{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T20:13:41Z","timestamp":1776284021755,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,5,31]],"date-time":"2020-05-31T00:00:00Z","timestamp":1590883200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100003246","name":"Nederlandse Organisatie voor Wetenschappelijk Onderzoek","doi-asserted-by":"publisher","award":["628.001.026"],"award-info":[{"award-number":["628.001.026"]}],"id":[{"id":"10.13039\/501100003246","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100014718","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1640374 and 1931443"],"award-info":[{"award-number":["1640374 and 1931443"]}],"id":[{"id":"10.13039\/100014718","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,6,11]]},"DOI":"10.1145\/3318464.3389700","type":"proceedings-article","created":{"date-parts":[[2020,5,29]],"date-time":"2020-05-29T17:12:33Z","timestamp":1590772353000},"page":"621-635","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":90,"title":["Estimating Numerical Distributions under Local Differential Privacy"],"prefix":"10.1145","author":[{"given":"Zitao","family":"Li","sequence":"first","affiliation":[{"name":"Purdue University, West Lafayette, IN, USA"}]},{"given":"Tianhao","family":"Wang","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, IN, USA"}]},{"given":"Milan","family":"Lopuha\u00e4-Zwakenberg","sequence":"additional","affiliation":[{"name":"Eindhoven University of Technology, Eindhoven, Netherlands"}]},{"given":"Ninghui","family":"Li","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, IN, USA"}]},{"given":"Boris","family":"\u0160koric","sequence":"additional","affiliation":[{"name":"Eindhoven University of Technology, Eindhoven, Netherlands"}]}],"member":"320","published-online":{"date-parts":[[2020,5,31]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Hadamard response: Estimating distributions privately, efficiently, and with little communication. arXiv preprint arXiv:1802.04705","author":"Acharya J.","year":"2018","unstructured":"J. Acharya , Z. Sun , and H. Zhang . Hadamard response: Estimating distributions privately, efficiently, and with little communication. arXiv preprint arXiv:1802.04705 , 2018 . J. Acharya, Z. Sun, and H. Zhang. Hadamard response: Estimating distributions privately, efficiently, and with little communication. arXiv preprint arXiv:1802.04705, 2018."},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-26951-7_22"},{"key":"e_1_3_2_2_3_1","volume-title":"AISTATS","author":"Bassily R.","year":"2019","unstructured":"R. Bassily . Linear queries estimation with local differential privacy . In AISTATS , 2019 . R. Bassily. Linear queries estimation with local differential privacy. In AISTATS, 2019."},{"key":"e_1_3_2_2_4_1","volume-title":"NIPS","author":"Bassily R.","year":"2017","unstructured":"R. Bassily , K. Nissim , U. Stemmer , and A. G. Thakurta . Practical locally private heavy hitters . In NIPS , 2017 . R. Bassily, K. Nissim, U. Stemmer, and A. G. Thakurta. Practical locally private heavy hitters. In NIPS, 2017."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2746539.2746632"},{"issue":"510","key":"e_1_3_2_2_6_1","first-page":"126","article-title":"A gentle tutorial of the em algorithm and its application to parameter estimation for gaussian mixture and hidden markov models","volume":"4","author":"Bilmes J. A.","year":"1998","unstructured":"J. A. Bilmes A gentle tutorial of the em algorithm and its application to parameter estimation for gaussian mixture and hidden markov models . International Computer Science Institute , 4 ( 510 ): 126 , 1998 . J. A. Bilmes et al. A gentle tutorial of the em algorithm and its application to parameter estimation for gaussian mixture and hidden markov models. International Computer Science Institute, 4(510):126, 1998.","journal-title":"International Computer Science Institute"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1561\/2200000016"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-17653-2_13"},{"key":"e_1_3_2_2_9_1","volume-title":"NIPS","author":"Ding B.","year":"2017","unstructured":"B. Ding , J. Kulkarni , and S. Yekhanin . Collecting telemetry data privately . In NIPS , 2017 . B. Ding, J. Kulkarni, and S. Yekhanin. Collecting telemetry data privately. In NIPS, 2017."