{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T17:13:34Z","timestamp":1775150014907,"version":"3.50.1"},"reference-count":32,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1109\/allerton.2018.8636068","type":"proceedings-article","created":{"date-parts":[[2019,2,28]],"date-time":"2019-02-28T22:04:31Z","timestamp":1551391471000},"page":"249-258","source":"Crossref","is-referenced-by-count":10,"title":["Property Testing For Differential Privacy"],"prefix":"10.1109","author":[{"given":"ANNA C.","family":"GILBERT","sequence":"first","affiliation":[]},{"given":"AUDRA","family":"MCMILLAN","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1137\/080734066"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2014.14"},{"key":"ref30","author":"vadhan","year":"2016","journal-title":"The complexity of differential privacy"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611973402.88"},{"key":"ref11","first-page":"2747","author":"daskalakis","year":"2018","journal-title":"Which Distribution Distances are Sublinearly Testable?"},{"key":"ref12","article-title":"Collecting telemetry data privately","volume":"30","author":"ding","year":"2017","journal-title":"Advances in neural information processing systems"},{"key":"ref13","article-title":"Toward detecting violations of differential privacy","author":"ding","year":"2018","journal-title":"arXiv 1805 10277v1"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36594-2_24"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79228-4_1"},{"key":"ref16","article-title":"Differential privacy - a primer for the perplexed","author":"dwork","year":"2011","journal-title":"Conf of European Statisticians Joint UNECE\/Eurostat work session on statistical data confidentiality"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1561\/0400000042"},{"key":"ref18","article-title":"Concentrated differential privacy","author":"dwork","year":"2016","journal-title":"arXiv 1603 01887v2"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660348"},{"key":"ref28","author":"thakurta","year":"2017","journal-title":"Learning new words"},{"key":"ref4","year":"2017","journal-title":"Learning With Privacy at Scale"},{"key":"ref27","first-page":"20","article-title":"Airavat: Security and privacy for mapreduce","author":"roy","year":"2010","journal-title":"Proceedings of the 7th USENIX Conference on Networked Systems Design and Implementation"},{"key":"ref3","year":"2017","journal-title":"What&#x2019;s new in ios ios 10 0 Apple Developer Guide"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2014.36"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2011.09.015"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2013.26"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2432622.2432626"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2103621.2103670"},{"key":"ref2","first-page":"3591","article-title":"Optimal testing for properties of distributions","volume":"28","author":"acharya","year":"2015","journal-title":"Advances in neural information processing systems"},{"key":"ref9","first-page":"1844","article-title":"Near-optimal density estimation in near-linear time using variablewidth histograms","author":"chan","year":"2014","journal-title":"Proceedings of the 27th International Conference on Neural Information Processing Systems - Volume 1 NIPS&#x2019;14"},{"key":"ref1","author":"abowd","year":"2017","journal-title":"Revisiting the economics of privacy population statistics and confidentiality protection as public goods"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1145\/2480359.2429113","article-title":"Linear dependent types for differential privacy","volume":"48","author":"gaboardi","year":"2013","journal-title":"SIGPLAN Not"},{"key":"ref22","article-title":"Differential privacy and machine learning: a survey and review","author":"ji","year":"2014","journal-title":"arXiv 1412 7584 [cs]"},{"key":"ref21","article-title":"Property testing for differential privacy","author":"gilbert","year":"2018","journal-title":"arXiv 1806 06427"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1109\/CSF.2017.11","article-title":"R&#x00E9;nyi differential privacy","author":"mironov","year":"2017","journal-title":"Computer security foundations symposium (csf) 2017 ieee 30th"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1559845.1559850"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1863543.1863568"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.928987"}],"event":{"name":"2018 56th Annual Allerton Conference on Communication, Control, and Computing (Allerton)","location":"Monticello, IL, USA","start":{"date-parts":[[2018,10,2]]},"end":{"date-parts":[[2018,10,5]]}},"container-title":["2018 56th Annual Allerton Conference on Communication, Control, and Computing (Allerton)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8630872\/8635635\/08636068.pdf?arnumber=8636068","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,23]],"date-time":"2020-08-23T20:10:27Z","timestamp":1598213427000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8636068\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/allerton.2018.8636068","relation":{},"subject":[],"published":{"date-parts":[[2018,10]]}}}