{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T18:59:12Z","timestamp":1770490752255,"version":"3.49.0"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2021,6,10]],"date-time":"2021-06-10T00:00:00Z","timestamp":1623283200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,6,10]],"date-time":"2021-06-10T00:00:00Z","timestamp":1623283200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001782","name":"The University of Melbourne","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100001782","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Optim Lett"],"published-print":{"date-parts":[[2022,5]]},"DOI":"10.1007\/s11590-021-01765-6","type":"journal-article","created":{"date-parts":[[2021,6,10]],"date-time":"2021-06-10T04:02:39Z","timestamp":1623297759000},"page":"1167-1179","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Distributionally-robust machine learning using locally differentially-private data"],"prefix":"10.1007","volume":"16","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5102-7073","authenticated-orcid":false,"given":"Farhad","family":"Farokhi","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,6,10]]},"reference":[{"key":"1765_CR1","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/11681878_14","volume-title":"Theory of Cryptography","author":"C Dwork","year":"2006","unstructured":"Dwork, C., Mcsherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. In: Halevi, S., Rabin, T. (eds.) Theory of Cryptography, pp. 265\u2013284. Springer, Berlin (2006)"},{"issue":"3\u20134","key":"1765_CR2","first-page":"211","volume":"9","author":"C Dwork","year":"2014","unstructured":"Dwork, C., Roth, A.: The algorithmic foundations of differential privacy. Found. Trends Theor. Comput. Sci. 9(3\u20134), 211\u2013407 (2014)","journal-title":"Found. Trends Theor. Comput. Sci."},{"issue":"1","key":"1765_CR3","first-page":"492","volume":"17","author":"P Kairouz","year":"2016","unstructured":"Kairouz, P., Oh, S., Viswanath, P.: Extremal mechanisms for local differential privacy. J. Mach. Learn. Res. 17(1), 492\u2013542 (2016)","journal-title":"J. Mach. Learn. Res."},{"issue":"12","key":"1765_CR4","doi-asserted-by":"publisher","first-page":"2360","DOI":"10.1109\/TMC.2012.208","volume":"12","author":"R Dewri","year":"2013","unstructured":"Dewri, R.: Local differential perturbations: Location privacy under approximate knowledge attackers. IEEE Trans. Mobile Comput. 12(12), 2360\u20132372 (2013)","journal-title":"IEEE Trans. Mobile Comput."},{"key":"1765_CR5","doi-asserted-by":"crossref","unstructured":"Duchi,J.\u00a0C., Jordan,M.\u00a0I., Wainwright,M.\u00a0J.: \u201cLocal privacy and statistical minimax rates,\u201d In: 2013 IEEE 54th Annual Symposium on Foundations of Computer Science, pp.\u00a0429\u2013438, (2013)","DOI":"10.1109\/FOCS.2013.53"},{"issue":"9","key":"1765_CR6","doi-asserted-by":"publisher","first-page":"2151","DOI":"10.1109\/TIFS.2018.2812146","volume":"13","author":"X Ren","year":"2018","unstructured":"Ren, X., Yu, C.-M., Yu, W., Yang, S., Yang, X., McCann, J.A., Philip, S.Y.: LoPub: High-dimensional crowdsourced data publication with local differential privacy. IEEE Trans. Inf. Forensics Secur. 13(9), 2151\u20132166 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"1765_CR7","doi-asserted-by":"crossref","unstructured":"Erlingsson,\u00da., Pihur,V., Korolova, A.:\u201cRAPPOR: Randomized aggregatable privacy-preserving ordinal response,\u201d In: Proceedings of the 2014 ACM SIGSAC conference on computer and communications security, pp.\u00a01054\u20131067, (2014)","DOI":"10.1145\/2660267.2660348"},{"key":"1765_CR8","unstructured":"Tang,J., Korolova,A., Bai,X., Wang,X., Wang,X.: \u201cPrivacy loss in Apple\u2019s implementation of differential privacy on MacOS 10.12,\u201d arXiv preprint arXiv:1709.02753 (2017)"},{"key":"1765_CR9","doi-asserted-by":"crossref","unstructured":"Smith,A., Thakurta,A., Upadhyay, J.:\u201cIs interaction necessary for distributed private learning?,\u201d In: 2017 IEEE Symposium on Security and Privacy (SP), pp.