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.2017.1389735"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_14"},{"key":"e_1_3_2_2_12_1","volume-title":"The algorithmic foundations of differential privacy. Foundations and Trends in Theoretical Computer Science, 9(3--4)","author":"Dwork C.","year":"2014","unstructured":"C. Dwork and A. Roth . The algorithmic foundations of differential privacy. Foundations and Trends in Theoretical Computer Science, 9(3--4) , 2014 . C. Dwork and A. Roth. The algorithmic foundations of differential privacy. Foundations and Trends in Theoretical Computer Science, 9(3--4), 2014."},{"key":"e_1_3_2_2_13_1","volume-title":"Amplification by shuffling: From local to central differential privacy via anonymity. arXiv preprint arXiv:1811.12469","author":"Feldman V.","year":"2018","unstructured":"\u00da. Erlingsson, V. Feldman , I. Mironov , A. Raghunathan , K. Talwar , and A. Thakurta . Amplification by shuffling: From local to central differential privacy via anonymity. arXiv preprint arXiv:1811.12469 , 2018 . \u00da. Erlingsson, V. Feldman, I. Mironov, A. Raghunathan, K. Talwar, and A. Thakurta. Amplification by shuffling: From local to central differential privacy via anonymity. arXiv preprint arXiv:1811.12469, 2018."},{"key":"e_1_3_2_2_14_1","volume-title":"CCS","author":"Pihur V.","year":"2014","unstructured":"\u00da. Erlingsson, V. Pihur , and A. Korolova . RAPPOR: randomized aggregatable privacy-preserving ordinal response . In CCS , 2014 . \u00da. Erlingsson, V. Pihur, and A. Korolova. RAPPOR: randomized aggregatable privacy-preserving ordinal response. In CCS, 2014."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1198\/jcgs.2011.10106"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2016-0015"},{"key":"e_1_3_2_2_17_1","volume-title":"Boosting the accuracy of differentially private histograms through consistency. PVLDB, 3(1)","author":"Hay M.","year":"2010","unstructured":"M. Hay , V. Rastogi , G. Miklau , and D. Suciu . Boosting the accuracy of differentially private histograms through consistency. PVLDB, 3(1) , 2010 . M. Hay, V. Rastogi, G. Miklau, and D. Suciu. Boosting the accuracy of differentially private histograms through consistency. PVLDB, 3(1), 2010."},{"key":"e_1_3_2_2_18_1","volume-title":"Smoothing of, and parameter estimation from, noisy biophysical recordings. PLoS computational biology, 5(5):e1000379","author":"Huys Q. J.","year":"2009","unstructured":"Q. J. Huys and L. Paninski . Smoothing of, and parameter estimation from, noisy biophysical recordings. PLoS computational biology, 5(5):e1000379 , 2009 . Q. J. Huys and L. Paninski. Smoothing of, and parameter estimation from, noisy biophysical recordings. PLoS computational biology, 5(5):e1000379, 2009."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737527"},{"key":"e_1_3_2_2_20_1","volume-title":"ICML","author":"Kairouz P.","year":"2016","unstructured":"P. Kairouz , K. Bonawitz , and D. Ramage . Discrete distribution estimation under local privacy . In ICML , 2016 . P. Kairouz, K. Bonawitz, and D. Ramage. Discrete distribution estimation under local privacy. In ICML, 2016."},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3299869.3300102"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2783366"},{"key":"e_1_3_2_2_23_1","volume-title":"ICML","author":"McKenna R.","year":"2019","unstructured":"R. McKenna , D. Sheldon , and G. Miklau . Graphical-model based estimation and inference for differential privacy . ICML , 2019 . R. McKenna, D. Sheldon, and G. Miklau. Graphical-model based estimation and inference for differential privacy. ICML, 2019."},{"key":"e_1_3_2_2_24_1","volume-title":"Some properties of adding a smoothing step to the em algorithm. Statistics & probability letters, 9(2):187--193","author":"Nychka D.","year":"1990","unstructured":"D. Nychka . Some properties of adding a smoothing step to the em algorithm. Statistics & probability letters, 9(2):187--193 , 1990 . D. Nychka. Some properties of adding a smoothing step to the em algorithm. Statistics & probability letters, 9(2):187--193, 1990."