Recognition: 2 theorem links
· Lean TheoremPersonalized w-Event Privacy for Infinite Stream Estimation
Pith reviewed 2026-05-12 01:49 UTC · model grok-4.3
The pith
Methods for personalized w-event privacy on infinite streams achieve user-specific guarantees and reduce estimation errors by at least 53.6%.
A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.
Core claim
The central claim is that the Personalized Window Size Mechanism together with PBD/PBA and their dynamic DPBD/DPBA extensions satisfy (w, E)-EPDP and the time-varying (τ, w_B, w_F)-Event (E_B, E_F)-PDP definitions for infinite streams, while supplying explicit error upper bounds that are realized in practice as at least a 53.6% error reduction versus existing methods.
What carries the argument
The Personalized Budget Distribution (PBD) and Personalized Budget Absorption (PBA) strategies, which reserve future budgets at least as large as prior consumption and reuse unused budgets from adjacent slots to optimize utility under user-specific E values.
Load-bearing premise
Users can accurately specify and dynamically adjust their per-time privacy requirements E, and the system can perform budget absorption and distribution without violating the sliding-window model.
What would settle it
Running the proposed methods on real infinite-stream datasets and finding either a violation of the stated personalized differential privacy guarantees or an estimation error reduction below 53.6% compared with state-of-the-art uniform-privacy algorithms.
Figures
read the original abstract
In applications such as event monitoring, log analysis, and video querying, $w$-event privacy protects individual data within a sliding time window while supporting accurate stream statistics. Existing studies on infinite data streams mainly assume homogeneous privacy requirements for all users, which cannot capture user-specific privacy preferences. This paper studies personalized $w$-event privacy for private data stream estimation. We first design the Personalized Window Size Mechanism (PWSM), which supports personalized privacy requirements at each time slot. Based on PWSM, we propose Personalized Budget Distribution (PBD) and Personalized Budget Absorption (PBA) to estimate streaming statistics under $\boldsymbol{w}$-Event $\boldsymbol{\mathcal{E}}$ Personalized Differential Privacy (($\boldsymbol{w}$, $\boldsymbol{\mathcal{E}}$)-EPDP). PBD guarantees that the budget reserved for the next time step is no smaller than the budget consumed in the previous release, while PBA improves the current budget by absorbing unused budgets from the previous $k$ time slots and borrowing from the next $k$ time slots. We further develop Dynamic Personalized Budget Distribution (DPBD) and Dynamic Personalized Budget Absorption (DPBA), which allow users to dynamically adjust privacy requirements while satisfying $(\tau, \boldsymbol{w}_B, \boldsymbol{w}_F)$-Event $(\boldsymbol{\mathcal{E}}_B, \boldsymbol{\mathcal{E}}_F)$-Personalized Differential Privacy. We prove that all proposed methods achieve the corresponding personalized differential privacy guarantees and derive their error upper bounds. Experiments show that our methods reduce estimation error by at least $53.6\%$ compared with state-of-the-art algorithms.
Editorial analysis
A structured set of objections, weighed in public.
Referee Report
Summary. The paper proposes mechanisms for personalized w-event differential privacy on infinite data streams: Personalized Window Size Mechanism (PWSM), Personalized Budget Distribution (PBD), Personalized Budget Absorption (PBA), and their dynamic variants DPBD and DPBA. It claims to prove that these achieve the corresponding (w, E)-EPDP and (τ, w_B, w_F)-Event (E_B, E_F)-EPDP guarantees, derives error upper bounds, and reports that experiments reduce estimation error by at least 53.6% versus state-of-the-art algorithms.
