{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T23:29:44Z","timestamp":1772666984655,"version":"3.50.1"},"reference-count":184,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"7","license":[{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Artif. Intell."],"published-print":{"date-parts":[[2025,7]]},"DOI":"10.1109\/tai.2025.3531326","type":"journal-article","created":{"date-parts":[[2025,1,22]],"date-time":"2025-01-22T14:04:15Z","timestamp":1737554655000},"page":"1706-1726","source":"Crossref","is-referenced-by-count":4,"title":["Privacy and Fairness in Machine Learning: A Survey"],"prefix":"10.1109","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8346-8105","authenticated-orcid":false,"given":"Sina","family":"Shaham","sequence":"first","affiliation":[{"name":"University of Southern California, Los Angeles, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-1056-0640","authenticated-orcid":false,"given":"Arash","family":"Hajisafi","sequence":"additional","affiliation":[{"name":"University of Southern California, Los Angeles, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1023-7733","authenticated-orcid":false,"given":"Minh K.","family":"Quan","sequence":"additional","affiliation":[{"name":"Deakin University, Waurn Ponds, VIC, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8092-6756","authenticated-orcid":false,"given":"Dinh C.","family":"Nguyen","sequence":"additional","affiliation":[{"name":"University of Alabama in Huntsville, Huntsville, AL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9994-9931","authenticated-orcid":false,"given":"Bhaskar","family":"Krishnamachari","sequence":"additional","affiliation":[{"name":"University of Southern California, Los Angeles, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3648-8389","authenticated-orcid":false,"given":"Charith","family":"Peris","sequence":"additional","affiliation":[{"name":"Amazon, Cambridge, MA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8372-3006","authenticated-orcid":false,"given":"Gabriel","family":"Ghinita","sequence":"additional","affiliation":[{"name":"Hamad Bin Khalifa University, Doha, Qatar"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9118-0681","authenticated-orcid":false,"given":"Cyrus","family":"Shahabi","sequence":"additional","affiliation":[{"name":"University of Southern California, Los Angeles, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8014-7798","authenticated-orcid":false,"given":"Pubudu N.","family":"Pathirana","sequence":"additional","affiliation":[{"name":"Deakin University, Waurn Ponds, VIC, Australia"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.4337\/9781788972826.00014"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1257\/aer.p20161029"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2964534"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2090236.2090255"},{"key":"ref5","article-title":"When fairness meets privacy: Fair classification with semi-private sensitive attributes","author":"Chen","year":"2022","journal-title":"Proc. Workshop Trustworthy Socially Responsible Mach. Learn. (NeurIPS)"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3457607"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.5860\/choice.46-1562"},{"key":"ref8","first-page":"11","article-title":"Facebook privacy breach","author":"Times","year":"2020","journal-title":"Financial Times"},{"key":"ref9","article-title":"How privacy got on the calendar","year":"(2023)"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1093\/oso\/9780195157642.001.0001"},{"key":"ref11","article-title":"Machine bias","author":"Angwin","year":"2016"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3351095.3372828"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2021.06.023"},{"key":"ref14","first-page":"15479","article-title":"Differential privacy has disparate impact on model accuracy","volume":"32","author":"Bagdasaryan","year":"2019","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i9.16986"},{"key":"ref16","article-title":"Investigating trade-offs in utility, fairness and differential privacy in neural networks","author":"Pannekoek","year":"2021"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3204037"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3547139"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1002\/widm.1452"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3494672"},{"key":"ref21","article-title":"A survey on fairness for machine learning on graphs","author":"Choudhary","year":"2022"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3436755"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2021.3076443"},{"key":"ref24","article-title":"Privacy-preserving machine learning: Methods, challenges and directions","author":"Xu","year":"2021"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3551390"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3114099"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3023084"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-821229-5.00011-2"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/4359785"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-41068-1"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/S1470-2045(19)30149-4"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79228-4_1"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3214303"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_14"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.29012\/jpc.715"},{"key":"ref36","article-title":"Optimality of the laplace mechanism in differential