{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:48:22Z","timestamp":1772164102606,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,1]]},"DOI":"10.1145\/3009837.3009884","type":"proceedings-article","created":{"date-parts":[[2016,12,22]],"date-time":"2016-12-22T16:20:29Z","timestamp":1482423629000},"page":"888-901","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":46,"title":["LightDP: towards automating differential privacy proofs"],"prefix":"10.1145","author":[{"given":"Danfeng","family":"Zhang","sequence":"first","affiliation":[{"name":"Pennsylvania State University, USA"}]},{"given":"Daniel","family":"Kifer","sequence":"additional","affiliation":[{"name":"Pennsylvania State University, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,1]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/165180.165188"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39212-2_8"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2103656.2103670"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2013.26"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2014.36"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2676726.2677000"},{"key":"e_1_3_2_1_7_1","first-page":"199","volume-title":"\u03bdZ \u2014 An Optimizing SMT Solver","author":"Bj\u00f8rner N.","unstructured":"N. Bj\u00f8rner , A.-D. Phan , and L. Fleckenstein . \u03bdZ \u2014 An Optimizing SMT Solver , pages 194\u2013 199 . 2015. N. Bj\u00f8rner, A.-D. Phan, and L. Fleckenstein. \u03bdZ \u2014 An Optimizing SMT Solver, pages 194\u2013199. 2015."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043621.2043626"},{"key":"e_1_3_2_1_9_1","unstructured":"Y. Chen and A. Machanavajjhala. On the privacy properties of variants on the sparse vector technique. http:\/\/arxiv.org\/abs\/1508.07306 2015.  Y. Chen and A. Machanavajjhala. On the privacy properties of variants on the sparse vector technique. http:\/\/arxiv.org\/abs\/1508.07306 2015."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2505351.2505353"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/1792734.1792766"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1561\/0400000042"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/11761679_29"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660348"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2429069.2429113"},{"key":"e_1_3_2_1_16_1","volume-title":"https:\/\/www.wired.com\/2016\/ 06\/apples-differential-privacy-collecting-data\/","author":"Greenberg A.","year":"2016","unstructured":"A. Greenberg . Apple\u2019s \u2018differential privacy\u2019 is about collecting your data \u2013 but not Your data. Wired , https:\/\/www.wired.com\/2016\/ 06\/apples-differential-privacy-collecting-data\/ , 2016 . A. Greenberg. Apple\u2019s \u2018differential privacy\u2019 is about collecting your data \u2013 but not Your data. Wired, https:\/\/www.wired.com\/2016\/ 06\/apples-differential-privacy-collecting-data\/, 2016."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2004.01.004"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2514689"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(81)90036-2"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/1939141.1939161"},{"key":"e_1_3_2_1_21_1","volume-title":"Understanding the sparse vector technique for differential privacy. https:\/\/arxiv.org\/abs\/1603.01699","author":"Lyu M.","year":"2016","unstructured":"M. Lyu , D. Su , and N. Li . Understanding the sparse vector technique for differential privacy. https:\/\/arxiv.org\/abs\/1603.01699 , 2016 . M. Lyu, D. Su, and N. Li. Understanding the sparse vector technique for differential privacy. https:\/\/arxiv.org\/abs\/1603.01699, 2016."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2008.4497436"},{"key":"e_1_3_2_1_23_1","first-page":"76","article-title":"Intuitionistic type theory. Naples","author":"Martin-L\u00f6f P.","year":"1984","unstructured":"P. Martin-L\u00f6f . Intuitionistic type theory. Naples : Bibliopolis , 76 , 1984 . P. Martin-L\u00f6f. Intuitionistic type theory. Naples: Bibliopolis, 76, 1984.","journal-title":"Bibliopolis"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2007.41"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1559845.1559850"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2213836.2213876"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1863543.1863568"},{"key":"e_1_3_2_1_28_1","unstructured":"A. Roth. The sparse vector technique. http:\/\/www.cis.upenn. edu\/\u02dcaaroth\/courses\/slides\/Lecture11.pdf 2011.  A. Roth. The sparse vector technique. http:\/\/www.cis.upenn. edu\/\u02dcaaroth\/courses\/slides\/Lecture11.pdf 2011."},{"key":"e_1_3_2_1_29_1","volume-title":"NSDI","author":"Roy I.","year":"2010","unstructured":"I. Roy , S. Setty , A. Kilzer , V. Shmatikov , and E. Witchel . Airavat: Security and privacy for MapReduce . In NSDI , 2010 . I. Roy, S. Setty, A. Kilzer, V. Shmatikov, and E. Witchel. Airavat: Security and privacy for MapReduce. In NSDI, 2010."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2011.09.015"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.3233\/FI-1987-10202"},{"key":"e_1_3_2_1_32_1","first-page":"215","volume-title":"Metrics for Differential Privacy in Concurrent Systems","author":"Xu L.","unstructured":"L. Xu , K. Chatzikokolakis , and H. Lin . Metrics for Differential Privacy in Concurrent Systems , pages 199\u2013 215 . 2014. L. Xu, K. Chatzikokolakis, and H. Lin. Metrics for Differential Privacy in Concurrent Systems, pages 199\u2013215. 2014."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3009837.3009884"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2882903.2882928"}],"event":{"name":"POPL '17: The 44th Annual ACM SIGPLAN Symposium on Principles of Programming Languages","location":"Paris France","acronym":"POPL '17","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGLOG ACM Special Interest Group on Logic and Computation","SIGACT ACM Special Interest Group on Algorithms and Computation Theory"]},"container-title":["Proceedings of the 44th ACM SIGPLAN Symposium on Principles of Programming Languages"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3009837.3009884","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3009837.3009884","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T15:05:34Z","timestamp":1750259134000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3009837.3009884"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,1]]},"references-count":34,"alternative-id":["10.1145\/3009837.3009884","10.1145\/3009837"],"URL":"https:\/\/doi.org\/10.1145\/3009837.3009884","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/3093333.3009884","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2017,1]]},"assertion":[{"value":"2017-01-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}