Significance. If the privacy proofs and error bounds hold under arbitrary dynamic E adjustments in infinite streams, the work would meaningfully extend homogeneous w-event privacy to user-specific and time-varying requirements, which is relevant for applications like event monitoring and log analysis. The budget absorption/borrowing approach and dynamic support are technically interesting extensions of standard DP composition, but their load-bearing correctness under sliding-window re-accounting remains to be confirmed.
major comments (2)
- [Abstract / DPBD/DPBA section] Abstract and DPBD/DPBA definitions: the claim that DPBD/DPBA satisfy (τ, w_B, w_F)-Event (E_B, E_F)-EPDP while allowing arbitrary per-time E_t changes is load-bearing. PBA-style absorption borrows from the next k slots; when E_t is later tightened, the privacy loss summed over every sliding w-window must still be re-bounded using the new E values. The provided abstract does not indicate whether the proof explicitly handles non-monotonic E sequences or only fixed/monotonic E.
- [Error upper bounds section] Error-bound derivations: the upper bounds are stated to hold for the proposed methods, but the weakest assumption (accurate user-specified E and system-level budget absorption without violating the sliding-window model) directly affects whether the derived bounds remain valid after dynamic changes. If the bounds rely on pre-change E values, they may not compose correctly post-adjustment.
minor comments (2)
- [Experiments] Experiments: the 53.6% error reduction is a strong claim; the manuscript should explicitly state data exclusion rules, full experimental setup, and whether post-hoc budget rules were applied, to allow independent verification.
- [Notation and definitions] Notation: ensure consistent boldface for vector quantities (w, E, etc.) throughout and clarify the relationship between w-event and the (τ, w_B, w_F) variant.
Simulated Author's Rebuttal
We thank the referee for the constructive feedback. We address the major comments below with clarifications on the dynamic privacy guarantees and error bounds. Revisions will be made to improve explicitness where the abstract and sections could better highlight the handling of arbitrary E sequences.
read point-by-point responses
-
Referee: [Abstract / DPBD/DPBA section] Abstract and DPBD/DPBA definitions: the claim that DPBD/DPBA satisfy (τ, w_B, w_F)-Event (E_B, E_F)-EPDP while allowing arbitrary per-time E_t changes is load-bearing. PBA-style absorption borrows from the next k slots; when E_t is later tightened, the privacy loss summed over every sliding w-window must still be re-bounded using the new E values. The provided abstract does not indicate whether the proof explicitly handles non-monotonic E sequences or only fixed/monotonic E.
Authors: The proofs for DPBD and DPBA (Theorems 4.3 and 4.4) are formulated to support arbitrary non-monotonic E_t sequences. The (τ, w_B, w_F)-Event (E_B, E_F)-EPDP definition requires that the total privacy loss over any sliding window of size w is bounded by the sum of the E values active in that window at the time of each release. PBA's absorption and borrowing are re-accounted at every step using the current E_t; when a later tightening occurs, the composition theorem is applied to the realized sequence of E values, ensuring the window sums remain within the new bounds. The abstract will be revised to explicitly note that the guarantees and proofs hold for non-monotonic adjustments. revision: partial
-
Referee: [Error upper bounds section] Error-bound derivations: the upper bounds are stated to hold for the proposed methods, but the weakest assumption (accurate user-specified E and system-level budget absorption without violating the sliding-window model) directly affects whether the derived bounds remain valid after dynamic changes. If the bounds rely on pre-change E values, they may not compose correctly post-adjustment.
Authors: The error upper bounds (Section 5) are expressed directly in terms of the per-step E_t values and the actual budgets consumed or absorbed at each release. Because the mechanisms update budgets using the current E_t before each perturbation, the bounds are recomputed with the realized E sequence and remain valid after any adjustment. The derivations rely on the post-adjustment E values for composition, not pre-change values, so the sliding-window model is preserved. A clarifying sentence will be added to the error-bounds section to state this explicitly. revision: partial
Circularity Check
No significant circularity; derivations rely on standard DP composition
full rationale
The paper defines new mechanisms (PWSM, PBD, PBA, DPBD, DPBA) for personalized w-event privacy and states that it proves the corresponding (w, E)-EPDP and (τ, w_B, w_F)-Event (E_B, E_F)-EPDP guarantees while deriving error upper bounds. These proofs are presented as direct applications of differential privacy composition and budget accounting rules rather than self-definitions, fitted inputs renamed as predictions, or load-bearing self-citations. No equations reduce the claimed guarantees to the input privacy parameters by construction, and the experimental error reduction is an empirical outcome separate from the formal claims. The derivation chain remains self-contained against external DP benchmarks.
