{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T04:39:10Z","timestamp":1769834350122,"version":"3.49.0"},"publisher-location":"Singapore","reference-count":34,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819604364","type":"print"},{"value":"9789819604371","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-96-0437-1_2","type":"book-chapter","created":{"date-parts":[[2024,11,26]],"date-time":"2024-11-26T16:57:03Z","timestamp":1732640223000},"page":"16-30","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Navigating Differential Privacy Constraints in Machine Learning"],"prefix":"10.1007","author":[{"given":"Trung","family":"Ha","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Tran Khanh","family":"Dang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2024,11,27]]},"reference":[{"key":"2_CR1","doi-asserted-by":"crossref","unstructured":"Dwork, C.: Differential privacy. In: International Colloquium on Automata, Languages, and Programming, vol. 4052, pp. 1\u201312 (2006)","DOI":"10.1007\/11787006_1"},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"Dwork, C., Kenthapadi, K., McSherry, F., Mironov, I., Naor, M.: Our data, ourselves: privacy via distributed noise generation. In: Proceeding of the 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 486\u2013503 (2006)","DOI":"10.1007\/11761679_29"},{"key":"2_CR3","doi-asserted-by":"crossref","unstructured":"Nissim, K., Raskhodnikova, S., Smith, A.: Smooth sensitivity and sampling in private data analysis. In: Proceeding of the 39th Annual ACM Symposium on Theory of Computing, pp. 75\u201384 (2007)","DOI":"10.1145\/1250790.1250803"},{"key":"2_CR4","doi-asserted-by":"crossref","unstructured":"Lee, J., Clifton, C.: How much is enough? choosing \u03b5 for differential privacy. In: Proceeding of the 14th International Conference Information Security, pp. 325\u2013340 (2011)","DOI":"10.1007\/978-3-642-24861-0_22"},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"Lee, J., Clifton, C.: Differential identifiability. In: Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1041\u20131049 (2012)","DOI":"10.1145\/2339530.2339695"},{"key":"2_CR6","volume-title":"Guidance Regarding Methods for De-identification of Protected Health Information in Accordance with the Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule","author":"I Portability","year":"2012","unstructured":"Portability, I., Act, A.: Guidance Regarding Methods for De-identification of Protected Health Information in Accordance with the Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule. Human Health Services, Washington DC (2012)"},{"key":"2_CR7","doi-asserted-by":"crossref","unstructured":"Clifton, C.. Tassa, T.: On syntactic anonymity and differential privacy. In: Proceeding of the IEEE 29th International Conference on Data Engineering Workshops (ICDEW), pp. 88\u201393 (2013)","DOI":"10.1109\/ICDEW.2013.6547433"},{"key":"2_CR8","doi-asserted-by":"crossref","unstructured":"Li, N., Qardaji, W., Su, D., Wu, Y., Yang, W.: Membership privacy: a unifying framework for privacy definitions. In: Proceeding of the 20th ACM SIGSAC Conference on Computer & Communications Security, pp. 889\u2013900 (2013)","DOI":"10.1145\/2508859.2516686"},{"key":"2_CR9","doi-asserted-by":"crossref","unstructured":"Song, S., Chaudhuri, K., Sarwate, A.D.: Stochastic gradient descent with differentially private updates. In: Proceeding of the 1st IEEE Global Conference on Signal and Information Processing, pp. 245\u2013248 (2013)","DOI":"10.1109\/GlobalSIP.2013.6736861"},{"key":"2_CR10","doi-asserted-by":"crossref","unstructured":"Bassily, R., Smith, A. and Thakurta, A.: Private empirical risk minimization: Efficient algorithms and tight error bounds. In: Proceeding of the 55th Annual Symposium on Foundations of Computer Science, pp. 464\u2013473 (2014)","DOI":"10.1109\/FOCS.2014.56"},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"Dwork, C., Roth, A.: The algorithmic foundations of differential privacy. Foundations and Trends\u00ae in Theoretical Computer Science, 