{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,17]],"date-time":"2026-02-17T12:08:07Z","timestamp":1771330087585,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,10,15]],"date-time":"2018-10-15T00:00:00Z","timestamp":1539561600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"ERC Starting Grant 2015","award":["680358"],"award-info":[{"award-number":["680358"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,10,15]]},"DOI":"10.1145\/3243734.3243863","type":"proceedings-article","created":{"date-parts":[[2018,10,16]],"date-time":"2018-10-16T12:56:36Z","timestamp":1539694596000},"page":"508-524","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":44,"title":["DP-Finder"],"prefix":"10.1145","author":[{"given":"Benjamin","family":"Bichsel","sequence":"first","affiliation":[{"name":"ETH Zurich, Z\u00fcrich, Switzerland"}]},{"given":"Timon","family":"Gehr","sequence":"additional","affiliation":[{"name":"ETH Zurich, Z\u00fcrich, Switzerland"}]},{"given":"Dana","family":"Drachsler-Cohen","sequence":"additional","affiliation":[{"name":"ETH Zurich, Z\u00fcrich, Switzerland"}]},{"given":"Petar","family":"Tsankov","sequence":"additional","affiliation":[{"name":"ETH Zurich, Z\u00fcrich, Switzerland"}]},{"given":"Martin","family":"Vechev","sequence":"additional","affiliation":[{"name":"ETH Zurich, Z\u00fcrich, Switzerland"}]}],"member":"320","published-online":{"date-parts":[[2018,10,15]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Proc. Operating Systems Design and Implementation (OSDI). 265--283","author":"Abadi Martin","year":"2016","unstructured":"Martin Abadi , Paul Barham , Jianmin Chen , Zhifeng Chen , Andy Davis , Jeffrey Dean , Matthieu Devin , Sanjay Ghemawat , Geoffrey Irving , Michael Isard , Manjunath Kudlur , Josh Levenberg , Rajat Monga , Sherry Moore , Derek G. Murray , Benoit Steiner , Paul Tucker , Vijay Vasudevan , Pete Warden , Martin Wicke , Yuan Yu , and Xiaoqiang Zheng . 2016 . TensorFlow: A System for Large-scale Machine Learning . In Proc. Operating Systems Design and Implementation (OSDI). 265--283 . http:\/\/dl.acm.org\/citation.cfm?id=3026877.3026899 Martin Abadi, Paul Barham, Jianmin Chen, Zhifeng Chen, Andy Davis, Jeffrey Dean, Matthieu Devin, Sanjay Ghemawat, Geoffrey Irving, Michael Isard, Manjunath Kudlur, Josh Levenberg, Rajat Monga, Sherry Moore, Derek G. Murray, Benoit Steiner, Paul Tucker, Vijay Vasudevan, Pete Warden, Martin Wicke, Yuan Yu, and Xiaoqiang Zheng. 2016. TensorFlow: A System for Large-scale Machine Learning. In Proc. Operating Systems Design and Implementation (OSDI). 265--283. http:\/\/dl.acm.org\/citation.cfm?id=3026877.3026899"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3158146"},{"key":"e_1_3_2_2_4_1","volume-title":"International Conferences on Logic for Programming, Artificial Intelligence and Reasoning (LPAR). 19","author":"Barthe Gilles","year":"2017","unstructured":"Gilles Barthe , Thomas Espitau , Benjamin Gr\u00e9goire , Justin Hsu , and Pierre-Yves Strub . 2017 . Proving uniformity and independence by self-composition and coupling . In International Conferences on Logic for Programming, Artificial Intelligence and Reasoning (LPAR). 19 . https:\/\/hal.sorbonne-universite.fr\/hal-01541198 Gilles Barthe, Thomas Espitau, Benjamin Gr\u00e9goire, Justin Hsu, and Pierre-Yves Strub. 2017. Proving uniformity and independence by self-composition and coupling. In International Conferences on Logic for Programming, Artificial Intelligence and Reasoning (LPAR). 19. https:\/\/hal.sorbonne-universite.fr\/hal-01541198"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2014.36"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2893582.2893591"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132769"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065167.1065184"},{"key":"e_1_3_2_2_9_1","unstructured":"Y. Chen and A. Machanavajjhala. 