\u00a058\u201377, IEEE, (2017)","DOI":"10.1109\/SP.2017.35"},{"key":"1765_CR10","unstructured":"Wang, D., Gaboardi, M., Xu, J.: Empirical riskminimization in non-interactive local differential privacy revisited. In: Bengio, S., Wallach, H., Larochelle, H., Grauman, K., Cesa-Bianchi, N., Garnett, R. (eds.) Advances in Neural Information Processing Systems, pp. 965\u2013974. Neural Information Processing Systems Foundation (2018)"},{"key":"1765_CR11","unstructured":"Zheng,K., Mou,W., Wang,L.: \u201cCollect at once, use effectively: Making non-interactive locally private learning possible,\u201d In: Proceedings of the 34th International Conference on Machine Learning-Volume 70, pp.\u00a04130\u20134139, (2017)"},{"key":"1765_CR12","unstructured":"Wang, D., Smith, A., Xu, J.: Noninteractive locally private learning of linear models via polynomial approximations. In: Garivier, A., Kale, S. (eds.) Algorithmic Learning Theory. Proceedings of Machine Learning Research (PMLR), vol. 98, pp. 898\u2013903. Chicago, Illinois, 22\u201324 Mar 2019"},{"issue":"1\u20132","key":"1765_CR13","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/s10107-017-1172-1","volume":"171","author":"PM Esfahani","year":"2018","unstructured":"Esfahani, P.M., Kuhn, D.: Data-driven distributionally robust optimization using the Wasserstein metric: Performance guarantees and tractable reformulations. Math. Program. 171(1\u20132), 115\u2013166 (2018)","journal-title":"Math. Program."},{"key":"1765_CR14","unstructured":"Nguyen,V.\u00a0A., \u00a0Kuhn,D., Esfahani,P.\u00a0M.: \u201cDistributionally robust inverse covariance estimation: The wasserstein shrinkage estimator,\u201d arXiv preprint arXiv:1805.07194, (2018)"},{"key":"1765_CR15","doi-asserted-by":"publisher","DOI":"10.1515\/9781400831050","volume-title":"Robust Optimization","author":"A Ben-Tal","year":"2009","unstructured":"Ben-Tal, A., El. Ghaoui, L., Nemirovski, A.: Robust Optimization, vol. 28. Princeton University Press, New Jersey (2009)"},{"issue":"4","key":"1765_CR16","doi-asserted-by":"publisher","first-page":"603","DOI":"10.1137\/151005221","volume":"58","author":"K Postek","year":"2016","unstructured":"Postek, K., den Hertog, D., Melenberg, B.: Computationally tractable counterparts of distributionally robust constraints on risk measures. SIAM Rev. 58(4), 603\u2013650 (2016)","journal-title":"SIAM Rev."},{"issue":"3","key":"1765_CR17","doi-asserted-by":"publisher","first-page":"595","DOI":"10.1287\/opre.1090.0741","volume":"58","author":"E Delage","year":"2010","unstructured":"Delage, E., Ye, Y.: Distributionally robust optimization under moment uncertainty with application to data-driven problems. Oper. Res. 58(3), 595\u2013612 (2010)","journal-title":"Oper. Res."},{"key":"1765_CR18","unstructured":"Hu,Z., Hong,L.\u00a0J.: \u201cKullback-Leibler divergence constrained distributionally robust optimization,\u201d Available at Optimization Online, (2013)"},{"key":"1765_CR19","unstructured":"Sinha,A., Namkoong,H., Duchi,J.: \u201cCertifiable distributional robustness with principled adversarial training,\u201d In: Proceedings of the Machine Learning and Computer Security Workshop (co-located with Conference on Neural Information Processing Systems 2017), vol.\u00a02, (2017)"},{"key":"1765_CR20","doi-asserted-by":"crossref","unstructured":"Chen,R., Paschalidis,I.\u00a0C.: \u201cA distributionally robust optimization approach for outlier detection,\u201d In: 2018 IEEE Conference on Decision and Control (CDC), pp.\u00a0352\u2013357, IEEE, (2018)","DOI":"10.1109\/CDC.2018.8619435"},{"key":"1765_CR21","unstructured":"Lee,C., Mehrotra,S.: \u201cA distributionally-robust approach for finding support vector machines,\u201d Manuscript, available at http:\/\/www.optimization-online.org\/DB_HTML\/2015\/06\/4965.html, (2015)"},{"key":"1765_CR22","first-page":"1576","volume":"28","author":"S Shafieezadeh Abadeh","year":"2015","unstructured":"Shafieezadeh Abadeh, S., Mohajerin Esfahani, P.M., Kuhn, D.: Distributionally robust logistic regression. Adv. Neural Inf. Process. Syst. 28, 1576\u20131584 (2015)","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"1765_CR23","doi-asserted-by":"crossref","unstructured":"Kuhn,D., Esfahani,P.\u00a0M., Nguyen,V.\u00a0A., Shafieezadeh-Abadeh, S.:\u201cWasserstein distributionally robust optimization: Theory and applications in machine learning,\u201d In: Operations Research & Management Science in the Age of Analytics, pp.