{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,6]],"date-time":"2026-02-06T01:35:16Z","timestamp":1770341716915,"version":"3.49.0"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T00:00:00Z","timestamp":1769904000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Syst Sci Complex"],"published-print":{"date-parts":[[2026,2]]},"DOI":"10.1007\/s11424-026-5104-0","type":"journal-article","created":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T12:45:08Z","timestamp":1770295508000},"page":"180-202","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Personalized Differential Privacy for Support Vector Machines"],"prefix":"10.1007","volume":"39","author":[{"given":"Xiaofeng","family":"Wang","sequence":"first","affiliation":[]},{"given":"Xingwei","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Wangli","family":"Xu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,2,5]]},"reference":[{"key":"5104_CR1","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1109\/SP.2017.41","volume-title":"2017 IEEE Symposium on Security and Privacy (SP)","author":"R Shokri","year":"2017","unstructured":"Shokri R, Stronati M, Song C, et al., Membership inference attacks against machine learning models, 2017 IEEE Symposium on Security and Privacy (SP), 2017, 3\u201318."},{"key":"5104_CR2","first-page":"14774","volume-title":"Proceedings of the 33rd International Conference on Neural Information Processing Systems","author":"L Zhu","year":"2019","unstructured":"Zhu L, Liu Z, and Han S, Deep leakage from gradients, Proceedings of the 33rd International Conference on Neural Information Processing Systems, 2019, 14774\u201314784."},{"issue":"5","key":"5104_CR3","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1142\/S021848850200165X","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney L, Achieving k-anonymity privacy protection using generalization and suppression, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2002, 10(5): 571\u2013588.","journal-title":"International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems"},{"key":"5104_CR4","first-page":"1","volume-title":"22nd International Conference on Data Engineering (ICDE\u2019 06)","author":"A Machanavajjhala","year":"2006","unstructured":"Machanavajjhala A, Gehrke J, Kifer D, et al., l-Diversity: Privacy beyond k-anonymity, 22nd International Conference on Data Engineering (ICDE\u2019 06), 2006, 1\u201336."},{"key":"5104_CR5","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1109\/ICDE.2007.367856","volume-title":"2007 IEEE 23rd International Conference on Data Engineering","author":"N Li","year":"2007","unstructured":"Li N, Li T, and Venkatasubramanian S, t-Closeness: Privacy beyond k-anonymity and l-diversity, 2007 IEEE 23rd International Conference on Data Engineering, 2007, 106\u2013115."},{"key":"5104_CR6","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/11681878_14","volume-title":"Proceedings of the Third Conference on Theory of Cryptography","author":"C Dwork","year":"2006","unstructured":"Dwork C, McSherry F, Nissim K, et al., Calibrating noise to sensitivity in private data analysis, Proceedings of the Third Conference on Theory of Cryptography, 2006, 265\u2013284."},{"issue":"489","key":"5104_CR7","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1198\/jasa.2009.tm08651","volume":"105","author":"L Wasserman","year":"2010","unstructured":"Wasserman L and Zhou S, A statistical framework for differential privacy, Journal of the American Statistical Association, 2010, 105(489): 375\u2013389.","journal-title":"Journal of the American Statistical Association"},{"key":"5104_CR8","first-page":"1715","volume-title":"Proceedings of the 29th International Conference on Machine Learning","author":"K Chaudhuri","year":"2012","unstructured":"Chaudhuri K and Hsu D, Convergence rates for differentially private statistical estimation, Proceedings of the 29th International Conference on Machine Learning, 2012, 1715\u20131722."