{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T03:20:25Z","timestamp":1774495225702,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,7,19]],"date-time":"2018-07-19T00:00:00Z","timestamp":1531958400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["CNS-1702760"],"award-info":[{"award-number":["CNS-1702760"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["CNS-1228669"],"award-info":[{"award-number":["CNS-1228669"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,7,19]]},"DOI":"10.1145\/3219819.3220076","type":"proceedings-article","created":{"date-parts":[[2018,7,19]],"date-time":"2018-07-19T13:05:12Z","timestamp":1532005512000},"page":"1656-1665","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":92,"title":["Concentrated Differentially Private Gradient Descent with Adaptive per-Iteration Privacy Budget"],"prefix":"10.1145","author":[{"given":"Jaewoo","family":"Lee","sequence":"first","affiliation":[{"name":"University of Georgia, Athens, GA, USA"}]},{"given":"Daniel","family":"Kifer","sequence":"additional","affiliation":[{"name":"The Pennsylvania State University, University Park, PA, USA"}]}],"member":"320","published-online":{"date-parts":[[2018,7,19]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2014.56"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-013-5404-1"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53641-4_24"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1961189.1961199"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/1953048.2021036"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/11761679_29"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_14"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1561\/0400000042"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2010.12"},{"key":"e_1_3_2_2_11_1","volume-title":"Conference on Learning Theory. 24--1.","author":"Jain Prateek","year":"2012"},{"key":"e_1_3_2_2_12_1","unstructured":"Daniel Kifer Adam Smith and Abhradeep Thakurta . 2012. Private convex empirical risk minimization and high-dimensional regression Conference on Learning Theory. 25--1.  Daniel Kifer Adam Smith and Abhradeep Thakurta . 2012. Private convex empirical risk minimization and high-dimensional regression Conference on Learning Theory. 25--1."},{"key":"e_1_3_2_2_13_1","unstructured":"M. Lichman . 2013. UCI Machine Learning Repository. deftempurl%http:\/\/archive.ics.uci.edu\/ml tempurl  M. Lichman . 2013. UCI Machine Learning Repository. deftempurl%http:\/\/archive.ics.uci.edu\/ml tempurl"},{"key":"e_1_3_2_2_14_1","volume-title":"Updating quasi-Newton matrices with limited storage. Mathematics of computation","author":"Jorge Nocedal","year":"1980"},{"key":"e_1_3_2_2_15_1","volume-title":"Numerical Optimization (bibinfoedition","author":"Nocedal J.","edition":"2"},{"key":"e_1_3_2_2_16_1","volume-title":"A stochastic approximation method. The annals of mathematical statistics","author":"Robbins Herbert","year":"1951"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.29012\/jpc.v4i1.612"},{"key":"e_1_3_2_2_18_1","volume-title":"d.}. Integrated Public Use Microdata Series","author":"Ruggles Steven"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"crossref","unstructured":"S. Song K. Chaudhuri and A. D. Sarwate . 2013. Stochastic gradient descent with differentially private updates GlobalSIP.  S. Song K. Chaudhuri and A. D. Sarwate . 2013. Stochastic gradient descent with differentially private updates GlobalSIP.","DOI":"10.1109\/GlobalSIP.2013.6736861"},{"key":"e_1_3_2_2_20_1","volume-title":"Abhradeep Guha Thakurta, and Li Zhang","author":"Talwar Kunal","year":"2015"},{"key":"e_1_3_2_2_21_1","volume-title":"Differentially Private Empirical Risk Minimization Revisited: Faster and More General Advances in Neural Information Processing Systems 30. Curran Associates","author":"Wang Di"},{"key":"e_1_3_2_2_22_1","unstructured":"Yu-Xiang Wang Stephen Fienberg and Alex Smola . 2015. Privacy for free: Posterior sampling and stochastic gradient monte carlo International Conference on Machine Learning. 2493--2502.   Yu-Xiang Wang Stephen Fienberg and Alex Smola . 2015. Privacy for free: Posterior sampling and stochastic gradient monte carlo International Conference on Machine Learning. 2493--2502."},{"key":"e_1_3_2_2_23_1","volume-title":"Proceedings of the 23rd International Conference on Neural Information Processing Systems-Volume 2. Curran Associates Inc., 2451--2459","author":"Williams Oliver","year":"2010"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2463676.2465330"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/3172077.3172437"}],"event":{"name":"KDD '18: The 24th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","location":"London United Kingdom","acronym":"KDD '18","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"]},"container-title":["Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery &amp; Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3219819.3220076","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3219819.3220076","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3219819.3220076","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:07:29Z","timestamp":1750212449000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3219819.3220076"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7,19]]},"references-count":25,"alternative-id":["10.1145\/3219819.3220076","10.1145\/3219819"],"URL":"https:\/\/doi.org\/10.1145\/3219819.3220076","relation":{},"subject":[],"published":{"date-parts":[[2018,7,19]]},"assertion":[{"value":"2018-07-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}