{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,6]],"date-time":"2026-05-06T15:20:03Z","timestamp":1778080803852,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,4,27]],"date-time":"2020-04-27T00:00:00Z","timestamp":1587945600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,4,27]]},"DOI":"10.1145\/3378679.3394533","type":"proceedings-article","created":{"date-parts":[[2020,5,19]],"date-time":"2020-05-19T10:09:32Z","timestamp":1589882972000},"page":"61-66","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":387,"title":["LDP-Fed"],"prefix":"10.1145","author":[{"given":"Stacey","family":"Truex","sequence":"first","affiliation":[{"name":"Georgia Institute of Technology"}]},{"given":"Ling","family":"Liu","sequence":"additional","affiliation":[{"name":"College of Computing, Georgia Institute of Technology"}]},{"given":"Ka-Ho","family":"Chow","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology"}]},{"given":"Mehmet Emre","family":"Gursoy","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology"}]},{"given":"Wenqi","family":"Wei","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology"}]}],"member":"320","published-online":{"date-parts":[[2020,5,13]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Tensorflow: A system for large-scale machine learning. In 12th ${$USENIX$}$ Symposium on Operating Systems Design and Implementation (${$OSDI$}$ 16). 265--283.","author":"Abadi Mart\u00edn","year":"2016","unstructured":"Mart\u00edn Abadi , Paul Barham , Jianmin Chen , Zhifeng Chen , Andy Davis , Jeffrey Dean , Matthieu Devin , Sanjay Ghemawat , Geoffrey Irving , Michael Isard , 2016 a. Tensorflow: A system for large-scale machine learning. In 12th ${$USENIX$}$ Symposium on Operating Systems Design and Implementation (${$OSDI$}$ 16). 265--283. Mart\u00edn Abadi, Paul Barham, Jianmin Chen, Zhifeng Chen, Andy Davis, Jeffrey Dean, Matthieu Devin, Sanjay Ghemawat, Geoffrey Irving, Michael Isard, et al. 2016a. Tensorflow: A system for large-scale machine learning. In 12th ${$USENIX$}$ Symposium on Operating Systems Design and Implementation (${$OSDI$}$ 16). 265--283."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"e_1_3_2_1_3_1","volume-title":"Health insurance portability and accountability act of","author":"Act Accountability","year":"1996","unstructured":"Accountability Act . 1996. Health insurance portability and accountability act of 1996 . Public law 104 (1996), 191. Accountability Act. 1996. Health insurance portability and accountability act of 1996. Public law 104 (1996), 191."},{"key":"e_1_3_2_1_4_1","volume-title":"Shiva Prasad Kasiviswanathan, and Kobbi Nissim","author":"Beimel Amos","year":"2014","unstructured":"Amos Beimel , Hai Brenner , Shiva Prasad Kasiviswanathan, and Kobbi Nissim . 2014 . Bounds on the sample complexity for private learning and private data release. Machine learning 94, 3 (2014), 401--437. Amos Beimel, Hai Brenner, Shiva Prasad Kasiviswanathan, and Kobbi Nissim. 2014. Bounds on the sample complexity for private learning and private data release. Machine learning 94, 3 (2014), 401--437."},{"key":"e_1_3_2_1_5_1","unstructured":"Keith Bonawitz Hubert Eichner Wolfgang Grieskamp Dzmitry Huba Alex Ingerman Vladimir Ivanov Chloe Kiddon Jakub Konecny Stefano Mazzocchi H Brendan McMahan etal 2019. Towards federated learning at scale: System design. arXiv preprint arXiv:1902.01046 (2019).  Keith Bonawitz Hubert Eichner Wolfgang Grieskamp Dzmitry Huba Alex Ingerman Vladimir Ivanov Chloe Kiddon Jakub Konecny Stefano Mazzocchi H Brendan McMahan et al. 2019. Towards federated learning at scale: System design. arXiv preprint arXiv:1902.01046 (2019)."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133982"},{"key":"e_1_3_2_1_7_1","first-page":"762","article-title":"Private Collaborative Neural Network Learning","volume":"2017","author":"Chase Melissa","year":"2017","unstructured":"Melissa Chase , Ran Gilad-Bachrach , Kim Laine , Kristin E Lauter , and Peter Rindal . 