{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:25:09Z","timestamp":1750220709745,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":45,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,3,16]],"date-time":"2020-03-16T00:00:00Z","timestamp":1584316800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,3,16]]},"DOI":"10.1145\/3374664.3375733","type":"proceedings-article","created":{"date-parts":[[2020,3,13]],"date-time":"2020-03-13T17:06:53Z","timestamp":1584119213000},"page":"319-328","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["R\u00e9nyi Differentially Private ADMM for Non-Smooth Regularized Optimization"],"prefix":"10.1145","author":[{"given":"Chen","family":"Chen","sequence":"first","affiliation":[{"name":"University of Georgia, Athens, GA, USA"}]},{"given":"Jaewoo","family":"Lee","sequence":"additional","affiliation":[{"name":"University of Georgia, Athens, GA, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,3,16]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"e_1_3_2_1_2_1","volume-title":"Auxiliary image regularization for deep cnns with noisy labels. arXiv preprint arXiv:1511.07069","author":"Azadi Samaneh","year":"2015","unstructured":"Samaneh Azadi, Jiashi Feng, Stefanie Jegelka, and Trevor Darrell. 2015. Auxiliary image regularization for deep cnns with noisy labels. arXiv preprint arXiv:1511.07069 (2015)."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2014.56"},{"key":"e_1_3_2_1_4_1","volume-title":"Parallel Coordinate Descent Newton Method for Efficient $ L_1 $-Regularized Loss Minimization","author":"Bian Yatao An","year":"2019","unstructured":"Yatao An Bian, Xiong Li, Yuncai Liu, and Ming-Hsuan Yang. 2019. Parallel Coordinate Descent Newton Method for Efficient $ L_1 $-Regularized Loss Minimization. IEEE transactions on neural networks and learning systems (2019)."},{"key":"e_1_3_2_1_5_1","volume-title":"et almbox","author":"Boyd Stephen","year":"2011","unstructured":"Stephen Boyd, Neal Parikh, Eric Chu, Borja Peleato, Jonathan Eckstein, et almbox. 2011. Distributed optimization and statistical learning via the alternating direction method of multipliers. Foundations and Trends\u00ae in Machine learning , Vol. 3, 1 (2011), 1--122."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53641-4_24"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCI.2016.2629286"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1961189.1961199"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/1953048.2021036"},{"key":"e_1_3_2_1_10_1","volume-title":"Renyi Differentially Private ERM for Smooth Objectives. In The 22nd International Conference on Artificial Intelligence and Statistics. 2037--2046","author":"Chen Chen","year":"2019","unstructured":"Chen Chen, Jaewoo Lee, and Dan Kifer. 2019. Renyi Differentially Private ERM for Smooth Objectives. In The 22nd International Conference on Artificial Intelligence and Statistics. 2037--2046."},{"volume-title":"Fixed-point algorithms for inverse problems in science and engineering","author":"Combettes Patrick L","key":"e_1_3_2_1_11_1","unstructured":"Patrick L Combettes and Jean-Christophe Pesquet. 2011. Proximal splitting methods in signal processing. In Fixed-point algorithms for inverse problems in science and engineering. Springer, 185--212."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2014.7040017"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/1577069.1755882"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/11761679_29"},{"volume-title":"Theory of cryptography conference","author":"Dwork Cynthia","key":"e_1_3_2_1_15_1","unstructured":"Cynthia Dwork, Frank McSherry, Kobbi Nissim, and Adam Smith. 2006 b. Calibrating noise to sensitivity in private data analysis. In Theory of cryptography conference . Springer, 265--284."},{"key":"e_1_3_2_1_16_1","volume-title":"Applications of Lagrangian-based alternating direction methods and connections to split Bregman. CAM report","author":"Esser Ernie","year":"2009","unstructured":"Ernie Esser. 2009. Applications of Lagrangian-based alternating direction methods and connections to split Bregman. CAM report , Vol. 9 (2009), 31."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1198\/016214501753382273"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/0898-1221(76)90003-1"},{"key":"e_1_3_2_1_19_1","volume-title":"Proceedings of the Human Language Technology Conference of the North American Chapter of the Association for Computational Linguistics: HLT-NAACL","author":"Goodman Joshua","year":"2004","unstructured":"Joshua Goodman. 2004. Exponential priors for maximum entropy models. In Proceedings of the Human Language Technology Conference of the North American Chapter of the Association for Computational Linguistics: HLT-NAACL 2004. 305--312."},{"key":"e_1_3_2_1_20_1","volume-title":"DP-ADMM: ADMM-based distributed learning with differential privacy","author":"Huang Zonghao","year":"2019","unstructured":"Zonghao Huang, Rui Hu, Yuanxiong Guo, Eric Chan-Tin, and Yanmin Gong. 2019. DP-ADMM: ADMM-based distributed learning with differential privacy. IEEE Transactions on Information Forensics and Security (2019)."},{"key":"e_1_3_2_1_21_1","volume-title":"Conference on Learning Theory. 25--1.","author":"Kifer Daniel","year":"2012","unstructured":"Daniel Kifer, Adam Smith, and Abhradeep Thakurta. 2012. Private convex empirical risk minimization and high-dimensional regression. In Conference on Learning Theory. 25--1."