{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T05:12:16Z","timestamp":1776057136842,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":104,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,3,1]],"date-time":"2021-03-01T00:00:00Z","timestamp":1614556800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,3,3]]},"DOI":"10.1145\/3442188.3445934","type":"proceedings-article","created":{"date-parts":[[2021,3,3]],"date-time":"2021-03-03T01:26:24Z","timestamp":1614734784000},"page":"723-734","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":35,"title":["Chasing Your Long Tails"],"prefix":"10.1145","author":[{"given":"Vinith M.","family":"Suriyakumar","sequence":"first","affiliation":[{"name":"University of Toronto, Vector Institute"}]},{"given":"Nicolas","family":"Papernot","sequence":"additional","affiliation":[{"name":"University of Toronto, Vector Institute"}]},{"given":"Anna","family":"Goldenberg","sequence":"additional","affiliation":[{"name":"University of Toronto, Vector Institute"}]},{"given":"Marzyeh","family":"Ghassemi","sequence":"additional","affiliation":[{"name":"University of Toronto, Vector Institute"}]}],"member":"320","published-online":{"date-parts":[[2021,3]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"[n.d.]. MIMIC. https:\/\/mimic.physionet.org\/ note = Accessed: 2020-09-30."},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"e_1_3_2_2_3_1","volume-title":"Health insurance portability and accountability act of","author":"Act Accountability","year":"1996","unstructured":"Accountability Act. 1996. Health insurance portability and accountability act of 1996. Public law 104 (1996), 191."},{"key":"e_1_3_2_2_4_1","volume-title":"Canada. Full text","author":"Act Privacy","year":"2000","unstructured":"Privacy Act. 2000. Personal Information Protection and Electronic Documents Act. Department of Justice, Canada. Full text available at http:\/\/laws. justice. gc. ca\/en\/P-8.6\/text. html (2000)."},{"key":"e_1_3_2_2_5_1","unstructured":"Eugene Bagdasaryan Omid Poursaeed and Vitaly Shmatikov. 2019. Differential privacy has disparate impact on model accuracy. In Advances in Neural Information Processing Systems. 15453--15462."},{"key":"e_1_3_2_2_6_1","volume-title":"Privacy-preserving distributed deep learning for clinical data. arXiv preprint arXiv:1812.01484","author":"Beaulieu-Jones Brett K","year":"2018","unstructured":"Brett K Beaulieu-Jones, William Yuan, Samuel G Finlayson, and Zhiwei Steven Wu. 2018. Privacy-preserving distributed deep learning for clinical data. arXiv preprint arXiv:1812.01484 (2018)."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/0029-7844(96)00135-4"},{"key":"e_1_3_2_2_8_1","volume-title":"Journal of Machine Learning Research","author":"Chaudhuri Kamalika","year":"2011","unstructured":"Kamalika Chaudhuri, Claire Monteleoni, and Anand D Sarwate. 2011. Differentially private empirical risk minimization. Journal of Machine Learning Research 12, Mar (2011), 1069--1109."},{"key":"e_1_3_2_2_9_1","unstructured":"Kamalika Chaudhuri and Staal A Vinterbo. 2013. A stability-based validation procedure for differentially private machine learning. In Advances in Neural Information Processing Systems. 2652--2660."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-018-24271-9"},{"key":"e_1_3_2_2_11_1","unstructured":"Irene Chen Fredrik D Johansson and David Sontag. 2018. Why is my classifier discriminatory?. In Advances in Neural Information Processing Systems. 3539--3550."},{"key":"e_1_3_2_2_12_1","unstructured":"Irene Y. Chen Emma Pierson Sherri Rose Shalmali Joshi Kadija Ferryman and Marzyeh Ghassemi. 2020. Ethical Machine Learning in Health Care. arXiv:2009.10576 [cs.CY]"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1001\/amajethics.2019.167"},{"key":"e_1_3_2_2_14_1","volume-title":"Zhiwei Steven Wu, and Mingyi Hong","author":"Chen Xiangyi","year":"2020","unstructured":"Xiangyi Chen, Zhiwei Steven Wu, and Mingyi Hong. 2020. Understanding Gradient Clipping in Private SGD: A Geometric Perspective. arXiv preprint arXiv:2006.15429 (2020)."},{"key":"e_1_3_2_2_15_1","volume-title":"Covid-19 image data collection: Prospective predictions are the future. arXiv preprint arXiv:2006.11988","author":"Cohen Joseph Paul","year":"2020","unstructured":"Joseph Paul Cohen, Paul Morrison, Lan Dao, Karsten Roth, Tim Q Duong, and Marzyeh Ghassemi. 2020. Covid-19 image data collection: Prospective predictions are the future. arXiv preprint arXiv:2006.11988 (2020)."