{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:09:44Z","timestamp":1750306184301,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":56,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,5,9]],"date-time":"2017-05-09T00:00:00Z","timestamp":1494288000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSF Grant","award":["CNS-1237235"],"award-info":[{"award-number":["CNS-1237235"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,5,9]]},"DOI":"10.1145\/3034786.3034795","type":"proceedings-article","created":{"date-parts":[[2017,5,10]],"date-time":"2017-05-10T18:09:00Z","timestamp":1494439740000},"page":"167-182","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Private Incremental Regression"],"prefix":"10.1145","author":[{"given":"Shiva Prasad","family":"Kasiviswanathan","sequence":"first","affiliation":[{"name":"Samsung Research America, Mountain View, CA, USA"}]},{"given":"Kobbi","family":"Nissim","sequence":"additional","affiliation":[{"name":"Geogetown University, Washington, DC, USA"}]},{"given":"Hongxia","family":"Jin","sequence":"additional","affiliation":[{"name":"Samsung Research America, Mountain View, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,5,9]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1561\/2200000015"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2014.56"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2012.67"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065167.1065184"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2746539.2746541"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043621.2043626"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/2981780.2981817"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/1953048.2021036"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1824777.1824783"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/773153.773173"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2013.53"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2666468"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/11761679_29"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_14"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806689.1806787"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48800-3_30"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","DOI":"10.1561\/9781601988195","volume-title":"The Algorithmic Foundations of Differential Privacy. Theoretical Computer Science, 9(3--4)","author":"Dwork C.","year":"2013","unstructured":"C. Dwork and A. Roth . The Algorithmic Foundations of Differential Privacy. Theoretical Computer Science, 9(3--4) , 2013 . C. Dwork and A. Roth. The Algorithmic Foundations of Differential Privacy. Theoretical Computer Science, 9(3--4), 2013."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2010.12"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/2900728.2900878"},{"key":"e_1_3_2_1_20_1","volume-title":"On Milman's Inequality and Random Subspaces which Escape through a Mesh in R","author":"Gordon Y.","year":"1988","unstructured":"Y. Gordon . On Milman's Inequality and Random Subspaces which Escape through a Mesh in R . Springer , 1988 . Y. Gordon. On Milman's Inequality and Random Subspaces which Escape through a Mesh in R. Springer, 1988."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1137\/090771806"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/11776420_37"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2591796.2591826"},{"key":"e_1_3_2_1_24_1","volume-title":"COLT","author":"Jain P.","year":"2012","unstructured":"P. Jain , P. Kothari , and A. Thakurta . Differentially Private Online Learning . In COLT , 2012 . P. Jain, P. Kothari, and A. Thakurta. Differentially Private Online Learning. In COLT, 2012."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/3042817.3042950"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/3044805.3044860"},{"key":"e_1_3_2_1_27_1","volume-title":"AISTATS","author":"Kab\u00e1an A.","year":"2014","unstructured":"A. Kab\u00e1an . New bounds on compressive linear least squares regression . In AISTATS , 2014 . A. Kab\u00e1an. New bounds on compressive linear least squares regression. In AISTATS, 2014."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/3045390.3045443"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2008.27"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.5555\/2627817.2627919"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.29012\/jpc.v6i1.634"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.29012\/jpc.v5i1.625"},{"key":"e_1_3_2_1_33_1","volume-title":"COLT","author":"Kifer D.","year":"2012","unstructured":"D. Kifer , A. Smith , and A. Thakurta . Private Convex Empirical Risk Minimization and High-dimensional Regression . In COLT , 2012 . D. Kifer, A. Smith, and A. Thakurta. Private Convex Empirical Risk Minimization and High-dimensional Regression. In COLT, 2012."},{"key":"e_1_3_2_1_34_1","volume-title":"Probability in Banach Spaces: Isoperimetry and Processes","author":"Ledoux M.","year":"2013","unstructured":"M. Ledoux and M. Talagrand . Probability in Banach Spaces: Isoperimetry and Processes , volume 23 . Springer Science & Business Media , 2013 . M. Ledoux and M. Talagrand. Probability in Banach Spaces: Isoperimetry and Processes, volume 23. Springer Science & Business Media, 2013."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.5555\/2984093.2984230"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.5555\/3020847.3020909"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2013.21"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-19749-4","volume-title":"Sampling Theory, a Renaissance","author":"Pfander G. E.","year":"2015","unstructured":"G. E. Pfander . Sampling Theory, a Renaissance . Springer , 2015 . G. E. Pfander. Sampling Theory, a Renaissance. Springer, 2015."