{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:41:35Z","timestamp":1762004495472},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2013,6,28]],"date-time":"2013-06-28T00:00:00Z","timestamp":1372377600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Mach Learn"],"published-print":{"date-parts":[[2013,10]]},"DOI":"10.1007\/s10994-013-5396-x","type":"journal-article","created":{"date-parts":[[2013,6,27]],"date-time":"2013-06-27T16:32:42Z","timestamp":1372350762000},"page":"163-183","source":"Crossref","is-referenced-by-count":18,"title":["Differential privacy based on importance weighting"],"prefix":"10.1007","volume":"93","author":[{"given":"Zhanglong","family":"Ji","sequence":"first","affiliation":[]},{"given":"Charles","family":"Elkan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,6,28]]},"reference":[{"key":"5396_CR1","first-page":"609","volume-title":"STOC","author":"A. Blum","year":"2008","unstructured":"Blum, A., Ligett, K., & Roth, A. (2008). A learning theory approach to non-interactive database privacy. In C. Dwork (Ed.), STOC (pp. 609\u2013618). New York: ACM."},{"key":"5396_CR2","first-page":"1069","volume":"12","author":"K. Chaudhuri","year":"2011","unstructured":"Chaudhuri, K., Monteleoni, C., & Sarwate, A. D. (2011). Differentially private empirical risk minimization. Journal of Machine Learning Research, 12, 1069\u20131109.","journal-title":"Journal of Machine Learning Research"},{"key":"5396_CR3","first-page":"217","volume-title":"SIGMOD conference","author":"B. Ding","year":"2011","unstructured":"Ding, B., Winslett, M., Han, J., & Li, Z. (2011). Differentially private data cubes: optimizing noise sources and consistency. In SIGMOD conference (pp. 217\u2013228)."},{"key":"5396_CR4","series-title":"Lecture notes in computer science","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/11787006_1","volume-title":"ICALP (2)","author":"C. Dwork","year":"2006","unstructured":"Dwork, C. (2006). Differential privacy. In M. Bugliesi, B. Preneel, V. Sassone, & I. Wegener (Eds.), Lecture notes in computer science: Vol.\u00a04052. ICALP (2) (pp. 1\u201312). Berlin: Springer."},{"key":"5396_CR5","first-page":"265","volume-title":"Lecture notes in computer science","author":"C. Dwork","year":"2006","unstructured":"Dwork, C., McSherry, F., Nissim, K., & Smith, A. (2006). Calibrating noise to sensitivity in private data analysis. In S. Halevi & T. Rabin (Eds.), Lecture notes in computer science (Vol.\u00a03876, pp. 265\u2013284). Berlin: Springer."},{"key":"5396_CR6","series-title":"Lecture notes in computer science","volume-title":"Proceedings of the ECML\/PKDD workshop on privacy and security issues in data mining and machine learning (PSDML)","author":"C. Elkan","year":"2010","unstructured":"Elkan, C. (2010). Preserving privacy in data mining via importance weighting. Lecture notes in computer science: In Proceedings of the ECML\/PKDD workshop on privacy and security issues in data mining and machine learning (PSDML). Berlin: Springer."},{"key":"5396_CR7","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1145\/1401890.1401920","volume-title":"Proceedings of the 14th ACM SIGKDD international conference on knowledge discovery and data mining","author":"C. Elkan","year":"2008","unstructured":"Elkan, C., & Noto, K. (2008). Learning classifiers from only positive and unlabeled data. In Proceedings of the 14th ACM SIGKDD international conference on knowledge discovery and data mining, Las Vegas, Nevada (pp. 213\u2013220)."},{"key":"5396_CR8","unstructured":"Frank, A., & Asuncion, A. (2010). UCI machine learning repository. http:\/\/archive.ics.uci.edu\/ml ."},{"key":"5396_CR9","unstructured":"Hahsler, M., Gr\u00fcn, B., & Hornik, K. (2011). arules: Mining Association Rules and Frequent Itemsets. http:\/\/CRAN.R-project.org\/ , R package version 1.0-7."},{"key":"5396_CR10","first-page":"61","volume-title":"FOCS","author":"M. Hardt","year":"2010","unstructured":"Hardt, M., & Rothblum, G. N. (2010). A multiplicative weights mechanism for privacy-preserving data analysis. In FOCS (pp. 61\u201370)."},{"key":"5396_CR11","first-page":"2348","volume-title":"NIPS","author":"M. Hardt","year":"2012","unstructured":"Hardt, M., Ligett, K., & McSherry, F. (2012). A simple and practical algorithm for differentially private data release. In NIPS (pp. 2348\u20132356). http:\/\/books.nips.cc\/papers\/files\/nips25\/NIPS2012_1143.pdf ."},{"issue":"1","key":"5396_CR12","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1093\/biomet\/57.1.97","volume":"57","author":"W. K. Hastings","year":"1970","unstructured":"Hastings, W. K. (1970). Monte Carlo sampling methods using Markov chains and their applications. Biometrika, 57(1), 97\u2013109.","journal-title":"Biometrika"},{"issue":"1","key":"5396_CR13","doi-asserted-by":"crossref","first-page":"1021","DOI":"10.14778\/1920841.1920970","volume":"3","author":"M. Hay","year":"2010","unstructured":"Hay, M., Rastogi, V., Miklau, G., & Suciu, D. (2010). Boosting the accuracy of differentially private histograms through consistency. Proceedings of the VLDB Endowment, 3(1), 1021\u20131032.","journal-title":"Proceedings of the VLDB Endowment"},{"key":"5396_CR14","first-page":"1391","volume":"10","author":"T. Kanamori","year":"2009","unstructured":"Kanamori, T., Hido, S., & Sugiyama, M. (2009). A least-squares approach to direct importance estimation. Journal of Machine Learning Research, 10, 1391\u20131445.","journal-title":"Journal of Machine Learning Research"},{"key":"5396_CR15","first-page":"123","volume-title":"PODS","author":"C. Li","year":"2010","unstructured":"Li, C., Hay, M., Rastogi, V., Miklau, G., & McGregor, A. (2010). Optimizing linear counting queries under differential privacy. In PODS (pp.