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1080\/00401706.1980.10486199"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.2517-6161.1972.tb00899.x"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"crossref","unstructured":"Peter Croft Douglas G Altman Jonathan J Deeks Kate M Dunn Alastair D Hay Harry Hemingway Linda LeResche George Peat Pablo Perel Steffen E Petersen et al. 2015. The science of clinical practice: disease diagnosis or patient prognosis? Evidence about \"what is likely to happen\" should shape clinical practice. BMC medicine 13 1 (2015) 20.","DOI":"10.1186\/s12916-014-0265-4"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3314183.3323847"},{"key":"e_1_3_2_2_20_1","volume-title":"The potential for artificial intelligence in healthcare. Future healthcare journal 6, 2","author":"Davenport Thomas","year":"2019","unstructured":"Thomas Davenport and Ravi Kalakota. 2019. The potential for artificial intelligence in healthcare. Future healthcare journal 6, 2 (2019), 94."},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1093\/jamia\/ocx030"},{"key":"e_1_3_2_2_22_1","volume-title":"Theory of cryptography conference","author":"Dwork Cynthia","unstructured":"Cynthia Dwork, Frank McSherry, Kobbi Nissim, and Adam Smith. 2006. Calibrating noise to sensitivity in private data analysis. In Theory of cryptography conference. Springer, 265--284."},{"key":"e_1_3_2_2_23_1","first-page":"3","article-title":"The algorithmic foundations of differential privacy","volume":"9","author":"Dwork Cynthia","year":"2014","unstructured":"Cynthia Dwork, Aaron Roth, et al. 2014. The algorithmic foundations of differential privacy. Foundations and Trends in Theoretical Computer Science 9, 3-4 (2014), 211--407.","journal-title":"Foundations and Trends in Theoretical Computer Science"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"crossref","unstructured":"Cynthia Dwork Adam Smith Thomas Steinke and Jonathan Ullman. 2017. Exposed! a survey of attacks on private data. (2017).","DOI":"10.1146\/annurev-statistics-060116-054123"},{"key":"e_1_3_2_2_25_1","volume-title":"Conference on Fairness, Accountability and Transparency. 35--47","author":"Ekstrand Michael D","year":"2018","unstructured":"Michael D Ekstrand, Rezvan Joshaghani, and Hoda Mehrpouyan. 2018. Privacy for all: Ensuring fair and equitable privacy protections. In Conference on Fairness, Accountability and Transparency. 35--47."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1001\/jama.2019.5774"},{"key":"e_1_3_2_2_27_1","volume-title":"Neither Private Nor Fair: Impact of Data Imbalance on Utility and Fairness in Differential Privacy. arXiv preprint arXiv:2009.06389","author":"Farrand Tom","year":"2020","unstructured":"Tom Farrand, Fatemehsadat Mireshghallah, Sahib Singh, and Andrew Trask. 2020. Neither Private Nor Fair: Impact of Data Imbalance on Utility and Fairness in Differential Privacy. arXiv preprint arXiv:2009.06389 (2020)."},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3357713.3384290"},{"key":"e_1_3_2_2_29_1","volume-title":"Individual Privacy Accounting via a Renyi Filter. arXiv preprint arXiv:2008.11193","author":"Feldman Vitaly","year":"2020","unstructured":"Vitaly Feldman and Tijana Zrnic. 2020. Individual Privacy Accounting via a Renyi Filter. arXiv preprint arXiv:2008.11193 (2020)."},{"key":"e_1_3_2_2_30_1","volume-title":"Fairness in precision medicine","author":"Ferryman Kadija","year":"2018","unstructured":"Kadija Ferryman and Mikaela Pitcan. 2018. Fairness in precision medicine. Data & Society (2018)."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813677"},{"key":"e_1_3_2_2_32_1","volume-title":"Tight Analysis of Privacy and Utility Tradeoff in Approximate Differential Privacy. In International Conference on Artificial Intelligence and Statistics. 89--99","author":"Geng Quan","year":"2020","unstructured":"Quan Geng, Wei Ding, Ruiqi Guo, and Sanjiv Kumar. 2020. Tight Analysis of Privacy and Utility Tradeoff in Approximate Differential Privacy. In International Conference on Artificial Intelligence and Statistics. 89--99."},{"key":"e_1_3_2_2_33_1","volume-title":"Andrew L Beam, and Rajesh Ranganath","author":"Ghassemi Marzyeh","year":"2018","unstructured":"Marzyeh Ghassemi, Tristan Naumann, Peter Schulam, Andrew L Beam, and Rajesh Ranganath. 2018. Opportunities in machine learning for healthcare. arXiv preprint arXiv:1806.00388 (2018)."