{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,18]],"date-time":"2025-01-18T05:08:44Z","timestamp":1737176924026,"version":"3.33.0"},"reference-count":33,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,12,15]],"date-time":"2024-12-15T00:00:00Z","timestamp":1734220800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,12,15]],"date-time":"2024-12-15T00:00:00Z","timestamp":1734220800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,12,15]]},"DOI":"10.1109\/bigdata62323.2024.10825354","type":"proceedings-article","created":{"date-parts":[[2025,1,16]],"date-time":"2025-01-16T18:31:23Z","timestamp":1737052283000},"page":"1526-1535","source":"Crossref","is-referenced-by-count":0,"title":["Calibrating Practical Privacy Risks for Differentially Private Machine Learning"],"prefix":"10.1109","author":[{"given":"Yuechun","family":"Gu","sequence":"first","affiliation":[{"name":"University of Maryland, Baltimore County,Trustworthy and Intelligent Computing Lab, Computer Science and Electrical Engineering, Cybersecurity Institute,Baltimore,USA"}]},{"given":"Keke","family":"Chen","sequence":"additional","affiliation":[{"name":"University of Maryland, Baltimore County,Trustworthy and Intelligent Computing Lab, Computer Science and Electrical Engineering, Cybersecurity Institute,Baltimore,USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3544903.3544905"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813677"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00033"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.41"},{"key":"ref5","first-page":"1964","article-title":"Label-only membership inference attacks","volume-title":"International conference on machine learning","author":"Choquette-Choo"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243834"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.5220\/0010555607150721"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i12.26663"},{"article-title":"Adaptive domain inference attack","year":"2023","author":"G","key":"ref9"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MCI.2020.2976185"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79228-4_1"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2015.7113353"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3151670"},{"year":"2017","key":"ref15","article-title":"Learning with privacy at scale"},{"article-title":"Google covid-19 community mobility reports: Anonymization process description (version 1.1)","year":"2020","author":"A","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833649"},{"key":"ref18","first-page":"13263","article-title":"The privacy onion effect: Memorization is relative","volume":"35","author":"Carlini","year":"2022","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179281"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1749603.1749605"},{"key":"ref21","first-page":"4765","article-title":"A unified approach to interpreting model predictions","volume-title":"Advances in Neural Information Processing Systems 30","author":"Lundberg","year":"2017"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939778"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2023.3255923"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/11787006_1"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICACSIS.2017.8355063"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1561\/9781601988195"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2936825"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV51070.2023.01612"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3523273"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2023.103827"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1080\/02699930903485076"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3900990"},{"key":"ref33","article-title":"Taiwanese facial expression image database","volume-title":"Tech. Rep","author":"Chen","year":"2007"}],"event":{"name":"2024 IEEE International Conference on Big Data (BigData)","start":{"date-parts":[[2024,12,15]]},"location":"Washington, DC, USA","end":{"date-parts":[[2024,12,18]]}},"container-title":["2024 IEEE International Conference on Big Data (BigData)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10824975\/10824942\/10825354.pdf?arnumber=10825354","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,17]],"date-time":"2025-01-17T08:25:43Z","timestamp":1737102343000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10825354\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,15]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/bigdata62323.2024.10825354","relation":{},"subject":[],"published":{"date-parts":[[2024,12,15]]}}}