},{"key":"e_1_3_2_2_25_1","unstructured":"S. F. C. Office. Sf employee compensation. https:\/\/www.kaggle.com\/san-francisco\/sf-employee-compensation#employeecompensation.csv.  S. F. C. Office. Sf employee compensation. https:\/\/www.kaggle.com\/san-francisco\/sf-employee-compensation#employeecompensation.csv."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/72.701177"},{"key":"e_1_3_2_2_27_1","volume-title":"Understanding hierarchical methods for differentially private histograms. PVLDB, 6(14)","author":"Qardaji W. H.","year":"2013","unstructured":"W. H. Qardaji , W. Yang , and N. Li . Understanding hierarchical methods for differentially private histograms. PVLDB, 6(14) , 2013 . W. H. Qardaji,W. Yang, and N. Li. Understanding hierarchical methods for differentially private histograms. PVLDB, 6(14), 2013."},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2812146"},{"key":"e_1_3_2_2_29_1","volume-title":"Integrated public use microdata series: Version 9.0 [database]","author":"Ruggles S.","year":"2019","unstructured":"S. Ruggles , S. Flood , R. Goeken , J. Grover , E. Meyer , J. Pacas , and M. Sobek . Integrated public use microdata series: Version 9.0 [database] , 2019 . S. Ruggles, S. Flood, R. Goeken, J. Grover, E. Meyer, J. Pacas, and M. Sobek. Integrated public use microdata series: Version 9.0 [database], 2019."},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.2517-6161.1990.tb01788.x"},{"key":"e_1_3_2_2_31_1","volume-title":"Tlc trip record data. https:\/\/www1.nyc.gov\/site\/tlc\/about\/tlc-trip-record-data.page","author":"N. Taxi and L. Commission","year":"2018","unstructured":"N. Taxi and L. Commission . Tlc trip record data. https:\/\/www1.nyc.gov\/site\/tlc\/about\/tlc-trip-record-data.page , 2018 . N. Taxi and L. Commission. Tlc trip record data. https:\/\/www1.nyc.gov\/site\/tlc\/about\/tlc-trip-record-data.page, 2018."},{"key":"e_1_3_2_2_32_1","volume-title":"Learning with privacy at scale","author":"Team A. D. P.","year":"2017","unstructured":"A. D. P. Team . Learning with privacy at scale , 2017 . A. D. P. Team. Learning with privacy at scale, 2017."},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2018.00079"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8056977"},{"key":"e_1_3_2_2_35_1","volume-title":"USENIX Security","author":"Wang T.","year":"2017","unstructured":"T. Wang , J. Blocki , N. Li , and S. Jha . Locally differentially private protocols for frequency estimation . In USENIX Security , 2017 . T. Wang, J. Blocki, N. Li, and S. Jha. Locally differentially private protocols for frequency estimation. In USENIX Security, 2017."},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3299869.3319891"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00035"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24157"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1965.10480775"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2010.5447831"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2018.2809790"}],"event":{"name":"SIGMOD\/PODS '20: International Conference on Management of Data","location":"Portland OR USA","acronym":"SIGMOD\/PODS '20","sponsor":["SIGMOD ACM Special Interest Group on Management of Data"]},"container-title":["Proceedings of the 2020 ACM SIGMOD International Conference on Management of Data"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3318464.3389700","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3318464.3389700","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:38:44Z","timestamp":1750199924000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3318464.3389700"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,5,31]]},"references-count":41,"alternative-id":["10.1145\/3318464.3389700","10.1145\/3318464"],"URL":"https:\/\/doi.org\/10.1145\/3318464.3389700","relation":{},"subject":[],"published":{"date-parts":[[2020,5,31]]},"assertion":[{"value":"2020-05-31","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}