},{"issue":"521","key":"5104_CR9","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1080\/01621459.2017.1389735","volume":"113","author":"J C Duchi","year":"2018","unstructured":"Duchi J C, Jordan M I, and Wainwright M J, Minimax optimal procedures for locally private estimation, Journal of the American Statistical Association, 2018, 113(521): 182\u2013201.","journal-title":"Journal of the American Statistical Association"},{"issue":"5","key":"5104_CR10","doi-asserted-by":"publisher","first-page":"2646","DOI":"10.1214\/19-AOS1901","volume":"48","author":"A Rohde","year":"2020","unstructured":"Rohde A and Steinberger L, Geometrizing rates of convergence under local differential privacy constraints, The Annals of Statistics, 2020, 48(5): 2646\u20132670.","journal-title":"The Annals of Statistics"},{"issue":"534","key":"5104_CR11","doi-asserted-by":"publisher","first-page":"935","DOI":"10.1080\/01621459.2020.1773831","volume":"116","author":"J Awan","year":"2021","unstructured":"Awan J and Slavkovi\u0107 A, Structure and sensitivity in differential privacy: Comparing K-norm mechanisms, Journal of the American Statistical Association, 2021, 116(534): 935\u2013954.","journal-title":"Journal of the American Statistical Association"},{"issue":"3\u20134","key":"5104_CR12","first-page":"1","volume":"9","author":"C Dwork","year":"2013","unstructured":"Dwork C and Roth A, The algorithmic foundations of differential privacy, Foundations and Trends in Theoretical Computer Science, 2013, 9(3\u20134): 1\u2013277.","journal-title":"Foundations and Trends in Theoretical Computer Science"},{"key":"5104_CR13","first-page":"1069","volume":"12","author":"K Chaudhuri","year":"2011","unstructured":"Chaudhuri K, Monteleoni C, and Sarwate A D, Differentially private empirical risk minimization, Journal of Machine Learning Research, 2011, 12: 1069\u20131109.","journal-title":"Journal of Machine Learning Research"},{"issue":"3","key":"5104_CR14","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1023\/A:1022627411411","volume":"20","author":"C Cortes","year":"1995","unstructured":"Cortes C and Vapnik V, Support-vector networks, Machine Learning, 1995, 20(3): 273\u2013297.","journal-title":"Machine Learning"},{"issue":"1","key":"5104_CR15","doi-asserted-by":"publisher","first-page":"65","DOI":"10.29012\/jpc.v4i1.612","volume":"4","author":"B I P Rubinstein","year":"2012","unstructured":"Rubinstein B I P, Bartlett P L, Huang L, et al., Learning in a large function space: Privacy-preserving mechanisms for SVM learning, Journal of Privacy and Confidentiality, 2012, 4(1): 65\u2013100.","journal-title":"Journal of Privacy and Confidentiality"},{"key":"5104_CR16","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1007\/978-981-99-9785-5_11","volume-title":"Artificial Intelligence Security and Privacy","author":"T Wang","year":"2024","unstructured":"Wang T, Liu S, Liang J, et al., Strict differentially private support vector machines with dimensionality reduction, Eds. by Vaidya J, Gabbouj M, and Li J, Artificial Intelligence Security and Privacy, Springer, Singapore, 2024, 142\u2013155."},{"key":"5104_CR17","first-page":"1","volume":"2022","author":"Y Huang","year":"2022","unstructured":"Huang Y, Yang G, Bai Y, et al., Differential privacy protection for support vector machines for nonlinear classification, Security and Communication Networks, 2022, 2022: 1\u201314.","journal-title":"Security and Communication Networks"},{"key":"5104_CR18","doi-asserted-by":"publisher","first-page":"1023","DOI":"10.1109\/ICDE.2015.7113353","volume-title":"2015 IEEE 31st International Conference on Data Engineering","author":"Z Jorgensen","year":"2015","unstructured":"Jorgensen Z, Yu T, and Cormode G, Conservative or liberal? Personalized differential privacy, 2015 IEEE 31st International Conference on Data Engineering, 2015, 1023\u20131034."},{"key":"5104_CR19","first-page":"1","volume-title":"IEEE INFOCOM 2021 - IEEE Conference on Computer Communications","author":"B Niu","year":"2021","unstructured":"Niu B, Chen Y, Wang B, et al., AdaPDP: Adaptive personalized differential privacy, IEEE INFOCOM 2021 - IEEE Conference on Computer Communications, 2021, 1\u201310."