2015. On the Privacy Properties of Variants on the Sparse Vector Technique. (2015). http:\/\/www.jstor.org\/stable\/166789  Y. Chen and A. Machanavajjhala. 2015. On the Privacy Properties of Variants on the Sparse Vector Technique. (2015). http:\/\/www.jstor.org\/stable\/166789"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36594-2_26"},{"key":"e_1_3_2_2_11_1","volume-title":"Int. Symposium on Computational Geometry (SoCG). 45:1--45:16","author":"Kattis Assimakis","year":"2017","unstructured":"Assimakis Kattis and Aleksandar Nikolov . 2017 . Lower Bounds for Differential Privacy from Gaussian Width . In Int. Symposium on Computational Geometry (SoCG). 45:1--45:16 . Assimakis Kattis and Aleksandar Nikolov. 2017. Lower Bounds for Differential Privacy from Gaussian Width. In Int. Symposium on Computational Geometry (SoCG). 45:1--45:16."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.14778\/3055330.3055331"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1559845.1559850"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250790.1250803"},{"key":"e_1_3_2_2_15_1","unstructured":"N. Papernot M. Abadi \u00da. Erlingsson I. Goodfellow and K. Talwar. 2016. Semi-supervised Knowledge Transfer for Deep Learning from Private Training Data. (2016). stat.ML\/1610.05755  N. Papernot M. Abadi \u00da. Erlingsson I. Goodfellow and K. Talwar. 2016. Semi-supervised Knowledge Transfer for Deep Learning from Private Training Data. (2016). stat.ML\/1610.05755"},{"key":"e_1_3_2_2_16_1","volume-title":"REAS: Combining Numerical Optimization with SAT Solving.","author":"Inala J. Priya","year":"2018","unstructured":"J. Priya Inala , S. Gao , S. Kong , and A. Solar-Lezama . 2018 . REAS: Combining Numerical Optimization with SAT Solving. (2018). cs.PL\/1802.04408 J. Priya Inala, S. Gao, S. Kong, and A. Solar-Lezama. 2018. REAS: Combining Numerical Optimization with SAT Solving. (2018). cs.PL\/1802.04408"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.14778\/2732296.2732300"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1863543.1863568"},{"key":"e_1_3_2_2_19_1","volume-title":"Proc. International Conference on Machine Learning, (ICML). 2950--2959","author":"Benjamin I.","unstructured":"Benjamin I. P. Rubinstein and Francesco Ald\u00e0. 2017. Pain-Free Random Differential Privacy with Sensitivity Sampling . In Proc. International Conference on Machine Learning, (ICML). 2950--2959 . Benjamin I. P. Rubinstein and Francesco Ald\u00e0. 2017. Pain-Free Random Differential Privacy with Sensitivity Sampling. In Proc. International Conference on Machine Learning, (ICML). 2950--2959."},{"key":"e_1_3_2_2_20_1","unstructured":"A. W. van der Vaart. 1998. Asymptotic Statistics.  A. W. van der Vaart. 1998. Asymptotic Statistics."},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3110254"}],"event":{"name":"CCS '18: 2018 ACM SIGSAC Conference on Computer and Communications Security","location":"Toronto Canada","acronym":"CCS '18","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3243734.3243863","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3243734.3243863","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:57:47Z","timestamp":1750208267000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3243734.3243863"}},"subtitle":["Finding Differential Privacy Violations by Sampling and Optimization"],"short-title":[],"issued":{"date-parts":[[2018,10,15]]},"references-count":21,"alternative-id":["10.1145\/3243734.3243863","10.1145\/3243734"],"URL":"https:\/\/doi.org\/10.1145\/3243734.3243863","relation":{},"subject":[],"published":{"date-parts":[[2018,10,15]]},"assertion":[{"value":"2018-10-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}