{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T19:20:41Z","timestamp":1762024841064,"version":"build-2065373602"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,6]]},"DOI":"10.1109\/icc40277.2020.9149254","type":"proceedings-article","created":{"date-parts":[[2020,7,27]],"date-time":"2020-07-27T22:26:45Z","timestamp":1595888805000},"page":"1-6","source":"Crossref","is-referenced-by-count":6,"title":["Data-Driven Small Cell Planning for Traffic Offloading with Users\u2019 Differential Privacy"],"prefix":"10.1109","author":[{"given":"Rui","family":"Chen","sequence":"first","affiliation":[]},{"given":"Xinyue","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Jingyi","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Qimei","family":"Cui","sequence":"additional","affiliation":[]},{"given":"Wenjun","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Miao","family":"Pan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3209582.3209588"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MASS.2011.27"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052620"},{"key":"ref13","article-title":"Data privacy through optimal kanonymization","author":"bayardo","year":"2005","journal-title":"21st international conference on data engineering"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1561\/0400000042","article-title":"The algorithmic foundations of differential privacy","volume":"9","author":"dwork","year":"2014","journal-title":"Foundations and Trends in Theoretical Computer Science"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79228-4_1"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.2200\/S00735ED1V01Y201609SPT018"},{"key":"ref18","article-title":"Data-driven risk-averse two-stage stochastic program with -structure probability metrics","author":"zhao","year":"2015","journal-title":"available on Optimization Online"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/BF00934810"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2017.2710021"},{"key":"ref3","first-page":"143","article-title":"Future micro operators business models in 5G","volume":"7","author":"ahokangas","year":"2016","journal-title":"Business Management Review"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2010.5621970"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2016.2520217"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2018.2837876"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2016.7524625"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2502935.2502948"},{"journal-title":"Cisco Visual Networking Index Global Mobile Data Traffic Forecast Update 20122017 Cisco White Paper","year":"2019","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2017.8253985"},{"key":"ref20","first-page":"40","article-title":"How much energy is needed to run a wireless network","volume":"18","author":"godor","year":"2012","journal-title":"IEEE Wireless Communications"}],"event":{"name":"ICC 2020 - 2020 IEEE International Conference on Communications (ICC)","start":{"date-parts":[[2020,6,7]]},"location":"Dublin, Ireland","end":{"date-parts":[[2020,6,11]]}},"container-title":["ICC 2020 - 2020 IEEE International Conference on Communications (ICC)"],"original-title":[],"link":[{"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/xplorestaging.ieee.org\/ielx7\/9141367\/9148588\/09149254.pdf?arnumber=9149254","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,9]],"date-time":"2022-07-09T02:21:00Z","timestamp":1657333260000},"score":1,"resource":{"primary":{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/ieeexplore.ieee.org\/document\/9149254\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6]]},"references-count":20,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1109\/icc40277.2020.9149254","relation":{},"subject":[],"published":{"date-parts":[[2020,6]]}}}