privacy","author":"Koufogiannis","year":"2015"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/LICS52264.2021.9470718"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/1807167.1807247"},{"key":"ref39","article-title":"Differentially-private publication of origin-destination matrices with intermediate stops","author":"Shaham","year":"2022"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-013-0309-y"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3569087"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/3474717.3483943"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2010.247"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2012.16"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2007.66"},{"key":"ref46","first-page":"2597","article-title":"Optimal differential privacy composition for exponential mechanisms","volume-title":"Proc. Int. Conf. Mach. Learn. (PMLR)","author":"Dong","year":"2020"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536465"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.29012\/jpc.v4i1.612"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/1835804.1835869"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"ref51","article-title":"Challenges of differentially private prediction in healthcare settings","volume-title":"Proc. Workshop AI Social Good (IJCAI)","author":"Suriyakumar","year":"2021"},{"key":"ref52","article-title":"Differentially private federated learning: A client level perspective","author":"Geyer","year":"2017"},{"key":"ref53","article-title":"A general approach to adding differential privacy to iterative training procedures","author":"McMahan","year":"2018"},{"key":"ref54","article-title":"Opacus: User-friendly differential privacy library in pytorch","author":"Yousefpour","year":"2021"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1023\/B:MACH.0000008084.60811.49"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2022.10.075"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-12229-8_2"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88702-7_5"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20901-7_10"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-47411-9_29"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2013.09.310"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/EIConRus.2017.7910591"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2014.6865753"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.5772\/56687"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/EPEPS.2012.6457871"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-81945-3_2"},{"key":"ref67","article-title":"Somewhat practical fully homomorphic encryption","author":"Fan","year":"2012","journal-title":"Cryptol. ePrint Arch."},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38980-1_7"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.2230219"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.3390\/e24040519"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2018.2808962"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1002\/pmic.201000616"},{"key":"ref73","article-title":"AI now 2017 report","author":"Campolo","year":"2017"},{"key":"ref74","first-page":"563","article-title":"Emerging uniform structure of disparate treatment discrimination litigation","volume":"30","author":"Zimmer","year":"1995","journal-title":"GA Law Rev."},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.2307\/1072940"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2819182"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-010-0190-x"},{"key":"ref78","first-page":"38","article-title":"False positives, false negatives, and false analyses: A rejoinder to machine bias: There\u2019s software used across the country to predict future criminals. and it\u2019s biased against blacks","volume":"80","author":"Flores","year":"2016","journal-title":"Fed. Probation"},{"key":"ref79","article-title":"On fairness and calibration","volume":"30","author":"Pleiss","year":"2017","journal-title":"Proc. Adv. Neural Inf. Process. Syst."},{"key":"ref80","article-title":"Counterfactual fairness","volume":"30","author":"Kusner","year":"2017","journal-title":"Proc. Adv. Neural Inf. Process. Syst."},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-011-0463-8"},{"key":"ref82","first-page":"728","article-title":"Fairness without demographics through adversarially reweighted learning","volume":"33","author":"Lahoti","year":"2020","journal-title":"Proc. Adv. Neural Inf. Process. Syst."},{"key":"ref83","article-title":"Fairbatch: Batch selection for model fairness","author":"Roh","year":"2020"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2783311"},{"key":"ref85","first-page":"325","article-title":"Learning fair representations","volume-title":"Proc. Int. Conf. Mach. Learn. (PMLR)","author":"Zemel","year":"2013"},{"key":"ref86","article-title":"The variational fair autoencoder","author":"Louizos","year":"2015"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1145\/2020408.2020488"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33486-3_3"},{"key":"ref89","article-title":"Penalizing unfairness in binary classification","author":"Bechavod","year":"2017"},{"key":"ref90","article-title":"A convex framework for fair regression","author":"Berk","year":"2017"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2010.50"},{"key":"ref92","first-page":"962","article-title":"Fairness constraints: Mechanisms for fair classification","author":"Zafar","year":"2017","journal-title":"Proc. Artif. Intell. Statist. (PMLR)"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052660"},{"key":"ref94","first-page":"1920","article-title":"Learning non-discriminatory predictors","volume-title":"Proc. Conf. Learn. Theory (PMLR)","author":"Woodworth","year":"2017"},{"key":"ref95","article-title":"Recycling privileged learning and distribution matching for fairness","volume":"30","author":"Quadrianto","year":"2017","journal-title":"Proc. Adv. Neural Inf. Process. Syst."