{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T04:37:11Z","timestamp":1773376631015,"version":"3.50.1"},"reference-count":48,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,6,25]],"date-time":"2023-06-25T00:00:00Z","timestamp":1687651200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,6,25]],"date-time":"2023-06-25T00:00:00Z","timestamp":1687651200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,6,25]]},"DOI":"10.1109\/isit54713.2023.10206746","type":"proceedings-article","created":{"date-parts":[[2023,8,22]],"date-time":"2023-08-22T13:31:15Z","timestamp":1692711075000},"page":"1639-1644","source":"Crossref","is-referenced-by-count":3,"title":["Mean Estimation Under Heterogeneous Privacy: Some Privacy Can Be Free"],"prefix":"10.1109","author":[{"given":"Syomantak","family":"Chaudhuri","sequence":"first","affiliation":[{"name":"University of California,Berkeley"}]},{"given":"Thomas A.","family":"Courtade","sequence":"additional","affiliation":[{"name":"University of California,Berkeley"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/356546.356548"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335438"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-018-0141-8"},{"key":"ref4","first-page":"1","article-title":"Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 april 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing directive 95\/46\/ec (General Data Protection Regulation)","year":"2016"},{"key":"ref5","volume-title":"California Consumer Privacy Act (CCPA)","year":"2018"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/11761679_29"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_14"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2017.11"},{"key":"ref9","article-title":"Concentrated differential privacy","author":"Dwork","year":"2016"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53641-4_24"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.3390\/s20247030"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1214\/21-AOS2058"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE48307.2020.00049"},{"key":"ref14","article-title":"Privately learning high-dimensional distributions","volume-title":"Conference on Learning Theory","author":"Kamath"},{"key":"ref15","article-title":"Privacy and statistical risk: Formalisms and minimax bounds","author":"Barber","year":"2014"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3519935.3519947"},{"key":"ref17","article-title":"A primer on private statistics","author":"Kamath","year":"2020"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1137\/090756090"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.2017.1389735"},{"key":"ref20","article-title":"Private query release assisted by public data","volume-title":"International Conference on Machine Learning","author":"Bassily"},{"key":"ref21","article-title":"Learning from mixtures of private and public populations","author":"Bassily","year":"2020","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref22","article-title":"Leveraging public data for practical private query release","volume-title":"International Conference on Machine Learning","author":"Liu"},{"key":"ref23","article-title":"Limits of private learning with access to public data","author":"Alon","year":"2019","journal-title":"Advances in neural information processing systems"},{"key":"ref24","article-title":"Privately answering classification queries in the agnostic pac model","volume-title":"Algorithmic Learning Theory","author":"Nandi","year":"2020"},{"key":"ref25","article-title":"(Nearly) dimension independent private erm with adagrad rates via publicly estimated subspaces","volume-title":"Conference on Learning Theory","author":"Kairouz"},{"key":"ref26","article-title":"Public data-assisted mirror descent for private model training","volume-title":"International Conference on Machine Learning","author":"Amid"},{"key":"ref27","article-title":"Estimating smooth glm in non-interactive local differential privacy model with public unlabeled data","volume-title":"Algorithmic Learning Theory","author":"Wang","year":"2021"},{"key":"ref28","article-title":"Private estimation with public data","author":"Bie","year":"2022","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.14778\/3503585.3503592"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.29012\/jpc.v7i2.652"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-57454-7_48"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2015.7113353"},{"key":"ref33","article-title":"Combining public and private data","volume-title":"NeurIPS 2021 Workshop Privacy in Machine Learning","author":"Ferrando"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC45663.2020.9120532"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2007.66"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-55753-3_34"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2019.07.035"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2016.7498248"},{"key":"ref39","first-page":"29 139","article-title":"Mean estimation with user-level privacy under data heterogeneity","volume":"35","author":"Cummings","year":"2022","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT50566.2022.9834711"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39077-7_5"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.29012\/jpc.680"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0062"},{"key":"ref44","article-title":"The Power of Synergy in Differential Privacy: Combining a Small Curator with Local Randomizers","volume-title":"1st Conference on Information-Theoretic Cryptography (ITC 2020)","author":"Beimel"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/3490486.3538329"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT54713.2023.10206746"},{"key":"ref47","article-title":"Local privacy and minimax bounds: Sharp rates for probability estimation","author":"Duchi","year":"2013","journal-title":"Adv. Neural Inform. Process. Syst"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1561\/0400000042"}],"event":{"name":"2023 IEEE International Symposium on Information Theory (ISIT)","location":"Taipei, Taiwan","start":{"date-parts":[[2023,6,25]]},"end":{"date-parts":[[2023,6,30]]}},"container-title":["2023 IEEE International Symposium on Information Theory (ISIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206429\/10206441\/10206746.pdf?arnumber=10206746","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T20:27:08Z","timestamp":1773347228000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10206746\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,25]]},"references-count":48,"URL":"https:\/\/doi.org\/10.1109\/isit54713.2023.10206746","relation":{},"subject":[],"published":{"date-parts":[[2023,6,25]]}}}