9(3\u20134), pp.211\u2013407","DOI":"10.1561\/0400000042"},{"key":"2_CR12","doi-asserted-by":"crossref","unstructured":"Hsu, J., ET AL.: Differential privacy: an economic method for choosing epsilon. In: Proceeding of the 27th Computer Security Foundations Symposium, pp. 398\u2013410 (2014)","DOI":"10.1109\/CSF.2014.35"},{"issue":"1","key":"2_CR13","first-page":"1","volume":"6","author":"SP Kasiviswanathan","year":"2014","unstructured":"Kasiviswanathan, S.P., Smith, A.: On the\u2019semantics\u2019 of differential privacy: a bayesian formulation. J. Priv. Confidentiality 6(1), 1\u201316 (2014)","journal-title":"J. Priv. Confidentiality"},{"key":"2_CR14","doi-asserted-by":"crossref","unstructured":"Abadi, M., et al.: Deep learning with differential privacy. In: Proceedings of the 23rd ACM SIGSAC Conference on Computer and Communications Security, pp. 308\u2013318 (2016)","DOI":"10.1145\/2976749.2978318"},{"key":"2_CR15","unstructured":"Nissenbaum, H.: Differential privacy in context: conceptual and ethical considerations. In: Four Facets of Differential Privacy Symposium (2016)"},{"issue":"6","key":"2_CR16","doi-asserted-by":"publisher","first-page":"4037","DOI":"10.1109\/TIT.2017.2685505","volume":"63","author":"P Kairouz","year":"2017","unstructured":"Kairouz, P., Oh, S., Viswanath, P.: The composition theorem for differential privacy. IEEE Trans. Inf. Theory 63(6), 4037\u20134049 (2017)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"2_CR17","doi-asserted-by":"crossref","unstructured":"Mironov, I.: R\u00e9nyi differential privacy. In: Proceeding of the 30th Computer Security Foundations Symposium (CSF), pp. 263\u2013275 (2017)","DOI":"10.1109\/CSF.2017.11"},{"issue":"Suppl 1","key":"2_CR18","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1186\/s42162-018-0025-3","volume":"1","author":"G Eibl","year":"2018","unstructured":"Eibl, G., Bao, K., Grassal, P.W., Bernau, D., Schmeck, H.: The influence of differential privacy on short term electric load forecasting. Energy Inform. 1(Suppl 1), 48 (2018)","journal-title":"Energy Inform."},{"key":"2_CR19","unstructured":"McMahan, H.B., et al.: A general approach to adding differential privacy to iterative training procedures. arXiv preprint arXiv:1812.06210 (2018)"},{"issue":"2128","key":"2_CR20","doi-asserted-by":"publisher","first-page":"20170358","DOI":"10.1098\/rsta.2017.0358","volume":"376","author":"K Nissim","year":"2018","unstructured":"Nissim, K., Wood, A.: Is privacy privacy? Philos. Trans. R. Soc. A: Math. Phys. Eng. Sci. 376(2128), 20170358 (2018)","journal-title":"Philos. Trans. R. Soc. A: Math. Phys. Eng. Sci."},{"issue":"1","key":"2_CR21","first-page":"61","volume":"11","author":"MA Rahman","year":"2018","unstructured":"Rahman, M.A., Rahman, T., Lagani\u00e8re, R., Mohammed, N., Wang, Y.: Membership inference attack against differentially private deep learning model. Trans. Data Priv. 11(1), 61\u201379 (2018)","journal-title":"Trans. Data Priv."},{"key":"2_CR22","doi-asserted-by":"crossref","unstructured":"Yeom, S., Giacomelli, I., Fredrikson, M., Jha, S.: Privacy risk in machine learning: analyzing the connection to overfitting. In: Proceeding of the 31st Computer Security Foundations Symposium (CSF), pp. 268\u2013282 (2018)","DOI":"10.1109\/CSF.2018.00027"},{"issue":"1","key":"2_CR23","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1257\/aer.20170627","volume":"109","author":"JM Abowd","year":"2019","unstructured":"Abowd, J.M., Schmutte, I.M.: An economic analysis of privacy protection and statistical accuracy as social choices. Am. Econ. Rev. 109(1), 171\u2013202 (2019)","journal-title":"Am. Econ. Rev."},{"issue":"1","key":"2_CR24","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1080\/13600834.2019.1573501","volume":"28","author":"CJ Hoofnagle","year":"2019","unstructured":"Hoofnagle, C.J., Van Der Sloot, B., Borgesius, F.Z.: The European Union general data protection regulation: what it is and what it means. Inf. Commun. Technol. Law 28(1), 65\u201398 (2019)","journal-title":"Inf. Commun. Technol. Law"},{"issue":"1","key":"2_CR25","first-page":"133","volume":"2019","author":"H Jamie","year":"2019","unstructured":"Jamie, H., Luca, M., George, D., Emiliano, D.C.: LOGAN: membership inference attacks against generative models. Proc. Priv. Enh. Technol. 