},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1145\/3278721.3278779"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3186133"},{"issue":"3","key":"ref98","first-page":"61","article-title":"Probabilistic outputs for support vector machines and comparisons to regularized likelihood methods","volume":"10","author":"Platt","year":"1999","journal-title":"Adv. Large Margin Classifiers"},{"key":"ref99","first-page":"609","article-title":"Obtaining calibrated probability estimates from decision trees and naive bayesian classifiers","volume":"1","author":"Zadrozny","year":"2001","journal-title":"Proc. ICML"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.14778\/3565816.3565820"},{"key":"ref101","first-page":"25944","article-title":"Post-processing for individual fairness","volume":"34","author":"Petersen","year":"2021","journal-title":"Proc. Adv. Neural Inf. Process. Syst."},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1145\/3306618.3314287"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2012.45"},{"key":"ref104","article-title":"The cost of fairness in classification","author":"Menon","year":"2017"},{"key":"ref105","article-title":"Equality of opportunity in supervised learning","volume":"29","author":"Hardt","year":"2016","journal-title":"Proc. Adv. Neural Inf. Process. Syst."},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098095"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2019.8682620"},{"key":"ref108","article-title":"Fair clustering through fairlets","volume":"30","author":"Chierichetti","year":"2017","journal-title":"Proc. Adv. Neural Inf. Process. Syst."},{"key":"ref109","article-title":"Fair algorithms for clustering","volume":"32","author":"Bera","year":"2019","journal-title":"Proc. Adv. Neural Inf. Process. Syst."},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330987"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1109\/icmla55696.2022.00036"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1145\/3442188.3445906"},{"key":"ref113","article-title":"A notion of individual fairness for clustering","author":"Kleindessner","year":"2020"},{"key":"ref114","article-title":"Fair clustering through fairlets","volume":"30","author":"Chierichetti","year":"2017","journal-title":"Proc. Adv. Neural Inf. Process. Syst."},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1007\/springerreference_205371"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1145\/3289600.3291002"},{"key":"ref117","first-page":"19","article-title":"Fair clustering using antidote data","author":"Chhabra","year":"2022","journal-title":"Proc. Algorithmic Fairness Through Lens Causality Robustness Workshop"},{"key":"ref118","first-page":"3458","article-title":"Guarantees for spectral clustering with fairness constraints","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Kleindessner","year":"2019"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00909"},{"key":"ref120","article-title":"Deep fair discriminative clustering","author":"Zhang","year":"2021"},{"key":"ref121","article-title":"Fair clustering via equalized confidence","author":"Chai","year":"2023"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-24866-5_6"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i12.17336"},{"key":"ref124","first-page":"1032","article-title":"Proportionally fair clustering","volume-title":"Proc. Int. Conf. Mach. Learn. (PMLR)","author":"Chen","year":"2019"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-19-4453-6_3"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1017\/S0031819100060447"},{"key":"ref127","first-page":"14509","article-title":"Kfc: A scalable approximation algorithm for $k$-center fair clustering","volume":"33","author":"Harb","year":"2020","journal-title":"Proc. Adv. Neural Inf. Process. Syst."},{"key":"ref128","first-page":"12743","article-title":"Probabilistic fair clustering","volume":"33","author":"Esmaeili","year":"2020","journal-title":"Proc. Adv. Neural Inf. Process. Syst."},{"key":"ref129","first-page":"14345","article-title":"Fair clustering under a bounded cost","volume":"34","author":"Esmaeili","year":"2021","journal-title":"Proc. Adv. Neural Inf. Process. Syst."},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1145\/3547333"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1017\/9781108571401"},{"key":"ref132","article-title":"Fairness in learning: Classic and contextual bandits","volume":"29","author":"Joseph","year":"2016","journal-title":"Proc. Adv. Neural Inf. Process. Syst."},{"key":"ref133","article-title":"Calibrated fairness in bandits","author":"Liu","year":"2017"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2019.2954310"},{"key":"ref135","first-page":"299","article-title":"Multi-armed bandits with fairness constraints for distributing resources to human teammates","volume-title":"Proc. ACM\/IEEE Int. Conf. Human-Robot Interaction","author":"Claure","year":"2020"},{"issue":"1","key":"ref136","first-page":"7885","article-title":"Achieving fairness in the stochastic multi-armed bandit problem","volume":"22","author":"Patil","year":"2021","journal-title":"J. Mach. Learn. Res."