{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:35:25Z","timestamp":1750221325673,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":45,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,30]],"date-time":"2017-10-30T00:00:00Z","timestamp":1509321600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,10,30]]},"DOI":"10.1145\/3139550.3139556","type":"proceedings-article","created":{"date-parts":[[2017,10,31]],"date-time":"2017-10-31T12:31:37Z","timestamp":1509453097000},"page":"63-74","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Adaptive Statistical Learning with Bayesian Differential Privacy"],"prefix":"10.1145","author":[{"given":"Jun","family":"Zhao","sequence":"first","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA &amp; Nanyang Technological University, Singapore"}]}],"member":"320","published-online":{"date-parts":[[2017,10,30]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Apple Incorporated. 2016. What's New in iOS 10. (2016). h?ttps:\/\/developer.apple.com\/library\/prerelease\/content\/releasenotes\/General\/WhatsNewIniOS\/Articles\/iOS10.html  Apple Incorporated. 2016. What's New in iOS 10. (2016). h?ttps:\/\/developer.apple.com\/library\/prerelease\/content\/releasenotes\/General\/WhatsNewIniOS\/Articles\/iOS10.html"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772698"},{"key":"e_1_3_2_1_3_1","volume-title":"Typicality-based stability and privacy. arXiv:1604.03336","author":"Bassily Raef","year":"2016","unstructured":"Raef Bassily and Yoav Freund . 2016. Typicality-based stability and privacy. arXiv:1604.03336 ( 2016 ). Raef Bassily and Yoav Freund. 2016. Typicality-based stability and privacy. arXiv:1604.03336 (2016)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23328"},{"key":"e_1_3_2_1_5_1","volume-title":"International Conference on Machine Learning (ICML). 1006--1014","author":"Blum Avrim","year":"2015","unstructured":"Avrim Blum and Moritz Hardt . 2015 . The Ladder: A reliable leaderboard for machine learning competitions . In International Conference on Machine Learning (ICML). 1006--1014 . Avrim Blum and Moritz Hardt. 2015.The Ladder: A reliable leaderboard for machine learning competitions. In International Conference on Machine Learning (ICML). 1006--1014."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1002\/rsa.1009"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1162\/153244302760200704"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-013-0344-8"},{"key":"e_1_3_2_1_9_1","volume-title":"Alberto Ocello, and Nino Verde.","author":"Colantonio Alessandro","year":"2009","unstructured":"Alessandro Colantonio , Roberto Di Pietro , Alberto Ocello, and Nino Verde. 2009 . A probabilistic bound on the basic role mining problem and its applications. Emerging Challenges for Security, Privacy and Trust ( 2009), 376--386. Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello, and Nino Verde. 2009. A probabilistic bound on the basic role mining problem and its applications. Emerging Challenges for Security, Privacy and Trust (2009), 376--386."},{"key":"e_1_3_2_1_10_1","volume-title":"Adaptive learning with robust generalization guarantees. arXiv:1602.07726","author":"Cummings Rachel","year":"2016","unstructured":"Rachel Cummings , Katrina Ligett , Kobbi Nissim , Aaron Roth , and Zhiwei Wu. 2016. Adaptive learning with robust generalization guarantees. arXiv:1602.07726 ( 2016 ). Rachel Cummings, Katrina Ligett, Kobbi Nissim, Aaron Roth, and Zhiwei Wu. 2016. Adaptive learning with robust generalization guarantees. arXiv:1602.07726 (2016)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/11787006_1"},{"key":"e_1_3_2_1_12_1","volume-title":"Generalization in adaptive data analysis and holdout reuse. arXiv:1506.02629v2","author":"Dwork Cynthia","year":"2015","unstructured":"Cynthia Dwork , Vitaly Feldman , Moritz Hardt , Toni Pitassi , Omer Reingold , and Aaron Roth . 2015. Generalization in adaptive data analysis and holdout reuse. arXiv:1506.02629v2 ( 2015 ). https:\/\/arxiv.org\/pdf\/1506.02629v2.pdf. A short version appeared in Conference on Neural Information Processing Systems (NIPS) 2015. Cynthia Dwork, Vitaly Feldman, Moritz Hardt, Toni Pitassi, Omer Reingold, and Aaron Roth. 2015. Generalization in adaptive data analysis and holdout reuse. arXiv:1506.02629v2 (2015). https:\/\/arxiv.org\/pdf\/1506.02629v2.pdf. A short version appeared in Conference on Neural Information Processing Systems (NIPS) 2015."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2746539.2746580"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.aaa9375"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/11761679_29"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_14"},{"key":"e_1_3_2_1_17_1","volume-title":"The algorithmic foundations of differential privacy. Foundations and Trends in theoretical Computer Science (FnT-TCS) 9, 3-4","author":"Dwork Cynthia","year":"2014","unstructured":"Cynthia Dwork and Aaron Roth . 