation":{},"ISSN":["0020-0255"],"issn-type":[{"value":"0020-0255","type":"print"}],"subject":[],"published":{"date-parts":[[2023,4]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Multidimensional grid-based clustering with local differential privacy","name":"articletitle","label":"Article Title"},{"value":"Information Sciences","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.ins.2022.12.037","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2022 Elsevier Inc. All rights reserved.","name":"copyright","label":"Copyright"}]}}