{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T04:43:07Z","timestamp":1773376987805,"version":"3.50.1"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,6,22]],"date-time":"2025-06-22T00:00:00Z","timestamp":1750550400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,6,22]],"date-time":"2025-06-22T00:00:00Z","timestamp":1750550400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,6,22]]},"DOI":"10.1109\/isit63088.2025.11195471","type":"proceedings-article","created":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T17:48:08Z","timestamp":1760982488000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["Improving the Privacy Loss Under User-Level DP Composition for Fixed Estimation Error"],"prefix":"10.1109","author":[{"given":"V. Arvind","family":"Rameshwar","sequence":"first","affiliation":[{"name":"IISc,IUDX Program Unit,Bengaluru,India"}]},{"given":"Anshoo","family":"Tandon","sequence":"additional","affiliation":[{"name":"IISc,IUDX Program Unit,Bengaluru,India"}]},{"given":"Abhay","family":"Sharma","sequence":"additional","affiliation":[{"name":"IISc,IUDX Program Unit,Bengaluru,India"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_14"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1561\/0400000042"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1111\/j.1748-720X.1997.tb01885.x"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.33"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pgen.1000167"},{"key":"ref6","article-title":"Learning with user-level privacy","volume-title":"Advances in Neural Information Processing Systems","author":"Levy","year":"2021"},{"key":"ref7","article-title":"Mean estimation with user-level privacy under data heterogeneity","author":"Cummings","year":"2022","journal-title":"NeurIPS"},{"key":"ref8","article-title":"User-level private learning via correlated sampling","volume-title":"Proceedings of the 35th International Conference on Neural Information Processing Systems, ser. NIPS \u201921","author":"Ghazi","year":"2024"},{"key":"ref9","first-page":"263","article-title":"Bounding user contributions: A bias-variance trade-off in differential privacy","volume-title":"Proceedings of the 36th International Conference on Machine Learning, ser. Proceedings of Machine Learning Research","volume":"97","author":"Amin","year":"2019"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737416"},{"key":"ref11","article-title":"Learning differentially private recurrent language models","volume-title":"6th International Conference on Learning Representations, ICLR 2018","author":"McMahan"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1561\/9781638284772.ch3"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2010.12"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2017.2685505"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611978322.92"},{"key":"ref16","volume-title":"A huber loss minimization approach to mean estimation under user-level differential privacy","author":"Zhao","year":"2024"},{"key":"ref17","volume-title":"On improving the composition privacy loss in differential privacy for fixed estimation error","author":"Rameshwar","year":"2024"},{"key":"ref18","volume-title":"H3: Hexagonal hierarchical geospatial indexing system"},{"key":"ref19","first-page":"347","volume-title":"The complexity of differential privacy","author":"Vadhan","year":"2017"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1145\/1810891.1810916","article-title":"Privacy integrated queries","volume":"53","author":"McSherry","year":"2010","journal-title":"Communications of the ACM"},{"key":"ref21","article-title":"Differential privacy for social science inference","author":"D\u2019Orazio","year":"2015","journal-title":"Sloan Foundation Economics Research Paper No. 2676160"},{"key":"ref22","author":"Rameshwar","year":"2024","journal-title":"Mean estimation with user-level privacy for spatio-temporal IoT datasets"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3313276.3316377"},{"key":"ref24","volume-title":"Hyperparameter tuning with Renyi differential privacy","author":"Papernot","year":"2022"},{"key":"ref25","article-title":"Instance-optimal mean estimation under differential privacy","volume-title":"Proceedings of the 35th International Conference on Neural Information Processing Systems, ser. NIPS \u201921","author":"Huang","year":"2021"},{"key":"ref26","article-title":"Subset-based instance optimality in private estimation","volume-title":"Proceedings of the 40th International Conference on Machine Learning, ser. ICML\u201923","author":"Dick","year":"2023"}],"event":{"name":"2025 IEEE International Symposium on Information Theory (ISIT)","location":"Ann Arbor, MI, USA","start":{"date-parts":[[2025,6,22]]},"end":{"date-parts":[[2025,6,27]]}},"container-title":["2025 IEEE International Symposium on Information Theory (ISIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11195206\/11195207\/11195471.pdf?arnumber=11195471","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T20:29:49Z","timestamp":1773347389000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11195471\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,22]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/isit63088.2025.11195471","relation":{},"subject":[],"published":{"date-parts":[[2025,6,22]]}}}