2014. The algorithmic foundations of differential privacy. Foundations and Trends in theoretical Computer Science (FnT-TCS) 9, 3-4 ( 2014 ), 211--407. Cynthia Dwork and Aaron Roth. 2014. The algorithmic foundations of differential privacy. Foundations and Trends in theoretical Computer Science (FnT-TCS) 9, 3-4 (2014), 211--407."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660348"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2014.55"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2588555.2588581"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516707"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2484838.2484846"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1989323.1989345"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2213556.2213571"},{"volume-title":"Probabilistic graphical models: Principles and techniques","author":"Koller Daphne","key":"e_1_3_2_1_25_1","unstructured":"Daphne Koller and Nir Friedman . 2009. Probabilistic graphical models: Principles and techniques . MIT Press . Daphne Koller and Nir Friedman. 2009. Probabilistic graphical models: Principles and techniques. MIT Press."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23279"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8057062"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2007.66"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10444-004-7634-z"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2016.2561281"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1038\/nature02341"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978409"},{"key":"e_1_3_2_1_33_1","volume-title":"differential privacy, and post-selection hypothesis testing. arXiv:1604.03924","author":"Rogers Ryan","year":"2016","unstructured":"Ryan Rogers , Aaron Roth , Adam Smith , and Om Thakkar . 2016. Max-information , differential privacy, and post-selection hypothesis testing. arXiv:1604.03924 ( 2016 ). Ryan Rogers, Aaron Roth, Adam Smith, and Om Thakkar. 2016. Max-information, differential privacy, and post-selection hypothesis testing. arXiv:1604.03924 (2016)."},{"key":"e_1_3_2_1_34_1","volume-title":"International Conference on Artificial Intelligence and Statistics (AISTATS).","author":"Russo Daniel","year":"2016","unstructured":"Daniel Russo and James Zou . 2016 . Controlling bias in adaptive data analysis using information theory . In International Conference on Artificial Intelligence and Statistics (AISTATS). Daniel Russo and James Zou. 2016. Controlling bias in adaptive data analysis using information theory. In International Conference on Artificial Intelligence and Statistics (AISTATS)."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.5555\/1756006.1953019"},{"key":"e_1_3_2_1_36_1","volume-title":"ACM Conference on Computer and Communications Security (CCS). 1310--1321","author":"Shokri Reza","year":"2015","unstructured":"Reza Shokri and Vitaly Shmatikov . 2015 . Privacy-preserving deep learning . In ACM Conference on Computer and Communications Security (CCS). 1310--1321 . Reza Shokri and Vitaly Shmatikov. 2015. Privacy-preserving deep learning. In ACM Conference on Computer and Communications Security (CCS). 1310--1321."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2017.8262823"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3035918.3064025"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813610"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2017.131"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813640"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2723372.2747643"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2882903.2882928"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"crossref","unstructured":"J. Zhao J. Zhang and H. Poor. 2017. Dependent differential privacy. (2017). Available online at htt?ps:\/\/sites.google.com\/site\/workofzhao\/DDP.pdf  J. Zhao J. Zhang and H. Poor. 2017. Dependent differential privacy. (2017). Available online at htt?ps:\/\/sites.google.com\/site\/workofzhao\/DDP.pdf","DOI":"10.1109\/GLOCOMW.2017.8269219"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2368363"}],"event":{"name":"CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Dallas Texas USA","acronym":"CCS '17"},"container-title":["Proceedings of the 2017 on Workshop on Privacy in the Electronic Society"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3139550.3139556","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3139550.3139556","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:14:01Z","timestamp":1750212841000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3139550.3139556"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10,30]]},"references-count":45,"alternative-id":["10.1145\/3139550.3139556","10.1145\/3139550"],"URL":"https:\/\/doi.org\/10.1145\/3139550.3139556","relation":{},"subject":[],"published":{"date-parts":[[2017,10,30]]},"assertion":[{"value":"2017-10-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}