Axiom & Free-Parameter Ledger
axioms (2)
- standard math Standard differential privacy composition theorems for sequential releases
- domain assumption Sliding window model for infinite streams with w-event privacy
Lean theorems connected to this paper
-
IndisputableMonolith/Foundation/AbsoluteFloorClosure.leanreality_from_one_distinction unclear?
unclearRelation between the paper passage and the cited Recognition theorem.
We propose Personalized Budget Distribution (PBD) and Personalized Budget Absorption (PBA) ... DPBD and DPBA ... satisfy (τ,wB,wF,EB,EF)-EPDP
-
IndisputableMonolith/Cost/FunctionalEquation.leanwashburn_uniqueness_aczel unclear?
unclearRelation between the paper passage and the cited Recognition theorem.
error upper bounds ... Laplace mechanism ... OBS algorithm
What do these tags mean?
- matches
- The paper's claim is directly supported by a theorem in the formal canon.
- supports
- The theorem supports part of the paper's argument, but the paper may add assumptions or extra steps.
- extends
- The paper goes beyond the formal theorem; the theorem is a base layer rather than the whole result.
- uses
- The paper appears to rely on the theorem as machinery.
- contradicts
- The paper's claim conflicts with a theorem or certificate in the canon.
- unclear
- Pith found a possible connection, but the passage is too broad, indirect, or ambiguous to say the theorem truly supports the claim.
Reference graph
Works this paper leans on
-
[1]
Heteroge- neous differential privacy.J
ALAGGAN, M., GAMBS, S.,ANDKERMARREC, A. Heteroge- neous differential privacy.J. Priv. Confidentiality 7, 2 (2016)
work page 2016
-
[2]
ANDR ´ES, M. E., BORDENABE, N. E., CHATZIKOKOLAKIS, K., ANDPALAMIDESSI, C. Geo-indistinguishability: differential pri- vacy for location-based systems. In2013 ACM SIGSAC Confer- ence on Computer and Communications Security, CCS’13, Berlin, Germany, November 4-8, 2013(2013), A. Sadeghi, V . D. Gligor, and M. Yung, Eds., ACM, pp. 901–914
work page 2013
-
[3]
CGM: an en- hanced mechanism for streaming data collection with local differ- ential privacy.Proc
BAO, E., YANG, Y., XIAO, X.,ANDDING, B. CGM: an en- hanced mechanism for streaming data collection with local differ- ential privacy.Proc. VLDB Endow. 14, 11 (2021), 2258–2270
work page 2021
-
[4]
BASSILY, R.,ANDSMITH, A. D. Local, private, efficient proto- cols for succinct histograms. InProceedings of the Forty-Seventh Annual ACM on Symposium on Theory of Computing, STOC 2015, Portland, OR, USA, June 14-17, 2015(2015), R. A. Servedio and R. Rubinfeld, Eds., ACM, pp. 127–135
work page 2015
-
[5]
A learning theory ap- proach to non-interactive database privacy
BLUM, A., LIGETT, K.,ANDROTH, A. A learning theory ap- proach to non-interactive database privacy. InProceedings of the 40th Annual ACM Symposium on Theory of Computing, Victoria, British Columbia, Canada, May 17-20, 2008(2008), pp. 609–618
work page 2008
-
[6]
Private decayed predicate sums on streams
BOLOT, J., FAWAZ, N., MUTHUKRISHNAN, S., NIKOLOV, A., ANDTAFT, N. Private decayed predicate sums on streams. InJoint 2013 EDBT/ICDT Conferences, ICDT ’13 Proceedings, Genoa, Italy, March 18-22, 2013(2013), pp. 284–295
work page 2013
-
[7]