},{"key":"e_1_3_2_1_22_1","volume-title":"Learning rate adaptation for differentially private stochastic gradient descent. arXiv preprint arXiv:1809.03832","author":"Koskela Antti","year":"2018","unstructured":"Antti Koskela and Antti Honkela. 2018. Learning rate adaptation for differentially private stochastic gradient descent. arXiv preprint arXiv:1809.03832 (2018)."},{"key":"e_1_3_2_1_23_1","first-page":"401","article-title":"Efficient l 1 regularized logistic regression","volume":"6","author":"Lee Su-In","year":"2006","unstructured":"Su-In Lee, Honglak Lee, Pieter Abbeel, and Andrew Y Ng. 2006. Efficient l 1 regularized logistic regression. In AAAI, Vol. 6. 401--408.","journal-title":"AAAI"},{"key":"e_1_3_2_1_24_1","volume-title":"Blessing of dimensionality: Recovering mixture data via dictionary pursuit","author":"Liu Guangcan","year":"2016","unstructured":"Guangcan Liu, Qingshan Liu, and Ping Li. 2016. Blessing of dimensionality: Recovering mixture data via dictionary pursuit. IEEE transactions on pattern analysis and machine intelligence , Vol. 39, 1 (2016), 47--60."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2017.11"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1015330.1015435"},{"key":"e_1_3_2_1_27_1","volume-title":"International Conference on Machine Learning. 80--88","author":"Ouyang Hua","year":"2013","unstructured":"Hua Ouyang, Niao He, Long Tran, and Alexander Gray. 2013. Stochastic alternating direction method of multipliers. In International Conference on Machine Learning. 80--88."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-9868.2007.00607.x"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1198\/016214508000000337"},{"key":"e_1_3_2_1_30_1","volume-title":"Integrated public use microdata series: Version 6.0 [dataset]","author":"Ruggles Steven","year":"2015","unstructured":"Steven Ruggles, Katie Genadek, Ronald Goeken, Josiah Grover, and Matthew Sobek. 2015. Integrated public use microdata series: Version 6.0 [dataset]. Minneapolis: University of Minnesota , Vol. 23 (2015), 56."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/164810"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.2517-6161.1996.tb02080.x"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1214\/11-AOS878"},{"key":"e_1_3_2_1_34_1","unstructured":"Di Wang Minwei Ye and Jinhui Xu. 2017. Differentially Private Empirical Risk Minimization Revisited: Faster and More General. In Advances in Neural Information Processing Systems. 2722--2731."},{"key":"e_1_3_2_1_35_1","volume-title":"Differential Privacy for Sparse Classification Learning. arXiv preprint arXiv:1908.00780","author":"Wang Puyu","year":"2019","unstructured":"Puyu Wang and Hai Zhang. 2019. Differential Privacy for Sparse Classification Learning. arXiv preprint arXiv:1908.00780 (2019)."},{"key":"e_1_3_2_1_36_1","volume-title":"arXiv preprint arXiv:1808.00087","author":"Wang Yu-Xiang","year":"2018","unstructured":"Yu-Xiang Wang, Borja Balle, and Shiva Kasiviswanathan. 2018. Subsampled R$backslash$'enyi Differential Privacy and Analytical Moments Accountant. arXiv preprint arXiv:1808.00087 (2018)."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3035918.3064047"},{"key":"e_1_3_2_1_38_1","volume-title":"Linearized augmented Lagrangian and alternating direction methods for nuclear norm minimization. Mathematics of computation","author":"Yang Junfeng","year":"2013","unstructured":"Junfeng Yang and Xiaoming Yuan. 2013. Linearized augmented Lagrangian and alternating direction methods for nuclear norm minimization. Mathematics of computation , Vol. 82, 281 (2013), 301--329."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1214\/09-AOS729"},{"key":"e_1_3_2_1_40_1","volume-title":"Efficient private ERM for smooth objectives. arXiv preprint arXiv:1703.09947","author":"Zhang Jiaqi","year":"2017","unstructured":"Jiaqi Zhang, Kai Zheng, Wenlong Mou, and Liwei Wang. 2017. Efficient private ERM for smooth objectives. arXiv preprint arXiv:1703.09947 (2017)."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2607691"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2607691"},{"key":"e_1_3_2_1_43_1","volume-title":"Mohammad Mahdi Khalili, and Mingyan Liu","author":"Zhang Xueru","year":"2018","unstructured":"Xueru Zhang, Mohammad Mahdi Khalili, and Mingyan Liu. 2018a. Improving the privacy and accuracy of ADMM-based distributed algorithms. arXiv preprint arXiv:1806.02246 (2018)."},{"key":"e_1_3_2_1_44_1","volume-title":"International conference on machine learning . 5857--5866","author":"Zhang Xiao","year":"2018","unstructured":"Xiao Zhang, Lingxiao Wang, Yaodong Yu, and Quanquan Gu. 2018b. A primal-dual analysis of global optimality in nonconvex low-rank matrix recovery. In International conference on machine learning . 5857--5866."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1198\/016214506000000735"}],"event":{"name":"CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"New Orleans LA USA","acronym":"CODASPY '20"},"container-title":["Proceedings of the Tenth ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3374664.3375733","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3374664.3375733","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:33:08Z","timestamp":1750199588000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3374664.3375733"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3,16]]},"references-count":45,"alternative-id":["10.1145\/3374664.3375733","10.1145\/3374664"],"URL":"https:\/\/doi.org\/10.1145\/3374664.3375733","relation":{},"subject":[],"published":{"date-parts":[[2020,3,16]]},"assertion":[{"value":"2020-03-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}