{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T02:42:05Z","timestamp":1743129725011,"version":"3.40.3"},"publisher-location":"Cham","reference-count":34,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031139444"},{"type":"electronic","value":"9783031139451"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-13945-1_4","type":"book-chapter","created":{"date-parts":[[2022,9,13]],"date-time":"2022-09-13T23:02:54Z","timestamp":1663110174000},"page":"46-61","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Asking the\u00a0Proper Question: Adjusting Queries to\u00a0Statistical Procedures Under Differential Privacy"],"prefix":"10.1007","author":[{"given":"Tomer","family":"Shoham","sequence":"first","affiliation":[]},{"given":"Yosef","family":"Rinott","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,9,14]]},"reference":[{"unstructured":"Anderson, T.W.: An Introduction to Multivariate Statistical Analysis. Wiley, New York (2003)","key":"4_CR1"},{"unstructured":"Ashtiani, H., Liaw, C.: Private and polynomial time algorithms for learning Gaussians and beyond. arXiv preprint arXiv:2111.11320 (2021)","key":"4_CR2"},{"unstructured":"Awan, J., Slavkov\u0107, A.: Differentially private uniformly most powerful tests for binomial data. In: Advances in Neural Information Processing Systems, vol. 31 (2018)","key":"4_CR3"},{"unstructured":"Balle, B., Wang, Y.X.: Improving the Gaussian mechanism for differential privacy: analytical calibration and optimal denoising. In: International Conference on Machine Learning, pp. 394\u2013403. PMLR, July 2018","key":"4_CR4"},{"issue":"9","key":"4_CR5","doi-asserted-by":"publisher","first-page":"1079","DOI":"10.1016\/S0022-2275(20)34281-4","volume":"26","author":"CB Blum","year":"1985","unstructured":"Blum, C.B., Dell, R.B., Palmer, R.H., Ramakrishnan, R., Seplowitz, A.H., Goodman, D.S.: Relationship of the parameters of body cholesterol metabolism with plasma levels of HDL cholesterol and the major HDL apoproteins. J. Lipid Res. 26(9), 1079\u20131088 (1985)","journal-title":"J. Lipid Res."},{"unstructured":"Brown, G., Gaboardi, M., Smith, A., Ullman, J., Zakynthinou, L.: Covariance-aware private mean estimation without private covariance estimation. In: Advances in Neural Information Processing Systems, vol. 34 (2013)","key":"4_CR6"},{"doi-asserted-by":"crossref","unstructured":"Canonne, C.L., Kamath, G., McMillan, A., Smith, A., Ullman, J.: The structure of optimal private tests for simple hypotheses. In: Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Computing, pp. 310\u2013321 (2019)","key":"4_CR7","DOI":"10.1145\/3313276.3316336"},{"issue":"3","key":"4_CR8","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1016\/0021-9681(77)90082-0","volume":"30","author":"WP Castelli","year":"1977","unstructured":"Castelli, W.P., et al.: Distribution of triglyceride and total, LDL and HDL cholesterol in several populations: a cooperative lipoprotein phenotyping study. J. Chronic Dis. 30(3), 147\u2013169 (1977)","journal-title":"J. Chronic Dis."},{"doi-asserted-by":"crossref","unstructured":"Degue, K.H., Le Ny, J.: On differentially private Gaussian hypothesis testing. In:2 018 56th Annual Allerton Conference on Communication, Control, and Computing (Allerton), pp. 842\u2013847. IEEE, October 2018","key":"4_CR9","DOI":"10.1109\/ALLERTON.2018.8635911"},{"doi-asserted-by":"crossref","unstructured":"Diaconis, P., Perlman, M.D.: Bounds for tail probabilities of weighted sums of independent gamma random variables. Lecture Notes-Monograph Series, pp. 147\u2013166 (1990)","key":"4_CR10","DOI":"10.1214\/lnms\/1215457557"},{"key":"4_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/11681878_14","volume-title":"Theory of Cryptography","author":"C Dwork","year":"2006","unstructured":"Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 265\u2013284. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11681878_14"},{"issue":"3\u20134","key":"4_CR12","first-page":"211","volume":"9","author":"C Dwork","year":"2014","unstructured":"Dwork, C., Roth, A.: The algorithmic foundations of differential privacy. Found. Trends Theor. Comput. Sci. 9(3\u20134), 211\u2013407 (2014)","journal-title":"Found. Trends Theor. Comput. Sci."