},{"key":"e_1_3_2_1_39_1","volume-title":"Learning in a Large Function Space: Privacy-preserving Mechanisms for SVM Learning. arXiv:0911.5708","author":"Rubinstein B. I.","year":"2009","unstructured":"B. I. Rubinstein , P. L. Bartlett , L. Huang , and N. Taft . Learning in a Large Function Space: Privacy-preserving Mechanisms for SVM Learning. arXiv:0911.5708 , 2009 . B. I. Rubinstein, P. L. Bartlett, L. Huang, and N. Taft. Learning in a Large Function Space: Privacy-preserving Mechanisms for SVM Learning. arXiv:0911.5708, 2009."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1561\/2200000018"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.5555\/1756006.1953019"},{"key":"e_1_3_2_1_42_1","volume-title":"Private Approximations of the 2nd-Moment Matrix Using Existing Techniques in Linear Regression. arXiv:1507.00056","author":"Sheffet O.","year":"2015","unstructured":"O. Sheffet . Private Approximations of the 2nd-Moment Matrix Using Existing Techniques in Linear Regression. arXiv:1507.00056 , 2015 . O. Sheffet. Private Approximations of the 2nd-Moment Matrix Using Existing Techniques in Linear Regression. arXiv:1507.00056, 2015."},{"key":"e_1_3_2_1_43_1","volume-title":"Stochastic Gradient Descent with Differentially Private Updates","author":"Song S.","year":"2013","unstructured":"S. Song , K. Chaudhuri , and A. D. Sarwate . Stochastic Gradient Descent with Differentially Private Updates . In GlobalSIP. IEEE , 2013 . S. Song, K. Chaudhuri, and A. D. Sarwate. Stochastic Gradient Descent with Differentially Private Updates. In GlobalSIP. IEEE, 2013."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.5555\/2969442.2969577"},{"key":"e_1_3_2_1_45_1","volume-title":"Private Empirical Risk Minimization Beyond the Worst Case: The Effect of the Constraint Set Geometry. arXiv:1411.5417","author":"Talwar K.","year":"2015","unstructured":"K. Talwar , A. Thakurta , and L. Zhang . Private Empirical Risk Minimization Beyond the Worst Case: The Effect of the Constraint Set Geometry. arXiv:1411.5417 ,, 2015 . K. Talwar, A. Thakurta, and L. Zhang. Private Empirical Risk Minimization Beyond the Worst Case: The Effect of the Constraint Set Geometry. arXiv:1411.5417,, 2015."},{"key":"e_1_3_2_1_46_1","volume-title":"COLT","author":"Thakurta A. G.","year":"2013","unstructured":"A. G. Thakurta and A. Smith . Differentially Private Feature Selection via Stability Arguments, and the Robustness of the Lasso . In COLT , 2013 . A. G. Thakurta and A. Smith. Differentially Private Feature Selection via Stability Arguments, and the Robustness of the Lasso. In COLT, 2013."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.5555\/2999792.2999917"},{"key":"e_1_3_2_1_48_1","series-title":"Series B (Methodological)","volume-title":"Regression Shrinkage and Selection via the Lasso. Journal of the Royal Statistical Society","author":"Tibshirani R.","year":"1996","unstructured":"R. Tibshirani . Regression Shrinkage and Selection via the Lasso. Journal of the Royal Statistical Society . Series B (Methodological) , 1996 . R. Tibshirani. Regression Shrinkage and Selection via the Lasso. Journal of the Royal Statistical Society. Series B (Methodological), 1996."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2745754.2745755"},{"key":"e_1_3_2_1_50_1","volume-title":"arXiv:1410.2470","author":"Upadhyay J.","year":"2014","unstructured":"J. Upadhyay . Randomness Efficient Fast-Johnson-Lindenstrauss Transform with Applications in Differential Privacy and Compressed Sensing . arXiv:1410.2470 , 2014 . J. Upadhyay. Randomness Efficient Fast-Johnson-Lindenstrauss Transform with Applications in Differential Privacy and Compressed Sensing. arXiv:1410.2470, 2014."},{"key":"e_1_3_2_1_51_1","volume-title":"The Nature of Statistical Learning Theory","author":"Vapnik V.","year":"2013","unstructured":"V. Vapnik . The Nature of Statistical Learning Theory . Springer Science & Business Media , 2013 . V. Vapnik. The Nature of Statistical Learning Theory. Springer Science & Business Media, 2013."},{"key":"e_1_3_2_1_52_1","volume-title":"Estimation in High Dimensions: A Geometric Perspective. arXiv:1405.5103","author":"Vershynin R.","year":"2014","unstructured":"R. Vershynin . Estimation in High Dimensions: A Geometric Perspective. arXiv:1405.5103 , 2014 . R. Vershynin. Estimation in High Dimensions: A Geometric Perspective. arXiv:1405.5103, 2014."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.5555\/2997046.2997169"},{"volume-title":"https:\/\/www.wolframalpha.com\/examples\/EquationSolving.html","year":"2016","key":"e_1_3_2_1_54_1","unstructured":"WolframAlpha. https:\/\/www.wolframalpha.com\/examples\/EquationSolving.html , 2016 . WolframAlpha. https:\/\/www.wolframalpha.com\/examples\/EquationSolving.html, 2016."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1561\/0400000060"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.5555\/1700967.1701079"}],"event":{"name":"SIGMOD\/PODS'17: International Conference on Management of Data","sponsor":["SIGMOD ACM Special Interest Group on Management of Data"],"location":"Chicago Illinois USA","acronym":"SIGMOD\/PODS'17"},"container-title":["Proceedings of the 36th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3034786.3034795","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3034786.3034795","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:50:05Z","timestamp":1750218605000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3034786.3034795"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5,9]]},"references-count":56,"alternative-id":["10.1145\/3034786.3034795","10.1145\/3034786"],"URL":"https:\/\/doi.org\/10.1145\/3034786.3034795","relation":{},"subject":[],"published":{"date-parts":[[2017,5,9]]},"assertion":[{"value":"2017-05-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}