{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T04:43:18Z","timestamp":1773376998110,"version":"3.50.1"},"reference-count":48,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,6,22]],"date-time":"2025-06-22T00:00:00Z","timestamp":1750550400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,6,22]],"date-time":"2025-06-22T00:00:00Z","timestamp":1750550400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100000646","name":"JSPS","doi-asserted-by":"publisher","award":["JP23K16886"],"award-info":[{"award-number":["JP23K16886"]}],"id":[{"id":"10.13039\/501100000646","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,6,22]]},"DOI":"10.1109\/isit63088.2025.11195284","type":"proceedings-article","created":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T17:48:08Z","timestamp":1760982488000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["Several Representations of $\\alpha$-Mutual Information and Interpretations as Privacy Leakage Measures"],"prefix":"10.1109","author":[{"given":"Akira","family":"Kamatsuka","sequence":"first","affiliation":[{"name":"Shonan Institute of Technology,Japan"}]},{"given":"Takahiro","family":"Yoshida","sequence":"additional","affiliation":[{"name":"Nihon University"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"crossref","DOI":"10.1109\/ISIT63088.2025.11195284","volume-title":"Several representations of \u03b1-mutual information and interpretations as privacy leakage measures","author":"Kamatsuka","year":"2025"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ITA.2015.7308959"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/18.370121"},{"issue":"2","key":"ref4","doi-asserted-by":"crossref","DOI":"10.3390\/e23020199","article-title":"Error exponents and \u03b1-mutual information","volume":"23","author":"Verd\u00fa","year":"2021","journal-title":"Entropy"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2011.6034266"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2017.2776900"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2017.8007073"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2019.2935768"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2019.2962804"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CNS48642.2020.9162168"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2023.3341148"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2012.26"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2014.29"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/BF00537520"},{"key":"ref15","first-page":"41","article-title":"Information measures and capacity of order \u03b1 for discrete memoryless channels","volume-title":"2nd Colloquium, Keszthely, Hungary","volume":"16","author":"Arimoto","year":"1977"},{"key":"ref16","volume-title":"Noisy channels","author":"Augustin","year":"1978"},{"key":"ref17","article-title":"Revisiting conditional R\u00e9nyi entropies and generalizing Shannon\u2019s bounds in information theoretically secure encryption","volume-title":"Cryptology ePrint Archive","author":"Iwamoto","year":"2013"},{"issue":"8","key":"ref18","doi-asserted-by":"crossref","DOI":"10.3390\/e21080778","article-title":"Two measures of dependence","volume":"21","author":"Lapidoth","year":"2019","journal-title":"Entropy"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2110950"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055640"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2015.7282554"},{"issue":"10","key":"ref22","doi-asserted-by":"crossref","DOI":"10.3390\/e21100969","article-title":"Conditional R\u00e9nyi divergence saddlepoint and the maximization of \u03b1-mutual information","volume":"21","author":"Cai","year":"2019","journal-title":"Entropy"},{"issue":"5","key":"ref23","doi-asserted-by":"crossref","DOI":"10.3390\/e22050526","article-title":"Conditional R\u00e9nyi entropy and the relationships between R\u00e9nyi capacities","volume":"22","author":"Aishwarya","year":"2020","journal-title":"Entropy"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1134\/s003294601904001x"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2018.2861002"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2019.8849809"},{"issue":"6","key":"ref27","doi-asserted-by":"crossref","DOI":"10.3390\/e23060702","article-title":"On the \u03b1-q-mutual information and the number \u03b1-q-capacities","volume":"23","author":"Ili\u0107","year":"2021","journal-title":"Entropy"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2008.4595361"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT57864.2024.10619200"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT57864.2024.10619378"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT57864.2024.10619657"},{"key":"ref32","volume-title":"Algorithms for computing the Augustin-Csisz\u00e1r mutual information and Lapidoth-Pfister mutual information","author":"Kamatsuka","year":"2024"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT57864.2024.10619174"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT54713.2023.10206941"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT57864.2024.10619672"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2018.2883705"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/CSF51468.2021.00021"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2020.2987713"},{"key":"ref39","doi-asserted-by":"crossref","DOI":"10.1109\/CSF64896.2025.00036","volume-title":"An extension of the adversarial threat model in quantitative information flow","author":"Zarrabian","year":"2025"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-4-431-55978-8"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-7091-2945-6"},{"key":"ref42","volume-title":"Sibson\u2019s \u03b1-mutual information and its variational representations","author":"Esposito","year":"2024"},{"issue":"22","key":"ref43","article-title":"Information Theory, ser. Kyoritsu Suugaku Kouza (in Japanese)","author":"Arimoto","year":"1976","journal-title":"KYORITSU SHUPPAN"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1587\/transfun.2024TAP0010"},{"issue":"4","key":"ref45","article-title":"On a general definition of conditional R\u00e9nyi entropies","volume-title":"Proceedings","volume":"2","author":"Ili\u0107","year":"2018"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/s40300-014-0039-y"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1198\/016214506000001437"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2022.3169440"}],"event":{"name":"2025 IEEE International Symposium on Information Theory (ISIT)","location":"Ann Arbor, MI, USA","start":{"date-parts":[[2025,6,22]]},"end":{"date-parts":[[2025,6,27]]}},"container-title":["2025 IEEE International Symposium on Information Theory (ISIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11195206\/11195207\/11195284.pdf?arnumber=11195284","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T20:29:53Z","timestamp":1773347393000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11195284\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,22]]},"references-count":48,"URL":"https:\/\/doi.org\/10.1109\/isit63088.2025.11195284","relation":{},"subject":[],"published":{"date-parts":[[2025,6,22]]}}}