2017 . Private Collaborative Neural Network Learning . IACR Cryptology ePrint Archive 2017 (2017), 762 . Melissa Chase, Ran Gilad-Bachrach, Kim Laine, Kristin E Lauter, and Peter Rindal. 2017. Private Collaborative Neural Network Learning. IACR Cryptology ePrint Archive 2017 (2017), 762.","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_1_8_1","volume-title":"NIPS workshop.","author":"Collobert Ronan","year":"2011","unstructured":"Ronan Collobert , Koray Kavukcuoglu , and Cl\u00e9ment Farabet . 2011 . Torch7: A matlab-like environment for machine learning. In BigLearn , NIPS workshop. Ronan Collobert, Koray Kavukcuoglu, and Cl\u00e9ment Farabet. 2011. Torch7: A matlab-like environment for machine learning. In BigLearn, NIPS workshop."},{"key":"e_1_3_2_1_9_1","unstructured":"Bolin Ding Janardhan Kulkarni and Sergey Yekhanin. 2017. Collecting telemetry data privately. In Advances in Neural Information Processing Systems. 3571--3580.  Bolin Ding Janardhan Kulkarni and Sergey Yekhanin. 2017. Collecting telemetry data privately. In Advances in Neural Information Processing Systems . 3571--3580."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/11761679_29"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660348"},{"key":"e_1_3_2_1_12_1","volume-title":"Secure and utility-aware data collection with condensed local differential privacy","author":"Gursoy Mehmet Emre","year":"2019","unstructured":"Mehmet Emre Gursoy , Acar Tamersoy , Stacey Truex , Wenqi Wei , and Ling Liu . 2019. Secure and utility-aware data collection with condensed local differential privacy . IEEE Transactions on Dependable and Secure Computing ( 2019 ). Mehmet Emre Gursoy, Acar Tamersoy, Stacey Truex, Wenqi Wei, and Ling Liu. 2019. Secure and utility-aware data collection with condensed local differential privacy. IEEE Transactions on Dependable and Secure Computing (2019)."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-024X(199606)26:6<635::AID-SPE26>3.0.CO;2-P"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1137\/090756090"},{"key":"e_1_3_2_1_15_1","volume-title":"The California Consumer Privacy Act of","author":"Mathews KJ","year":"2018","unstructured":"KJ Mathews and CM Bowman . 2018. The California Consumer Privacy Act of 2018 . KJ Mathews and CM Bowman. 2018. The California Consumer Privacy Act of 2018."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00065"},{"key":"e_1_3_2_1_17_1","volume-title":"Scalable Private Learning with PATE. arXiv preprint arXiv:1802.08908","author":"Papernot Nicolas","year":"2018","unstructured":"Nicolas Papernot , Shuang Song , Ilya Mironov , Ananth Raghunathan , Kunal Talwar , and \u00dalfar Erlingsson . 2018. Scalable Private Learning with PATE. arXiv preprint arXiv:1802.08908 ( 2018 ). Nicolas Papernot, Shuang Song, Ilya Mironov, Ananth Raghunathan, Kunal Talwar, and \u00dalfar Erlingsson. 2018. Scalable Private Learning with PATE. arXiv preprint arXiv:1802.08908 (2018)."},{"key":"e_1_3_2_1_18_1","first-page":"1","article-title":"Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46","volume":"59","author":"Protection Regulation General Data","year":"2016","unstructured":"General Data Protection Regulation . 2016 . Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46 . Official Journal of the European Union (OJ) 59 , 1 - 88 (2016), 294. General Data Protection Regulation. 2016. Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46. Official Journal of the European Union (OJ) 59, 1-88 (2016), 294.","journal-title":"Official Journal of the European Union (OJ)"},{"key":"e_1_3_2_1_19_1","volume-title":"Proceedings of the 22nd ACM SIGSAC conference on computer and communications security. 1310--1321","author":"Shokri Reza","year":"2015","unstructured":"Reza Shokri and Vitaly Shmatikov . 2015 . Privacy-preserving deep learning . In Proceedings of the 22nd ACM SIGSAC conference on computer and communications security. 1310--1321 . Reza Shokri and Vitaly Shmatikov. 