\u00a0130\u2013166, INFORMS, (2019)","DOI":"10.1287\/educ.2019.0198"},{"key":"1765_CR24","volume-title":"Neural Network Learning: Theoretical Foundations","author":"M Anthony","year":"2009","unstructured":"Anthony, M., Bartlett, P.L.: Neural Network Learning: Theoretical Foundations. Cambridge University Press, Cambridge (2009)"},{"issue":"6","key":"1765_CR25","doi-asserted-by":"publisher","first-page":"2507","DOI":"10.1214\/15-AOS1350","volume":"43","author":"C Brownlees","year":"2015","unstructured":"Brownlees, C., Joly, E., Lugosi, G., et al.: Empirical risk minimization for heavy-tailed losses. Ann. Stat. 43(6), 2507\u20132536 (2015)","journal-title":"Ann. Stat."},{"issue":"1","key":"1765_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/s41598-020-78323-0","volume":"10","author":"F Farokhi","year":"2020","unstructured":"Farokhi, F.: Deconvoluting kernel density estimation and regression for locally differentially private data. Sci. Rep. 10(1), 1\u201311 (2020)","journal-title":"Sci. Rep."},{"issue":"6","key":"1765_CR27","first-page":"1196","volume":"9","author":"PJ Bickel","year":"1981","unstructured":"Bickel, P.J., Freedman, D.A., et al.: Some asymptotic theory for the bootstrap. Ann. Stat. 9(6), 1196\u20131217 (1981)","journal-title":"Ann. Stat."},{"key":"1765_CR28","volume-title":"Elements of Information Theory","author":"TM Cover","year":"2012","unstructured":"Cover, T.M., Thomas, J.A.: Elements of Information Theory. Wiley, New York (2012)"},{"key":"1765_CR29","first-page":"52","volume":"13","author":"LV Kantorovich","year":"1958","unstructured":"Kantorovich, L.V., Rubinshtein, G.: On a space of totally additive functions. Vestn. Lening. Univ 13, 52\u201359 (1958)","journal-title":"Vestn. Lening. Univ"},{"key":"1765_CR30","doi-asserted-by":"crossref","unstructured":"Farokhi, F.: Why does regularization help with mitigating poisoning attacks? Neural Processing Letters (2021). https:\/\/doi.org\/10.1007\/s11063-021-10539-1","DOI":"10.1007\/s11063-021-10539-1"},{"issue":"2","key":"1765_CR31","first-page":"43","volume":"4","author":"R Hall","year":"2012","unstructured":"Hall, R., Rinaldo, A., Wasserman, L.: Random differential privacy. J. Privacy Confident. 4(2), 43\u201359 (2012)","journal-title":"J. Privacy Confident."},{"key":"1765_CR32","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1016\/j.jmva.2016.06.005","volume":"151","author":"T Rippl","year":"2016","unstructured":"Rippl, T., Munk, A., Sturm, A.: Limit laws of the empirical wasserstein distance: Gaussian distributions. J. Multi. Anal. 151, 90\u2013109 (2016)","journal-title":"J. Multi. Anal."},{"issue":"2","key":"1765_CR33","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1307\/mmj\/1029003026","volume":"31","author":"CR Givens","year":"1984","unstructured":"Givens, C.R., Shortt, R.M.: A class of wasserstein metrics for probability distributions. Michigan Math. J. 31(2), 231\u2013240 (1984)","journal-title":"Michigan Math. J."},{"issue":"1","key":"1765_CR34","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1137\/1038003","volume":"38","author":"L Vandenberghe","year":"1996","unstructured":"Vandenberghe, L., Boyd, S.: Semidefinite programming. SIAM Rev. 38(1), 49\u201395 (1996)","journal-title":"SIAM Rev."},{"key":"1765_CR35","volume-title":"The Schur complement and its applications","author":"F Zhang","year":"2006","unstructured":"Zhang, F.: The Schur complement and its applications, vol. 4. Springer, Berlin (2006)"}],"container-title":["Optimization Letters"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11590-021-01765-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11590-021-01765-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11590-021-01765-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,16]],"date-time":"2022-04-16T12:44:39Z","timestamp":1650113079000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11590-021-01765-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,10]]},"references-count":35,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2022,5]]}},"alternative-id":["1765"],"URL":"https:\/\/doi.org\/10.1007\/s11590-021-01765-6","relation":{},"ISSN":["1862-4472","1862-4480"],"issn-type":[{"value":"1862-4472","type":"print"},{"value":"1862-4480","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,6,10]]},"assertion":[{"value":"6 October 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 June 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 June 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}