2019(1), 133\u2013152 (2019)","journal-title":"Proc. Priv. Enh. Technol."},{"key":"2_CR26","unstructured":"Jayaraman, B., Evans, D.: Evaluating differentially private machine learning in practice. In: Proceeding of the 28th USENIX Security Symposium (USENIX Security 19), pp. 1895\u20131912 (2019)"},{"key":"2_CR27","doi-asserted-by":"crossref","unstructured":"Chen, D., Yu, N., Zhang, Y., Fritz, M.: Gan-leaks: a taxonomy of membership inference attacks against generative models. In: Proceeding of the 27th ACM SIGSAC Conference on Computer and Communications Security, pp. 343\u2013362 (2020)","DOI":"10.1145\/3372297.3417238"},{"key":"2_CR28","unstructured":"Humphries, T., Rafuse, M., Tulloch, L., Oya, S., Goldberg, I., Kerschbaum, F.: Differentially private learning does not bound membership inference. arXiv preprint arXiv:2010.12112 (2020)"},{"key":"2_CR29","first-page":"22205","volume":"33","author":"M Jagielski","year":"2020","unstructured":"Jagielski, M., Ullman, J., Oprea, A.: Auditing differentially private machine learning: how private is private SGD? Adv. Neural. Inf. Process. Syst. 33, 22205\u201322216 (2020)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"2_CR30","unstructured":"Carlini, N., et al.: Extracting training data from large language models. In: Proceeding of the 30th USENIX Security Symposium (USENIX Security 21), pp. 2633\u20132650 (2021)"},{"issue":"2","key":"2_CR31","first-page":"348","volume":"2021","author":"B Jayaraman","year":"2021","unstructured":"Jayaraman, B., Wang, L., Knipmeyer, K., Gu, Q., Evans, D.: Revisiting membership inference under realistic assumptions. Proc. Priv. Enh. Technol. 2021(2), 348\u2013368 (2021)","journal-title":"Proc. Priv. Enh. Technol."},{"issue":"3","key":"2_CR32","first-page":"2341","volume":"20","author":"L Liu","year":"2022","unstructured":"Liu, L., Wang, Y., Liu, G., Peng, K., Wang, C.: Membership inference attacks against machine learning models via prediction sensitivity. IEEE Trans. Dependable Secure Comput. 20(3), 2341\u20132347 (2022)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"2\/3","key":"2_CR33","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1108\/IJWIS-04-2022-0078","volume":"18","author":"T Ha","year":"2022","unstructured":"Ha, T., Dang, T.K.: Inference attacks based on GAN in federated learning. Int. J. Web Inf. Syst. 18(2\/3), 117\u2013136 (2022)","journal-title":"Int. J. Web Inf. Syst."},{"key":"2_CR34","doi-asserted-by":"crossref","unstructured":"Ha, T., Vo, T., Dang, T.K., Trang, N.T.H.: Differential privacy under membership inference attacks. In: Proceeding of the 10th International Conference on Future Data and Security Engineering, pp. 255\u2013269 (2023)","DOI":"10.1007\/978-981-99-8296-7_18"}],"container-title":["Communications in Computer and Information Science","Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-0437-1_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,26]],"date-time":"2024-11-26T17:02:41Z","timestamp":1732640561000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-0437-1_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9789819604364","9789819604371"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-0437-1_2","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"27 November 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FDSE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Future Data and Security Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Binh Duong","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vietnam","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 November 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 November 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fdse2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/thefdse.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}