CHAN, T. H., SHI, E.,ANDSONG, D. Private and continual release of statistics.ACM Trans. Inf. Syst. Secur. 14, 3 (2011), 26:1–26:24
work page 2011
-
[8]
Pegasus: Data-adaptive differentially private stream process- ing
CHEN, Y., MACHANAVAJJHALA, A., HAY, M.,ANDMIKLAU, G. Pegasus: Data-adaptive differentially private stream process- ing. InProceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30 - November 03, 2017(2017), pp. 1375–1388
work page 2017
-
[9]
Differential privacy in the shuffle model: A survey of separations.CoRR abs/2107.11839(2021)
CHEU, A. Differential privacy in the shuffle model: A survey of separations.CoRR abs/2107.11839(2021)
-
[10]
CHEU, A., SMITH, A. D., ULLMAN, J. R., ZEBER, D.,AND ZHILYAEV, M. Distributed differential privacy via shuffling. In Advances in Cryptology - EUROCRYPT 2019 - 38th Annual In- ternational Conference on the Theory and Applications of Crypto- graphic Techniques, Darmstadt, Germany, May 19-23, 2019, Pro- ceedings, Part I(2019), Y . Ishai and V . Rijmen, Eds.,...
work page 2019
-
[11]
Mean estimation with user-level privacy under data het- erogeneity
CUMMINGS, R., FELDMAN, V., MCMILLAN, A.,ANDTAL- WAR, K. Mean estimation with user-level privacy under data het- erogeneity. InAdvances in Neural Information Processing Sys- tems 35: Annual Conference on Neural Information Processing Systems 2022, NeurIPS 2022, New Orleans, LA, USA, November 28 - December 9, 2022(2022)
work page 2022
-
[12]
Continual observation under user-level differential privacy
DONG, W., LUO, Q.,ANDYI, K. Continual observation under user-level differential privacy. In44th IEEE Symposium on Secu- rity and Privacy, SP 2023, San Francisco, CA, USA, May 21-25, 2023(2023), pp. 2190–2207
work page 2023
-
[13]
DU, L., CHENG, P., CHEN, L., SHEN, H. T., LIN, X.,ANDXI, W. Infinite stream estimation under personalizedw-event privacy. Proc. VLDB Endow. 18, 6 (2025), 1111–1123
work page 2025
-
[14]
Dynamic private task assignment under differen- tial privacy
DU, L., CHENG, P., ZHENG, L., XI, W., LIN, X., ZHANG, W., ANDFANG, J. Dynamic private task assignment under differen- tial privacy. In39th IEEE International Conference on Data Engi- neering, ICDE 2023, Anaheim, CA, USA, April 3-7, 2023(2023), pp. 2740–2752
work page 2023
-
[15]
DVIJOTHAM, K. D., MCMAHAN, H. B., PILLUTLA, K., STEINKE, T.,ANDTHAKURTA, A. Efficient and near-optimal noise generation for streaming differential privacy. In65th IEEE Annual Symposium on Foundations of Computer Science, FOCS 2024, Chicago, IL, USA, October 27-30, 2024(2024), pp. 2306– 2317
work page 2024
-
[16]
DWORK, C. Differential privacy. InAutomata, Languages and Programming, 33rd International Colloquium, ICALP 2006, Venice, Italy, July 10-14, 2006, Proceedings, Part II(2006), M. Bugliesi, B. Preneel, V . Sassone, and I. Wegener, Eds., vol. 4052 ofLecture Notes in Computer Science, Springer, pp. 1– 12
work page 2006
-
[17]
Differential privacy in new settings
DWORK, C. Differential privacy in new settings. InProceedings of the Twenty-First Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2010, Austin, Texas, USA, January 17-19, 2010 (2010), pp. 174–183
work page 2010
-
[18]
DWORK, C., NAOR, M., PITASSI, T.,ANDROTHBLUM, G. N. Differential privacy under continual observation. InProceedings of the 42nd ACM Symposium on Theory of Computing, STOC 2010, Cambridge, Massachusetts, USA, 5-8 June 2010(2010), pp. 715–724