\u00a0123\u2013134)."},{"key":"5396_CR16","first-page":"177","volume-title":"Proceedings of the 10th annual ACM workshop on privacy in the electronic society","author":"Y. D. Li","year":"2011","unstructured":"Li, Y. D., Zhang, Z., Winslett, M., & Yang, Y. (2011). Compressive mechanism: utilizing sparse representation in differential privacy. In Proceedings of the 10th annual ACM workshop on privacy in the electronic society (pp. 177\u2013182). New York: ACM."},{"key":"5396_CR17","first-page":"123","volume-title":"SIGCOMM","author":"F. McSherry","year":"2010","unstructured":"McSherry, F., & Mahajan, R. (2010). Differentially-private network trace analysis. In SIGCOMM (pp.\u00a0123\u2013134)."},{"key":"5396_CR18","doi-asserted-by":"crossref","first-page":"627","DOI":"10.1145\/1557019.1557090","volume-title":"KDD","author":"F. McSherry","year":"2009","unstructured":"McSherry, F., & Mironov, I. (2009). Differentially private recommender systems: building privacy into the netflix prize contenders. In KDD (pp.\u00a0627\u2013636)."},{"key":"5396_CR19","volume-title":"Proceedings of the international conference on machine learning (ICML)","author":"A. Menon","year":"2012","unstructured":"Menon, A., Jiang, X., Vembu, S., Elkan, C., & Ohno-Machado, L. (2012). Predicting accurate probabilities with a ranking loss. In Proceedings of the international conference on machine learning (ICML)."},{"key":"5396_CR20","first-page":"493","volume-title":"KDD","author":"N. Mohammed","year":"2011","unstructured":"Mohammed, N., Chen, R., Fung, B. C. M., & Yu, P. S. (2011). Differentially private data release for data mining. In C. Apte, J. Ghosh, & P. Smyth (Eds.), KDD (pp. 493\u2013501). New York: ACM."},{"key":"5396_CR21","first-page":"735","volume-title":"SIGMOD conference","author":"V. Rastogi","year":"2010","unstructured":"Rastogi, V., & Nath, S. (2010). Differentially private aggregation of distributed time-series with transformation and encryption. In SIGMOD conference (pp. 735\u2013746)."},{"key":"5396_CR22","doi-asserted-by":"crossref","DOI":"10.1002\/9780470316849","volume-title":"Multivariate density estimation: theory, practice, and visualization","author":"D. W. Scott","year":"1992","unstructured":"Scott, D. W. (1992). Multivariate density estimation: theory, practice, and visualization. New York: Wiley-Interscience."},{"key":"5396_CR23","unstructured":"Smith, A. (2008, preprint). Efficient, differentially private point estimators. arXiv:0809.4794 ."},{"key":"5396_CR24","first-page":"286","volume-title":"Proceedings of the ACM SIGKDD international conference on knowledge discovery and data mining (KDD)","author":"A. Smith","year":"2004","unstructured":"Smith, A., & Elkan, C. (2004). A Bayesian network framework for reject inference. In Proceedings of the ACM SIGKDD international conference on knowledge discovery and data mining (KDD) (pp. 286\u2013295)."},{"key":"5396_CR25","first-page":"150","volume-title":"Secure data management, Springer, lecture notes in computer science","author":"Y. Xiao","year":"2010","unstructured":"Xiao, Y., Xiong, L., & Yuan, C. (2010). Differentially private data release through multidimensional partitioning. In W. Jonker & M. Petkovic (Eds.), Secure data management, Springer, lecture notes in computer science (Vol.\u00a06358, pp. 150\u2013168)."},{"key":"5396_CR26","first-page":"609","volume-title":"Proceedings of the 18th international conference on machine learning","author":"B. Zadrozny","year":"2001","unstructured":"Zadrozny, B., & Elkan, C. (2001). Obtaining calibrated probability estimates from decision trees and naive Bayesian classifiers. In Proceedings of the 18th international conference on machine learning (pp. 609\u2013616). San Mateo: Morgan Kaufmann."}],"container-title":["Machine Learning"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10994-013-5396-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10994-013-5396-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10994-013-5396-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T01:40:36Z","timestamp":1559353236000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10994-013-5396-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6,28]]},"references-count":26,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2013,10]]}},"alternative-id":["5396"],"URL":"https:\/\/doi.org\/10.1007\/s10994-013-5396-x","relation":{},"ISSN":["0885-6125","1573-0565"],"issn-type":[{"value":"0885-6125","type":"print"},{"value":"1573-0565","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,6,28]]}}}