{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T15:43:08Z","timestamp":1775230988937,"version":"3.50.1"},"reference-count":86,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2020,4,1]],"date-time":"2020-04-01T00:00:00Z","timestamp":1585699200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,4,1]],"date-time":"2020-04-01T00:00:00Z","timestamp":1585699200000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,4,1]],"date-time":"2020-04-01T00:00:00Z","timestamp":1585699200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,4,1]],"date-time":"2020-04-01T00:00:00Z","timestamp":1585699200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CCF-1845852"],"award-info":[{"award-number":["CCF-1845852"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CCF-1350914"],"award-info":[{"award-number":["CCF-1350914"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CIF-1815361"],"award-info":[{"award-number":["CIF-1815361"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CIF-1901243"],"award-info":[{"award-number":["CIF-1901243"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100007482","name":"Arizona State University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100007482","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Inform. Theory"],"published-print":{"date-parts":[[2020,4]]},"DOI":"10.1109\/tit.2019.2939472","type":"journal-article","created":{"date-parts":[[2019,9,5]],"date-time":"2019-09-05T20:14:37Z","timestamp":1567714477000},"page":"1949-1978","source":"Crossref","is-referenced-by-count":41,"title":["On the Robustness of Information-Theoretic Privacy Measures and Mechanisms"],"prefix":"10.1109","volume":"66","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9321-9815","authenticated-orcid":false,"given":"Mario","family":"Diaz","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6949-7241","authenticated-orcid":false,"given":"Hao","family":"Wang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7493-1428","authenticated-orcid":false,"given":"Flavio P.","family":"Calmon","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8122-5444","authenticated-orcid":false,"given":"Lalitha","family":"Sankar","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref73","author":"polyanskiy","year":"2017","journal-title":"Lecture Notes on Information Theory"},{"key":"ref72","author":"angwin","year":"2016","journal-title":"Machine Bias"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2017.2700857"},{"key":"ref70","author":"greenacre","year":"1984","journal-title":"Theory and Applications of Correspondence Analysis"},{"key":"ref76","author":"rudin","year":"1987","journal-title":"Real and Complex Analysis"},{"key":"ref77","author":"folland","year":"1984","journal-title":"Real Analysis Modern Techniques and Their Applications"},{"key":"ref74","author":"rudin","year":"1976","journal-title":"Principles of Mathematical Analysis"},{"key":"ref39","article-title":"An operational approach to information leakage","author":"issa","year":"2018","journal-title":"arXiv 1807 07878"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-8176-4848-0"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2018.2816066"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2018.8437632"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1975.1055437"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ITW.2018.8613385"},{"key":"ref32","first-page":"299","article-title":"Information-type measures of difference of probability distributions and indirect observation","volume":"2","author":"csisz\u00e1r","year":"1967","journal-title":"Studia Scientiarum Mathematicarum Hungarica"},{"key":"ref31","first-page":"1","article-title":"$\\alpha$\n-mutual information","author":"verd\u00fa","year":"2015","journal-title":"Proc IEEE Inf Theory Appl Workshop (ITA)"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3168389"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/2666468"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2018.8437307"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/CISS.2016.7460507"},{"key":"ref60","first-page":"2350","article-title":"Generalization in adaptive data analysis and holdout reuse","author":"dwork","year":"2015","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref62","first-page":"41","article-title":"Information measures and capacity of order \n$\\alpha$\n for discrete memoryless channels","volume":"16","author":"arimoto","year":"1977","journal-title":"Topics in Information Theory"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1126\/science.aaa9375"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2014.2357799"},{"key":"ref28","first-page":"1066","article-title":"On learning distributions from their samples","author":"kamath","year":"2015","journal-title":"Proc 28th Conf Learn Theory"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00596-1_21"},{"key":"ref27","article-title":"Inequalities for the \n$L_{1}$\n deviation of the empirical distribution","author":"weissman","year":"2003"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2009.07.085"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2011.20"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1561\/0400000042","article-title":"The algorithmic foundations of differential privacy","volume":"9","author":"dwork","year":"2014","journal-title":"Found Trends Theor Comput Sci"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1007\/BF00537520"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2016.2549542"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2017.2782359"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"452","DOI":"10.1038\/533452a","article-title":"Is