work page 2010
-
[19]
The algorithmic foundations of dif- ferential privacy.Found
DWORK, C.,ANDROTH, A. The algorithmic foundations of dif- ferential privacy.Found. Trends Theor. Comput. Sci. 9, 3-4 (2014), 211–407
work page 2014
-
[20]
RAPPOR: randomized aggregatable privacy-preserving ordinal response
ERLINGSSON, ´U., PIHUR, V.,ANDKOROLOVA, A. RAPPOR: randomized aggregatable privacy-preserving ordinal response. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014(2014), G. Ahn, M. Yung, and N. Li, Eds., ACM, pp. 1054–1067
work page 2014
-
[21]
An adaptive approach to real-time ag- gregate monitoring with differential privacy.IEEE Trans
FAN, L.,ANDXIONG, L. An adaptive approach to real-time ag- gregate monitoring with differential privacy.IEEE Trans. Knowl. Data Eng. 26, 9 (2014), 2094–2106
work page 2014
-
[22]
DPI: ensuring strict differential privacy for infinite data streaming
FENG, S., MOHAMMADY, M., WANG, H., LI, X., QIN, Z.,AND HONG, Y. DPI: ensuring strict differential privacy for infinite data streaming. InIEEE Symposium on Security and Privacy, SP 2024, San Francisco, CA, USA, May 19-23, 2024(2024), pp. 1009– 1027
work page 2024
-
[23]
Sleep scheduling for critical event monitoring in wireless sensor net- works.IEEE Trans
GUO, P., JIANG, T., ZHANG, Q.,ANDZHANG, K. Sleep scheduling for critical event monitoring in wireless sensor net- works.IEEE Trans. Parallel Distributed Syst. 23, 2 (2012), 345– 352
work page 2012
-
[24]
Conservative or liberal? personalized differential privacy
JORGENSEN, Z., YU, T.,ANDCORMODE, G. Conservative or liberal? personalized differential privacy. In31st IEEE Interna- tional Conference on Data Engineering, ICDE 2015, Seoul, South Korea, April 13-17, 2015(2015), pp. 1023–1034
work page 2015
-
[25]
Differentially private event sequences over infinite streams
KELLARIS, G., PAPADOPOULOS, S., XIAO, X.,ANDPAPADIAS, D. Differentially private event sequences over infinite streams. Proc. VLDB Endow. 7, 12 (2014), 1155–1166
work page 2014
-
[26]
One-sided differential pri- vacy
KOTSOGIANNIS, I., DOUDALIS, S., HANEY, S., MACHANAVA- JJHALA, A.,ANDMEHROTRA, S. One-sided differential pri- vacy. In36th IEEE International Conference on Data Engineer- ing, ICDE 2020, Dallas, TX, USA, April 20-24, 2020(2020), pp. 493–504
work page 2020
-
[27]
KULLBACK, S.,ANDLEIBLER, R. A. On information and suffi- ciency.The annals of mathematical statistics 22, 1 (1951), 79–86
work page 1951
-
[28]
Locally private stream- ing data release with shuffling and subsampling
LI, X., CAO, Y.,ANDYOSHIKAWA, M. Locally private stream- ing data release with shuffling and subsampling. In39th IEEE In- ternational Conference on Data Engineering, ICDE 2023 - Work- shops, Anaheim, CA, USA, April 3-7, 2023(2023), IEEE, pp. 125– 131
work page 2023
-
[29]
SPAS: continuous release of data streams under w- event differential privacy.Proc
LI, X., LI, T., CHENG, Y., GONG, C., REN, K., QIN, Z.,AND WANG, T. SPAS: continuous release of data streams under w- event differential privacy.Proc. ACM Manag. Data 3, 1 (2025), 78a:1–78a:27
work page 2025
-
[30]
Divergence measures based on the shannon entropy.IEEE Trans