},{"doi-asserted-by":"crossref","unstructured":"Edmonds, A., Nikolov, A., Ullman, J.: The power of factorization mechanisms in local and central differential privacy. In: Proceedings of the 52nd Annual ACM SIGACT Symposium on Theory of Computing, pp. 425\u2013438 (2020)","key":"4_CR13","DOI":"10.1145\/3357713.3384297"},{"issue":"4","key":"4_CR14","doi-asserted-by":"publisher","first-page":"655","DOI":"10.1111\/j.1467-9868.2006.00560.x","volume":"68","author":"B Efron","year":"2006","unstructured":"Efron, B.: Minimum volume confidence regions for a multivariate normal mean vector. J. R. Stat. Soc. Ser. B (Stat. Methodol.) 68(4), 655\u2013670 (2006)","journal-title":"J. R. Stat. Soc. Ser. B (Stat. Methodol.)"},{"unstructured":"Gaboardi, M., Lim, H., Rogers, R., Vadhan, S.: Differentially private chi-squared hypothesis testing: goodness of fit and independence testing. In: International Conference on Machine Learning, pp. 2111\u20132120. PMLR, June 2016","key":"4_CR15"},{"issue":"6","key":"4_CR16","doi-asserted-by":"publisher","first-page":"1673","DOI":"10.1137\/09076828X","volume":"41","author":"A Ghosh","year":"2012","unstructured":"Ghosh, A., Roughgarden, T., Sundararajan, M.: Universally utility-maximizing privacy mechanisms. SIAM J. Comput. 41(6), 1673\u20131693 (2012)","journal-title":"SIAM J. Comput."},{"doi-asserted-by":"crossref","unstructured":"Gupte, M., Sundararajan, M.: Universally optimal privacy mechanisms for minimax agents. In: Proceedings of the Twenty-Ninth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, pp. 135\u2013146 (2010)","key":"4_CR17","DOI":"10.1145\/1807085.1807105"},{"issue":"2","key":"4_CR18","first-page":"43","volume":"4","author":"R Hall","year":"2012","unstructured":"Hall, R., Rinaldo, A., Wasserman, L.: Random differential privacy. J. Privacy Confident. 4(2), 43\u201359 (2012)","journal-title":"J. Privacy Confident."},{"doi-asserted-by":"crossref","unstructured":"Horn, R.A., Johnson, C.R.: Matrix Analysis. Cambridge University Press, Cambridge (2012)","key":"4_CR19","DOI":"10.1017\/CBO9781139020411"},{"issue":"1","key":"4_CR20","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1214\/15-AOS1358","volume":"44","author":"V Karwa","year":"2016","unstructured":"Karwa, V., Slavkovi\u0107, A.: Inference using noisy degrees: differentially private $$\\beta $$-model and synthetic graphs. Ann. Stat. 44(1), 87\u2013112 (2016)","journal-title":"Ann. Stat."},{"unstructured":"Karwa, V., Vadhan, S.: Finite sample differentially private confidence intervals. In: 9th Innovations in Theoretical Computer Science Conference, vol. 94, p. 44. Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik (2018)","key":"4_CR21"},{"doi-asserted-by":"crossref","unstructured":"Li, C., Hay, M., Rastogi, V., Miklau, G., McGregor, A.: Optimizing histogram queries under differential privacy. arXiv preprint arXiv:0912.4742 (2009)","key":"4_CR22","DOI":"10.1145\/1807085.1807104"},{"doi-asserted-by":"crossref","unstructured":"Li, C., Miklau, G.: An adaptive mechanism for accurate query answering under differential privacy. Proc. VLDB Endow. 5(6) (2002)","key":"4_CR23","DOI":"10.14778\/2168651.2168653"},{"issue":"6","key":"4_CR24","doi-asserted-by":"publisher","first-page":"757","DOI":"10.1007\/s00778-015-0398-x","volume":"24","author":"C Li","year":"2015","unstructured":"Li, C., Miklau, G., Hay, M., McGregor, A., Rastogi, V.: The matrix mechanism: Optimizing linear counting queries under differential privacy. VLDB J. 24(6), 757\u2013781 (2015)","journal-title":"VLDB J."},{"doi-asserted-by":"publisher","unstructured":"Marshall, A.W., Ingram Olkin, B.C.: Arnold Inequalities: Theory of Majorization and Its Applications. Springer, New York (2011). https:\/\/doi.org\/10.1007\/978-0-387-68276","key":"4_CR25","DOI":"10.1007\/978-0-387-68276"},{"issue":"10","key":"4_CR26","doi-asserted-by":"publisher","first-page":"1206","DOI":"10.14778\/3231751.3231769","volume":"11","author":"R McKenna","year":"2018","unstructured":"McKenna, R., Miklau, G., Hay, M., Machanavajjhala, A.: Optimizing error of high-dimensional statistical queries under differential privacy. Proc. VLDB Endow.