},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-47426-3_13"},{"key":"ref138","first-page":"1617","article-title":"Fairness in reinforcement learning","volume-title":"Proc. Int. Conf. Mach. Learn. (PMLR)","author":"Jabbari","year":"2017"},{"key":"ref139","first-page":"181","article-title":"Fair contextual multi-armed bandits: Theory and experiments","volume-title":"Proc. Conf. Uncertainty Artif. Intell. (PMLR)","author":"Chen","year":"2020"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1007\/s44230-022-00008-w"},{"key":"ref141","first-page":"1144","article-title":"Algorithms for fairness in sequential decision making","volume-title":"Proc. Int. Conf. Artif. Intell. Statist. (PMLR)","author":"Wen","year":"2021"},{"key":"ref142","article-title":"Online learning with an unknown fairness metric","volume":"31","author":"Gillen","year":"2018","journal-title":"Proc. Adv. Neural Inf. Process. Syst."},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1145\/3488560.3498487"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1145\/2857705.2857708"},{"key":"ref145","article-title":"Fair differential privacy can mitigate the disparate impact on model accuracy","author":"Liu","year":"2021"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.7764\/tesisuc\/ing\/74424"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133982"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v37i6.25911"},{"key":"ref149","article-title":"Privfair: a library for privacy-preserving fairness auditing","author":"Pentyala","year":"2022"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-60548-3_14"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.findings-emnlp.213"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2022.findings-emnlp.514"},{"key":"ref153","first-page":"1738","article-title":"How unfair is private learning?","volume-title":"Proc. Uncertainty Artif. Intell. (PMLR)","author":"Sanyal","year":"2022"},{"key":"ref154","article-title":"Robust anomaly detection and backdoor attack detection via differential privacy","author":"Du","year":"2019"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1145\/3531146.3533226"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2022.3178187"},{"key":"ref157","article-title":"Leveraging algorithmic fairness to mitigate blackbox attribute inference attacks","author":"Aalmoes","year":"2022"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP51992.2021.00028"},{"key":"ref159","article-title":"On the interaction between node fairness and edge privacy in graph neural networks","author":"Zhang","year":"2023"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1145\/3314183.3323847"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1145\/3308560.3317584"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-014-0393-7"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP43922.2022.9747330"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-92310-5_80"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1109\/BigData50022.2020.9378043"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pdig.0000102"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.3390\/e23091165"},{"key":"ref168","article-title":"Evaluating trade-offs in computer vision between attribute privacy, fairness and utility","author":"Paul","year":"2023"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102902"},{"key":"ref170","volume-title":"Weapons of Math Destruction: How Big Data Increases Inequality and Threatens Democracy","author":"O\u2019neil","year":"2017"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.3905\/jfds.2021.1.075"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-28238-6_13"},{"key":"ref173","article-title":"Fairlearn: A toolkit for assessing and improving fairness in AI","author":"Bird","year":"2020"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.1147\/JRD.2019.2942287"},{"key":"ref175","article-title":"Aequitas: A bias and fairness audit toolkit","author":"Saleiro","year":"2018"},{"key":"ref176","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2019.2934619"},{"key":"ref177","doi-asserted-by":"publisher","DOI":"10.1145\/3340531.3412705"},{"key":"ref178","first-page":"1877","article-title":"Language models are few-shot learners","volume":"33","author":"Brown","year":"2020","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"ref179","article-title":"Gpt-4 technical report","year":"2023"},{"key":"ref180","article-title":"Alexatm 20b: Few-shot learning using a large-scale multilingual seq2seq model","author":"Soltan","year":"2022"},{"key":"ref181","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2023.eacl-main.89"},{"key":"ref182","first-page":"27730","article-title":"Training language models to follow instructions with human feedback","volume":"35","author":"Ouyang","year":"2022","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"ref183","first-page":"35","article-title":"Privacy for all: Ensuring fair and equitable privacy protections","volume-title":"Proc. Conf. Fairness, Accountability Transparency (PMLR)","author":"Ekstrand","year":"2018"},{"key":"ref184","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-10973-8"}],"container-title":["IEEE Transactions on Artificial Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/9078688\/11059979\/10848485.pdf?arnumber=10848485","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T01:09:47Z","timestamp":1755911387000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10848485\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7]]},"references-count":184,"journal-issue":{"issue":"7"},"URL":"https:\/\/doi.org\/10.1109\/tai.2025.3531326","relation":{},"ISSN":["2691-4581"],"issn-type":[{"value":"2691-4581","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,7]]}}}