LIN, J. Divergence measures based on the shannon entropy.IEEE Trans. Inf. Theory 37, 1 (1991), 145–151
work page 1991
-
[31]
Projected federated averaging with heterogeneous differential privacy.Proc
LIU, J., LOU, J., XIONG, L., LIU, J.,ANDMENG, X. Projected federated averaging with heterogeneous differential privacy.Proc. VLDB Endow. 15, 4 (2021), 828–840
work page 2021
-
[32]
Query - dependent video representation for moment retrieval and high- light detection
MOON, W., HYUN, S., PARK, S., PARK, D.,ANDHEO, J. Query - dependent video representation for moment retrieval and high- light detection. InIEEE/CVF Conference on Computer Vision and Pattern Recognition, CVPR 2023, Vancouver, BC, Canada, June 17-24, 2023(2023), pp. 23023–23033
work page 2023
-
[33]
Utility-optimized local differential privacy mechanisms for distribution estimation
MURAKAMI, T.,ANDKAWAMOTO, Y. Utility-optimized local differential privacy mechanisms for distribution estimation. In 28th USENIX Security Symposium, USENIX Security 2019, Santa Clara, CA, USA, August 14-16, 2019(2019), pp. 1877–1894
work page 2019
-
[34]
LDP-IDS: local differential privacy for infinite data streams
REN, X., SHI, L., YU, W., YANG, S., ZHAO, C.,ANDXU, Z. LDP-IDS: local differential privacy for infinite data streams. In SIGMOD ’22: International Conference on Management of Data, Philadelphia, PA, USA, June 12 - 17, 2022(2022), pp. 1064–1077
work page 2022
-
[35]
Personalized trun- cation for personalized privacy.Proc
SUN, D., DONG, W., QIU, Y.,ANDYI, K. Personalized trun- cation for personalized privacy.Proc. ACM Manag. Data 2, 6 (2024), 249:1–249:25. SIGMOD 2025
work page 2024
-
[36]
Concurrent shuffle differential privacy under continual obser- vation
TENENBAUM, J., KAPLAN, H., MANSOUR, Y.,ANDSTEMMER, U. Concurrent shuffle differential privacy under continual obser- vation. InInternational Conference on Machine Learning, ICML 2023, 23-29 July 2023, Honolulu, Hawaii, USA(2023), A. Krause, E. Brunskill, K. Cho, B. Engelhardt, S. Sabato, and J. Scarlett, Eds., vol. 202 ofProceedings of Machine Learning Re...
work page 2023
-
[37]
Rescuedp: Real-time spatio-temporal crowd-sourced data pub- lishing with differential privacy
WANG, Q., ZHANG, Y., LU, X., WANG, Z., QIN, Z.,ANDREN, K. Rescuedp: Real-time spatio-temporal crowd-sourced data pub- lishing with differential privacy. In35th Annual IEEE Inter- national Conference on Computer Communications, INFOCOM 2016, San Francisco, CA, USA, April 10-14, 2016(2016), pp. 1– 9
work page 2016
-
[38]
Differential private data stream analytics in the lo- cal and shuffle models.IEEE Trans
WANG, S., LI, J., PENG, Y., CHEN, K., YANG, W., JIANG, H., ANDLI, J. Differential private data stream analytics in the lo- cal and shuffle models.IEEE Trans. Mob. Comput. 24, 7 (2025), 6701–6717
work page 2025
-
[39]
Q., ZHANG, Z., SU, D., CHENG, Y., LI, Z., LI, N.,ANDJHA, S
WANG, T., CHEN, J. Q., ZHANG, Z., SU, D., CHENG, Y., LI, Z., LI, N.,ANDJHA, S. Continuous release of data streams under both centralized and local differential privacy. InCCS ’21: 2021 ACM SIGSAC Conference on Computer and Communications Se- curity, Virtual Event, Republic of Korea, November 15 - 19, 2021 (2021), pp. 1237–1253. Personalizedw-Event Privacy...