},{"key":"5104_CR20","first-page":"19073","volume-title":"Proceedings of the 37th International Conference on Neural Information Processing Systems","author":"F Boenisch","year":"2023","unstructured":"Boenisch F, M\u00fchl C, Dziedzic A, et al., Have it your way: Individualized privacy assignment for DP-SGD, Proceedings of the 37th International Conference on Neural Information Processing Systems, 2023, 19073\u201319103."},{"issue":"2","key":"5104_CR21","doi-asserted-by":"publisher","first-page":"272","DOI":"10.1007\/s11390-019-1910-3","volume":"34","author":"L Cui","year":"2019","unstructured":"Cui L, Qu Y, Nosouhi M R, et al., Improving data utility through game theory in personalized differential privacy, Journal of Computer Science and Technology, 2019, 34(2): 272\u2013286.","journal-title":"Journal of Computer Science and Technology"},{"key":"5104_CR22","first-page":"1","volume-title":"Naval Research Logistics (NRL)","author":"K Acharya","year":"2025","unstructured":"Acharya K, Boenisch F, Naidu R, et al., Personalized differential privacy for ridge regression under output perturbation, Naval Research Logistics (NRL), 2025, 1\u201313."},{"key":"5104_CR23","first-page":"5359","volume-title":"IEEE Transactions on Information Forensics and Security","author":"G Muthukrishnan","year":"2023","unstructured":"Muthukrishnan G and Kalyani S, Grafting Laplace and Gaussian distributions: A new noise mechanism for differential privacy, IEEE Transactions on Information Forensics and Security, 2023, 5359\u20135374."},{"key":"5104_CR24","unstructured":"Liu X, Chen Y, and Xu W, Differentially private joint independence test, 2025, arxiv: 2503.18721."},{"key":"5104_CR25","unstructured":"Kim I and Schrab A, Differentially private permutation tests: Applications to Kernel methods, 2024, arxiv: 2310.19043."},{"key":"5104_CR26","first-page":"3218","volume-title":"Proceedings of the 31st International Conference on Neural Information Processing Systems","author":"A Rudi","year":"2017","unstructured":"Rudi A and Rosasco L, Generalization properties of learning with random features, Proceedings of the 31st International Conference on Neural Information Processing Systems, 2017, 3218\u20133228."},{"issue":"3","key":"5104_CR27","doi-asserted-by":"publisher","first-page":"466","DOI":"10.1007\/s11424-011-8102-8","volume":"24","author":"K Zhao","year":"2011","unstructured":"Zhao K, Zhang M, and Deng N, New robust unsupervised support vector machines, Journal of Systems Science & Complexity, 2011, 24(3): 466\u2013476.","journal-title":"Journal of Systems Science & Complexity"},{"key":"5104_CR28","first-page":"1177","volume-title":"Proceedings of the 21st International Conference on Neural Information Processing Systems","author":"A Rahimi","year":"2007","unstructured":"Rahimi A and Recht B, Random features for large-scale Kernel machines, Proceedings of the 21st International Conference on Neural Information Processing Systems, 2007, 1177\u20131184."}],"container-title":["Journal of Systems Science and Complexity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11424-026-5104-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11424-026-5104-0","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11424-026-5104-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T12:45:14Z","timestamp":1770295514000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11424-026-5104-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2]]},"references-count":28,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,2]]}},"alternative-id":["5104"],"URL":"https:\/\/doi.org\/10.1007\/s11424-026-5104-0","relation":{},"ISSN":["1009-6124","1559-7067"],"issn-type":[{"value":"1009-6124","type":"print"},{"value":"1559-7067","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2]]},"assertion":[{"value":"28 March 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 May 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 February 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare no conflict of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}}]}}