- 11(10), 1206\u20131219 (2018)","journal-title":"Proc. VLDB Endow.-"},{"doi-asserted-by":"crossref","unstructured":"Mohammady, M., et al.: R2DP: a universal and automated approach to optimizing the randomization mechanisms of differential privacy for utility metrics with no known optimal distributions. In: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, pp. 677\u2013696, October 2020","key":"4_CR27","DOI":"10.1145\/3372297.3417259"},{"issue":"20","key":"4_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.17485\/ijst\/2017\/v10i20\/91294","volume":"10","author":"NA Qureshi","year":"2017","unstructured":"Qureshi, N.A., Suthar, V., Magsi, H., Sheikh, M.J., Pathan, M., Qureshi, B.: Application of principal component analysis (PCA) to medical data. Ind. J. Sci. Technol. 10(20), 1\u20139 (2017)","journal-title":"Ind. J. Sci. Technol."},{"unstructured":"Rogers, R., Kifer, D.: A new class of private chi-square hypothesis tests. In: Artificial Intelligence and Statistics, pp. 991\u20131000. PMLR (2017)","key":"4_CR29"},{"issue":"8","key":"4_CR30","doi-asserted-by":"publisher","first-page":"997","DOI":"10.1007\/s00184-015-0537-9","volume":"78","author":"F Roosta-Khorasani","year":"2015","unstructured":"Roosta-Khorasani, F., Sz\u00e9kely, G.J.: Schur properties of convolutions of gamma random variables. Metrika 78(8), 997\u20131014 (2015). https:\/\/doi.org\/10.1007\/s00184-015-0537-9","journal-title":"Metrika"},{"issue":"1","key":"4_CR31","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1137\/14096311X","volume":"3","author":"F Roosta-Khorasani","year":"2015","unstructured":"Roosta-Khorasani, F., Sz\u00e9ekely, G.J., Ascher, U.M.: Assessing stochastic algorithms for large scale nonlinear least squares problems using extremal probabilities of linear combinations of gamma random variables. SIAM\/ASA J. Uncert. Quant. 3(1), 61\u201390 (2015)","journal-title":"SIAM\/ASA J. Uncert. Quant."},{"doi-asserted-by":"crossref","unstructured":"Shoham, T., Rinott, Y.: Adjusting queries to statistical procedures under differential privacy. arXiv preprint arXiv:2110.05895 (2021)","key":"4_CR32","DOI":"10.1007\/978-3-031-13945-1_4"},{"unstructured":"Solea, E. Differentially private hypothesis testing for normal random variables (2014)","key":"4_CR33"},{"doi-asserted-by":"crossref","unstructured":"Wang, Y., Kifer, D., Lee, J., Karwa, V.: Statistical approximating distributions under differential privacy. J. Privacy Confident. 8(1) (2018)","key":"4_CR34","DOI":"10.29012\/jpc.666"}],"container-title":["Lecture Notes in Computer Science","Privacy in Statistical Databases"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-13945-1_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,3]],"date-time":"2024-10-03T20:22:26Z","timestamp":1727986946000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-13945-1_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031139444","9783031139451"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-13945-1_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"14 September 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PSD","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Privacy in Statistical Databases","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Paris","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 September 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 September 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"psd2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/crises-deim.urv.cat\/psd2022\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"45","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"25","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"56% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.1","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}