work page 2021
-
[40]
Personalized privacy-preserving task allocation for mobile crowdsensing.IEEE Trans
WANG, Z., HU, J., LV, R., WEI, J., WANG, Q., YANG, D.,AND QI, H. Personalized privacy-preserving task allocation for mobile crowdsensing.IEEE Trans. Mob. Comput. 18, 6 (2019), 1330– 1341
work page 2019
-
[41]
Towards pattern-aware privacy-preserving real-time data col- lection
WANG, Z., LIU, W., PANG, X., REN, J., LIU, Z.,ANDCHEN, Y. Towards pattern-aware privacy-preserving real-time data col- lection. In39th IEEE Conference on Computer Communications, INFOCOM 2020, Toronto, ON, Canada, July 6-9, 2020(2020), pp. 109–118
work page 2020
-
[42]
A prompt log analysis of text-to-image generation systems
XIE, Y., PAN, Z., MA, J., JIE, L.,ANDMEI, Q. A prompt log analysis of text-to-image generation systems. InProceedings of the ACM Web Conference 2023, WWW 2023, Austin, TX, USA, 30 April 2023 - 4 May 2023(2023), pp. 3892–3902
work page 2023
-
[43]
DDRM: A continual frequency estimation mechanism with local differential privacy.IEEE Trans
XUE, Q., YE, Q., HU, H., ZHU, Y.,ANDWANG, J. DDRM: A continual frequency estimation mechanism with local differential privacy.IEEE Trans. Knowl. Data Eng. 35, 7 (2023), 6784–6797
work page 2023
-
[44]
Nationtelescope: Monitoring and visualizing large-scale collective behavior in lb- sns.J
YANG, D., ZHANG, D., CHEN, L.,ANDQU, B. Nationtelescope: Monitoring and visualizing large-scale collective behavior in lb- sns.J. Netw. Comput. Appl. 55(2015), 170–180
work page 2015
-
[45]
YANG, D., ZHANG, D.,ANDQU, B. Participatory cultural map- ping based on collective behavior data in location-based social net- works.ACM Trans. Intell. Syst. Technol. 7, 3 (2016), 30:1–30:23
work page 2016
-
[46]
YE, Q., HU, H., HUANG, K., AU, M. H.,ANDXUE, Q. State- ful switch: Optimized time series release with local differential privacy. InIEEE INFOCOM 2023 - IEEE Conference on Com- puter Communications, New York City, NY, USA, May 17-20, 2023 (2023), pp. 1–10
work page 2023
-
[47]
Driving with knowledge from the physical world
YUAN, J., ZHENG, Y., XIE, X.,ANDSUN, G. Driving with knowledge from the physical world. InProceedings of the 17th ACM SIGKDD International Conference on Knowledge Discov- ery and Data Mining, San Diego, CA, USA, August 21-24, 2011 (2011), pp. 316–324
work page 2011
-
[48]
T-drive: driving directions based on taxi trajec- tories
YUAN, J., ZHENG, Y., ZHANG, C., XIE, W., XIE, X., SUN, G., ANDHUANG, Y. T-drive: driving directions based on taxi trajec- tories. In18th ACM SIGSPATIAL International Symposium on Advances in Geographic Information Systems, ACM-GIS 2010, November 3-5, 2010, San Jose, CA, USA, Proceedings(2010), pp. 99–108. 8 Appendix 8.1 Running time Analysis In this subse...
work page 2010
discussion (0)
Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.