{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:17:18Z","timestamp":1763468238150},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319116617"},{"type":"electronic","value":"9783319116624"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-11662-4_21","type":"book-chapter","created":{"date-parts":[[2014,10,1]],"date-time":"2014-10-01T05:19:18Z","timestamp":1412140758000},"page":"291-305","source":"Crossref","is-referenced-by-count":16,"title":["Robust and Private Bayesian Inference"],"prefix":"10.1007","author":[{"given":"Christos","family":"Dimitrakakis","sequence":"first","affiliation":[]},{"given":"Blaine","family":"Nelson","sequence":"additional","affiliation":[]},{"given":"Aikaterini","family":"Mitrokotsa","sequence":"additional","affiliation":[]},{"given":"Benjamin I. P.","family":"Rubinstein","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"21_CR1","doi-asserted-by":"crossref","unstructured":"Berger, J.O.: Statistical Decision Theory and Bayesian Analysis. Springer (1985)","DOI":"10.1007\/978-1-4757-4286-2"},{"key":"21_CR2","unstructured":"Bickel, P.J., Doksum, K.A.: Mathematical Statistics: Basic Ideas and Selected Topics, vol.\u00a01. Holden-Day Company (2001)"},{"key":"21_CR3","first-page":"499","volume":"2","author":"O. Bousquet","year":"2002","unstructured":"Bousquet, O., Elisseeff, A.: Stability and generalization. Journal of Machine Learning Research\u00a02, 499\u2013526 (2002)","journal-title":"Journal of Machine Learning Research"},{"key":"21_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1007\/978-3-642-39077-7_5","volume-title":"Privacy Enhancing Technologies","author":"K. Chatzikokolakis","year":"2013","unstructured":"Chatzikokolakis, K., Andr\u00e9s, M.E., Bordenabe, N.E., Palamidessi, C.: Broadening the scope of differential privacy using metrics. In: De Cristofaro, E., Wright, M. (eds.) PETS 2013. LNCS, vol.\u00a07981, pp. 82\u2013102. Springer, Heidelberg (2013)"},{"key":"21_CR5","unstructured":"Chaudhuri, K., Hsu, D.: Convergence rates for differentially private statistical estimation. In: ICML (2012)"},{"key":"21_CR6","first-page":"1069","volume":"12","author":"K. Chaudhuri","year":"2011","unstructured":"Chaudhuri, K., Monteleoni, C., Sarwate, A.D.: Differentially private empirical risk minimization. Journal of Machine Learning Research\u00a012, 1069\u20131109 (2011)","journal-title":"Journal of Machine Learning Research"},{"key":"21_CR7","unstructured":"DeGroot, M.H.: Optimal Statistical Decisions. John Wiley & Sons (1970)"},{"key":"21_CR8","doi-asserted-by":"crossref","unstructured":"Dimitrakakis, C., Nelson, B., Mitrokotsa, A., Rubinstein, B.: Robust and private Bayesian inference. Technical report, arXiv:1306.1066 (2014)","DOI":"10.1007\/978-3-319-11662-4_21"},{"key":"21_CR9","doi-asserted-by":"crossref","unstructured":"Duchi, J.C., Jordan, M.I., Wainwright, M.J.: Local privacy and statistical minimax rates. Technical report, arXiv:1302.3203 (2013)","DOI":"10.1109\/FOCS.2013.53"},{"key":"21_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11787006_1","volume-title":"Automata, Languages and Programming","author":"C. Dwork","year":"2006","unstructured":"Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol.\u00a04052, pp. 1\u201312. Springer, Heidelberg (2006)"},{"key":"21_CR11","doi-asserted-by":"crossref","unstructured":"Dwork, C., Lei, J.: Differential privacy and robust statistics. In: STOC, pp. 371\u2013380 (2009)","DOI":"10.1145\/1536414.1536466"},{"key":"21_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/11681878_14","volume-title":"Theory of Cryptography","author":"C. Dwork","year":"2006","unstructured":"Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol.\u00a03876, pp. 265\u2013284. Springer, Heidelberg (2006)"},{"issue":"2","key":"21_CR13","first-page":"135","volume":"1","author":"C. Dwork","year":"2009","unstructured":"Dwork, C., Smith, A.: Differential privacy for statistics: What we know and what we want to learn. Journal of Privacy and Confidentiality\u00a01(2), 135\u2013154 (2009)","journal-title":"Journal of Privacy and Confidentiality"},{"issue":"6","key":"21_CR14","doi-asserted-by":"publisher","first-page":"1491","DOI":"10.1109\/TIT.2003.811927","volume":"49","author":"A.A. Fedotov","year":"2003","unstructured":"Fedotov, A.A., Harremo\u00ebs, P., Topsoe, F.: Refinements of Pinsker\u2019s inequality. IEEE Transactions on Information Theory\u00a049(6), 1491\u20131498 (2003)","journal-title":"IEEE Transactions on Information Theory"},{"issue":"4","key":"21_CR15","doi-asserted-by":"publisher","first-page":"1367","DOI":"10.1214\/009053604000000553","volume":"32","author":"P.D. Gr\u00fcnwald","year":"2004","unstructured":"Gr\u00fcnwald, P.D., Dawid, A.P.: Game theory, maximum entropy, minimum discrepancy, and robust bayesian decision theory. The Annals of Statistics\u00a032(4), 1367\u20131433 (2004)","journal-title":"The Annals of Statistics"},{"key":"21_CR16","first-page":"703","volume":"14","author":"R. Hall","year":"2013","unstructured":"Hall, R., Rinaldo, A., Wasserman, L.: Differential privacy for functions and functional data. Journal of Machine Learning Research\u00a014, 703\u2013727 (2013)","journal-title":"Journal of Machine Learning Research"},{"key":"21_CR17","unstructured":"Hampel, F.R., Ronchetti, E.M., Rousseeuw, P.J., Stahel, W.A.: Robust Statistics: The Approach Based on Influence Functions. John Wiley and Sons (1986)"},{"key":"21_CR18","doi-asserted-by":"crossref","unstructured":"Huber, P.J.: Robust Statistics. John Wiley and Sons (1981)","DOI":"10.1002\/0471725250"},{"key":"21_CR19","doi-asserted-by":"crossref","unstructured":"McSherry, F., Talwar, K.: Mechanism design via differential privacy. In: FOCS, pp. 94\u2013103 (2007)","DOI":"10.1109\/FOCS.2007.66"},{"key":"21_CR20","doi-asserted-by":"crossref","unstructured":"Mir, D.: Differentially-private learning and information theory. In: Proceedings of the 2012 Joint EDBT\/ICDT Workshops, pp. 206\u2013210. ACM (2012)","DOI":"10.1145\/2320765.2320823"},{"issue":"2","key":"21_CR21","first-page":"226","volume":"22","author":"V. Norkin","year":"1986","unstructured":"Norkin, V.: Stochastic Lipschitz functions. Cybernetics and Systems Analysis\u00a022(2), 226\u2013233 (1986)","journal-title":"Cybernetics and Systems Analysis"},{"key":"21_CR22","doi-asserted-by":"crossref","unstructured":"Rubinstein, B.I.P., Bartlett, P.L., Huang, L., Taft, N.: Learning in a large function space: Privacy-preserving mechanisms for SVM learning. Journal of Privacy and Confidentiality 4(1) (2012)","DOI":"10.29012\/jpc.v4i1.612"},{"issue":"489","key":"21_CR23","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1198\/jasa.2009.tm08651","volume":"105","author":"L. Wasserman","year":"2010","unstructured":"Wasserman, L., Zhou, S.: A statistical framework for differential privacy. Journal of the American Statistical Association\u00a0105(489), 375\u2013389 (2010)","journal-title":"Journal of the American Statistical Association"},{"key":"21_CR24","unstructured":"Weissman, T., Ordentlich, E., Seroussi, G., Verdu, S., Weinberger, M.J.: Inequalities for the L1 deviation of the empirical distribution. Technical report, Hewlett-Packard Labs (2003)"},{"key":"21_CR25","unstructured":"Williams, O., McSherry, F.: Probabilistic inference and differential privacy. In: NIPS, pp. 2451\u20132459 (2010)"},{"key":"21_CR26","unstructured":"Xiao, Y., Xiong, L.: Bayesian inference under differential privacy. Technical report, arXiv:1203.0617 (2012)"}],"container-title":["Lecture Notes in Computer Science","Algorithmic Learning Theory"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-11662-4_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,27]],"date-time":"2019-05-27T21:14:59Z","timestamp":1558991699000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-11662-4_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319116617","9783319116624"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-11662-4_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}