{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,30]],"date-time":"2025-01-30T06:13:12Z","timestamp":1738217592662,"version":"3.34.0"},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,11,22]],"date-time":"2024-11-22T00:00:00Z","timestamp":1732233600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,11,22]],"date-time":"2024-11-22T00:00:00Z","timestamp":1732233600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,11,22]]},"DOI":"10.1109\/iscmi63661.2024.10851519","type":"proceedings-article","created":{"date-parts":[[2025,1,28]],"date-time":"2025-01-28T18:34:35Z","timestamp":1738089275000},"page":"257-266","source":"Crossref","is-referenced-by-count":0,"title":["ML-Driven Audit Risk Assessment with Differential Privacy"],"prefix":"10.1109","author":[{"given":"Zikun","family":"Zhang","sequence":"first","affiliation":[{"name":"Nanchang Hangkong University,School of Information Engineering,Nanchang,P.R China"}]},{"given":"Ghulam","family":"Mohi-Ud-Din","sequence":"additional","affiliation":[{"name":"Nanchang University,School of Software,Nanchang,P.R China"}]},{"given":"Yang","family":"Xiong","sequence":"additional","affiliation":[{"name":"Nanchang Hangkong University,School of Information Engineering,Nanchang,P.R China"}]},{"given":"Xu","family":"Zhang","sequence":"additional","affiliation":[{"name":"Jiangxi Normal University,College of Computer and Information Engineering,Nanchang,P.R China"}]},{"given":"Xia Ling","family":"Lin","sequence":"additional","affiliation":[{"name":"Nanchang University,School of Software,Nanchang,P.R China"}]},{"given":"Chen","family":"Ai","sequence":"additional","affiliation":[{"name":"Nanchang University,School of Software,Nanchang,P.R China"}]},{"given":"Hu","family":"Min","sequence":"additional","affiliation":[{"name":"Jiangxi University of Traditional Chinese Medicine,Network and Information Technology Center,Nanchang,P.R China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1057\/s41310-019-00067-9"},{"key":"ref2","article-title":"Machine Learning in Auditing","author":"Gabe Dickey","year":"2019","journal-title":"The CPA Journal"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.120144"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.123126"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2021.107487"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.dajour.2023.100163"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1080\/08839514.2019.1680182"},{"key":"ref8","first-page":"4165","article-title":"A general framework for auditing differentially private machine learning","volume":"35","author":"Lu","year":"2022","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.3233\/JIFS-181401"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/Confluence47617.2020.9057851"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1080\/08839514.2018.1451032"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s43674-023-00052-4"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CEC45853.2021.9504729"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.4108\/eai.2-5-2019.2284605"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0241286"},{"volume-title":"Auditing Differentially Private Machine Learning: How Private is Private SGD?","year":"2020","author":"Jagielski","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560675"},{"volume-title":"Audit data","year":"2023","author":"M","key":"ref19"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2012.09.050"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s11390-020-0193-z"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/168304.168305"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.46632\/dmfar\/1\/1\/3"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/S1672-6529(11)60020-6"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(96)00142-2"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-3157-6_2"},{"volume-title":"Classifying fraudulent firms using random forest","year":"2019","author":"Siddhartha","key":"ref27"}],"event":{"name":"2024 11th International Conference on Soft Computing &amp; Machine Intelligence (ISCMI)","start":{"date-parts":[[2024,11,22]]},"location":"Melbourne, Australia","end":{"date-parts":[[2024,11,23]]}},"container-title":["2024 11th International Conference on Soft Computing &amp;amp; Machine Intelligence (ISCMI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10851463\/10851482\/10851519.pdf?arnumber=10851519","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,29]],"date-time":"2025-01-29T18:44:53Z","timestamp":1738176293000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10851519\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,22]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/iscmi63661.2024.10851519","relation":{},"subject":[],"published":{"date-parts":[[2024,11,22]]}}}