2015. Privacy-preserving deep learning. In Proceedings of the 22nd ACM SIGSAC conference on computer and communications security. 1310--1321."},{"key":"e_1_3_2_1_20_1","volume-title":"Privacy risks of explaining machine learning models. arXiv preprint arXiv:1907.00164","author":"Shokri Reza","year":"2019","unstructured":"Reza Shokri , Martin Strobel , and Yair Zick . 2019. Privacy risks of explaining machine learning models. arXiv preprint arXiv:1907.00164 ( 2019 ). Reza Shokri, Martin Strobel, and Yair Zick. 2019. Privacy risks of explaining machine learning models. arXiv preprint arXiv:1907.00164 (2019)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.41"},{"key":"e_1_3_2_1_22_1","first-page":"705","article-title":"Emoji frequency detection and deep link frequency","volume":"9","author":"Thakurta Abhradeep Guha","year":"2017","unstructured":"Abhradeep Guha Thakurta , Andrew H Vyrros , Umesh S Vaishampayan , Gaurav Kapoor , Julien Freudinger , Vipul Ved Prakash , Arnaud Legendre , and Steven Duplinsky . 2017 . Emoji frequency detection and deep link frequency . US Patent 9 , 705 ,908. Abhradeep Guha Thakurta, Andrew H Vyrros, Umesh S Vaishampayan, Gaurav Kapoor, Julien Freudinger, Vipul Ved Prakash, Arnaud Legendre, and Steven Duplinsky. 2017. Emoji frequency detection and deep link frequency. US Patent 9,705,908.","journal-title":"US Patent"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338501.3357370"},{"key":"e_1_3_2_1_24_1","volume-title":"Wenqi Wei, and Lei Yu.","author":"Truex Stacey","year":"2019","unstructured":"Stacey Truex , Ling Liu , Mehmet Emre Gursoy , Wenqi Wei, and Lei Yu. 2019 b. Effects of Differential Privacy and Data Skewness on Membership Inference Vulnerability . arXiv preprint arXiv:1911.09777 (2019). Stacey Truex, Ling Liu, Mehmet Emre Gursoy, Wenqi Wei, and Lei Yu. 2019b. Effects of Differential Privacy and Data Skewness on Membership Inference Vulnerability. arXiv preprint arXiv:1911.09777 (2019)."},{"key":"e_1_3_2_1_25_1","volume-title":"Lei Yu, and Wenqi Wei.","author":"Truex Stacey","year":"2019","unstructured":"Stacey Truex , Ling Liu , Mehmet Emre Gursoy , Lei Yu, and Wenqi Wei. 2019 c. Demystifying membership inference attacks in machine learning as a service. IEEE Transactions on Services Computing ( 2019). Stacey Truex, Ling Liu, Mehmet Emre Gursoy, Lei Yu, and Wenqi Wei. 2019c. Demystifying membership inference attacks in machine learning as a service. IEEE Transactions on Services Computing (2019)."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2019.00063"},{"key":"e_1_3_2_1_27_1","unstructured":"Han Xiao Kashif Rasul and Roland Vollgraf. 2017. Fashion-MNIST: a Novel Image Dataset for Benchmarking Machine Learning Algorithms. [arXiv]cs.LG\/cs.LG\/1708.07747  Han Xiao Kashif Rasul and Roland Vollgraf. 2017. Fashion-MNIST: a Novel Image Dataset for Benchmarking Machine Learning Algorithms . [arXiv]cs.LG\/cs.LG\/1708.07747"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/icc.2011.5962863"}],"event":{"name":"EuroSys '20: Fifteenth EuroSys Conference 2020","location":"Heraklion Greece","acronym":"EuroSys '20","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems"]},"container-title":["Proceedings of the Third ACM International Workshop on Edge Systems, Analytics and Networking"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3378679.3394533","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3378679.3394533","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:41:19Z","timestamp":1750200079000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3378679.3394533"}},"subtitle":["federated learning with local differential privacy"],"short-title":[],"issued":{"date-parts":[[2020,4,27]]},"references-count":28,"alternative-id":["10.1145\/3378679.3394533","10.1145\/3378679"],"URL":"https:\/\/doi.org\/10.1145\/3378679.3394533","relation":{},"subject":[],"published":{"date-parts":[[2020,4,27]]},"assertion":[{"value":"2020-05-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}