there a reproducibility crisis? A nature survey lifts the lid on how researchers view the &#x2019;crisis rocking science and what they think will help","volume":"533","author":"baker","year":"2016","journal-title":"Nature"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2018.8437735"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.3390\/info7010015"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2017.8262832"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ITA.2016.7888175"},{"key":"ref24","article-title":"Data disclosure under perfect sample privacy","author":"rassouli","year":"2019","journal-title":"arXiv 1904 01711"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2019.8849291"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.3390\/e19120656"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2019.2894147"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/Allerton.2013.6736575"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1515\/9781400831050"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/2746539.2746580"},{"key":"ref58","article-title":"How much does your data exploration overfit? Controlling bias via information usage","author":"russo","year":"2015","journal-title":"arXiv 1511 05219"},{"key":"ref57","first-page":"2524","article-title":"Information-theoretic analysis of generalization capability of learning algorithms","author":"xu","year":"2017","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/3897.001.0001"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781107298019"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/3055399.3055491"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1016\/S0004-3702(00)00002-3"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04898-2_594"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2253320"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46035-7_9"},{"key":"ref12","doi-asserted-by":"crossref","DOI":"10.1007\/11787006_1","article-title":"Differential privacy","volume":"4052","author":"dwork","year":"2006","journal-title":"Automata Languages and Programming"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2016.7541353"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ITW.2018.8613451"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056749"},{"key":"ref82","author":"royden","year":"1968","journal-title":"Real Analysis"},{"key":"ref16","first-page":"2879","article-title":"Extremal mechanisms for local differential privacy","author":"kairouz","year":"2014","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1965.10480775"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2018.2865558"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2104513"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/Allerton.2012.6483382"},{"key":"ref83","author":"resnick","year":"2013","journal-title":"Extreme Values Regular Variation and Point Processes"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2015.7282765"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511566172"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1080\/10618600.2017.1384734"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.intell.2012.01.004"},{"key":"ref6","first-page":"18","article-title":"Facebook and Cambridge analytica: What you need to know as fallout widens","volume":"19","author":"granville","year":"2018","journal-title":"New York Times"},{"key":"ref5","first-page":"29","article-title":"Only you, your doctor, and many others may know","volume":"2015092903","author":"sweeney","year":"2015","journal-title":"SC Technology"},{"key":"ref85","volume":"2","author":"oxtoby","year":"2013","journal-title":"Measure and Category A Survey of the Analogies between Topological and Measure Spaces"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.2307\/1190677"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-4708-5"},{"key":"ref7","first-page":"111","article-title":"Robust de-anonymization of large sparse datasets","author":"narayanan","year":"2008","journal-title":"Proc IEEE Symp Secur Privacy"},{"key":"ref49","first-page":"368","article-title":"The information bottleneck method","author":"tishby","year":"1999","journal-title":"Proc 37th Annu Allerton Conf Commun Control Comput"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2009.190"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2011.5946886"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2016.2548468"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ITW.2014.6970882"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2013.130715"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2017.8006634"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30576-7_30"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2015.2412945"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2010.04.006"}],"container-title":["IEEE Transactions on Information Theory"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/18\/9039774\/8825803-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/18\/9039774\/08825803.pdf?arnumber=8825803","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T17:31:29Z","timestamp":1651080689000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8825803\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4]]},"references-count":86,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tit.2019.2939472","relation":{},"ISSN":["0018-9448","1557-9654"],"issn-type":[{"value":"0018-9448","type":"print"},{"value":"1557-9654","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,4]]}}}