{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T16:17:13Z","timestamp":1770740233025,"version":"3.49.0"},"reference-count":44,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100007065","name":"NVIDIA Academic Hardware Grant Program","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100007065","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2022]]},"DOI":"10.1109\/tifs.2022.3184263","type":"journal-article","created":{"date-parts":[[2022,6,17]],"date-time":"2022-06-17T19:26:54Z","timestamp":1655494014000},"page":"2324-2338","source":"Crossref","is-referenced-by-count":16,"title":["NoLeaks: Differentially Private Causal Discovery Under Functional Causal Model"],"prefix":"10.1109","volume":"17","author":[{"given":"Pingchuan","family":"Ma","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, The Hong Kong University of Science and Technology, SAR, Hong Kong"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3167-0480","authenticated-orcid":false,"given":"Zhenlan","family":"Ji","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, The Hong Kong University of Science and Technology, SAR, Hong Kong"}]},{"given":"Qi","family":"Pang","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, The Hong Kong University of Science and Technology, SAR, Hong Kong"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0866-0308","authenticated-orcid":false,"given":"Shuai","family":"Wang","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, The Hong Kong University of Science and Technology, SAR, Hong Kong"}]}],"member":"263","reference":[{"key":"ref1","first-page":"1","article-title":"Towards practical differentially private causal graph discovery","volume-title":"Proc. NIPS","author":"Wang"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/PAC.2017.24"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_14"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/1754.001.0001"},{"key":"ref5","article-title":"DAGs with NO TEARS: Continuous optimization for structure learning","author":"Zheng","year":"2018","journal-title":"arXiv:1803.01422"},{"key":"ref6","article-title":"Bnlearn\u2014An R package for Bayesian network learning and inference","author":"Scutari","year":"2011"},{"key":"ref7","volume-title":"Research Artifact for Noleaks","year":"2021"},{"issue":"3","key":"ref8","first-page":"4","article-title":"On pearl\u2019s hierarchy and the foundations of causal inference","volume":"2","author":"Bareinboim","year":"2020","journal-title":"ACM Special Volume Honor Judea Pearl"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3527154"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/BF00994016"},{"key":"ref11","first-page":"1","article-title":"Directed acyclic graph neural networks","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Thost"},{"key":"ref12","first-page":"1308","article-title":"Private causal inference","volume-title":"Proc. 19th Int. Conf. Artif. Intell. Statist.","volume":"51","author":"Kusner"},{"issue":"3","key":"ref13","first-page":"1","article-title":"Differentially private empirical risk minimization","volume":"12","author":"Chaudhuri","year":"2011","journal-title":"J. Mach. Learn. Res."},{"key":"ref14","first-page":"1","article-title":"Distributed learning without distress: Privacy-preserving empirical risk minimization","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Jayaraman"},{"key":"ref15","first-page":"1","article-title":"Do not let privacy overbill utility: Gradient embedding perturbation for private learning","volume-title":"Proc. Int. Conf. Learn. Represent.","author":"Yu"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2017\/548"},{"key":"ref17","first-page":"6526","article-title":"Differentially private empirical risk minimization with non-convex loss functions","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Wang"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1137\/0916069"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1561\/9781601988195"},{"key":"ref20","first-page":"394","article-title":"Improving the Gaussian mechanism for differential privacy: Analytical calibration and optimal denoising","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Balle"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.3389\/fgene.2019.00524"},{"key":"ref22","first-page":"63","volume-title":"Markov Properties on Graphs","author":"Cowell","year":"1999"},{"key":"ref23","volume-title":"Elements of Causal Inference: Foundations and Learning Algorithms","author":"Peters","year":"2017"},{"key":"ref24","volume-title":"Optimization II. Numerical Methods for Nonlinear Continuous Optimization","author":"Nemirovsky","year":"1999"},{"key":"ref25","volume-title":"Complete Orientation Rules for Patterns","author":"Meek","year":"1995"},{"key":"ref26","first-page":"2287","article-title":"Quantifying the privacy risks of learning high-dimensional graphical models","volume-title":"Proc. Int. Conf. Artif. Intell. Statist.","author":"Murakonda"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78800-3_24"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73368-3_52"},{"key":"ref29","article-title":"Privacy amplification by subsampling: Tight analyses via couplings and divergences","author":"Balle","year":"2018","journal-title":"arXiv:1807.01647"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2021\/376"},{"key":"ref31","article-title":"Semi-supervised knowledge transfer for deep learning from private training data","author":"Papernot","year":"2016","journal-title":"arXiv:1610.05755"},{"key":"ref32","article-title":"Scalable private learning with pate","author":"Papernot","year":"2018","journal-title":"arXiv:1802.08908"},{"key":"ref33","article-title":"Limits of private learning with access to public data","author":"Alon","year":"2019","journal-title":"arXiv:1910.11519"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2010.12"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2017.2685505"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1137\/19M1240794"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/DSAA.2016.49"},{"key":"ref38","first-page":"1895","article-title":"Evaluating differentially private machine learning in practice","volume-title":"Proc. 28th USENIX Secur. Symp. (USENIX Security)","author":"Jayaraman"},{"key":"ref39","volume-title":"Optimization II. Numerical Methods for Nonlinear Continuous Optimization","author":"Nemirovsky","year":"1999"},{"key":"ref40","first-page":"107","article-title":"Causal & non-causal feature selection for ridge regression","volume-title":"Proc. Workshop Causation Predict. Challenge (WCCI)","volume":"3","author":"Cawley"},{"key":"ref41","article-title":"Generalized out-of-distribution detection: A survey","author":"Yang","year":"2021","journal-title":"arXiv:2110.11334"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.2307\/2683673"},{"key":"ref43","article-title":"Strong completeness and faithfulness in Bayesian networks","author":"Meek","year":"2013","journal-title":"arXiv:1302.4973"},{"key":"ref44","article-title":"Auto-encoding variational Bayes","author":"Kingma","year":"2013","journal-title":"arXiv:1312.6114"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/9652463\/09798874.pdf?arnumber=9798874","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,2]],"date-time":"2024-03-02T01:13:44Z","timestamp":1709342024000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9798874\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"references-count":44,"URL":"https:\/\/doi.org\/10.1109\/tifs.2022.3184263","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]}}}