},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1800097115"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1913405117"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1001\/jama.2016.17216"},{"key":"e_1_3_2_2_37_1","volume-title":"Receiver operating characteristic (ROC) curve analysis for medical diagnostic test evaluation. Caspian journal of internal medicine 4, 2","author":"Hajian-Tilaki Karimollah","year":"2013","unstructured":"Karimollah Hajian-Tilaki. 2013. Receiver operating characteristic (ROC) curve analysis for medical diagnostic test evaluation. Caspian journal of internal medicine 4, 2 (2013), 627."},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1093\/jamia\/ocw011"},{"key":"e_1_3_2_2_39_1","unstructured":"Han-JD. 2019. Gated Recurrent Unit with a Decay mechanism for Multivariate Time Series with Missing Values. https:\/\/github.com\/Han-JD\/GRU-D"},{"key":"e_1_3_2_2_40_1","unstructured":"Moritz Hardt Eric Price and Nati Srebro. 2016. Equality of opportunity in supervised learning. In Advances in neural information processing systems. 3315--3323."},{"key":"e_1_3_2_2_41_1","volume-title":"Greg Ver Steeg, and Aram Galstyan","author":"Harutyunyan Hrayr","year":"2017","unstructured":"Hrayr Harutyunyan, Hrant Khachatrian, David C. Kale, Greg Ver Steeg, and Aram Galstyan. 2017. Multitask Learning and Benchmarking with Clinical Time Series Data. arXiv:1703.07771 [cs, stat] (March 2017). http:\/\/arxiv.org\/abs\/1703. 07771 arXiv:1703.07771."},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1162\/99608f92.353c6f99"},{"key":"e_1_3_2_2_43_1","volume-title":"Representation of the elderly, women, and minorities in heart failure clinical trials. Archives of internal medicine 162, 15","author":"Heiat Asefeh","year":"2002","unstructured":"Asefeh Heiat, Cary P Gross, and Harlan M Krumholz. 2002. Representation of the elderly, women, and minorities in heart failure clinical trials. Archives of internal medicine 162, 15 (2002)."},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.7554\/eLife.45183"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1510502113"},{"key":"e_1_3_2_2_46_1","volume-title":"Auditing Differentially Private Machine Learning: How Private is Private SGD? arXiv preprint arXiv:2006.07709","author":"Jagielski Matthew","year":"2020","unstructured":"Matthew Jagielski, Jonathan Ullman, and Alina Oprea. 2020. Auditing Differentially Private Machine Learning: How Private is Private SGD? arXiv preprint arXiv:2006.07709 (2020)."},{"key":"e_1_3_2_2_47_1","volume-title":"28th {USENIX} Security Symposium ({ USENIX} Security 19). 1895--1912.","author":"Jayaraman Bargav","unstructured":"Bargav Jayaraman and David Evans. 2019. Evaluating differentially private machine learning in practice. In 28th {USENIX} Security Symposium ({ USENIX} Security 19). 1895--1912."},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1038\/sdata.2016.35"},{"key":"e_1_3_2_2_49_1","volume-title":"Hide-and-Seek Privacy Challenge. arXiv preprint arXiv:2007.12087","author":"Jordon James","year":"2020","unstructured":"James Jordon, Daniel Jarrett, Jinsung Yoon, Tavian Barnes, Paul Elbers, Patrick Thoral, Ari Ercole, Cheng Zhang, Danielle Belgrave, and Mihaela van der Schaar. 2020. Hide-and-Seek Privacy Challenge. arXiv preprint arXiv:2007.12087 (2020)."},{"key":"e_1_3_2_2_50_1","volume-title":"A New Analysis of Differential Privacy's Generalization Guarantees. arXiv preprint arXiv:1909.03577","author":"Jung Christopher","year":"2019","unstructured":"Christopher Jung, Katrina Ligett, Seth Neel, Aaron Roth, Saeed Sharifi-Malvajerdi, and Moshe Shenfeld. 2019. A New Analysis of Differential Privacy's Generalization Guarantees. arXiv preprint arXiv:1909.03577 (2019)."},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2015.10.006"},{"key":"e_1_3_2_2_52_1","volume-title":"International Conference on Machine Learning. 2564--2572","author":"Kearns Michael","year":"2018","unstructured":"Michael Kearns, Seth Neel, Aaron Roth, and Zhiwei Steven Wu. 2018. Preventing fairness gerrymandering: Auditing and learning for subgroup fairness. In International Conference on Machine Learning. 2564--2572."},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3287560.3287592"},{"key":"e_1_3_2_2_54_1","volume-title":"Zhiwei Steven Wu, and Grigory Yaroslavtsev","author":"Kearns Michael","year":"2015","unstructured":"Michael Kearns, Aaron Roth, Zhiwei Steven Wu, and Grigory Yaroslavtsev. 2015. Privacy for the protected (only). arXiv preprint arXiv:1506.00242 (2015)."},{"key":"e_1_3_2_2_55_1","volume-title":"Key challenges for delivering clinical impact with artificial intelligence. BMC medicine 17, 1","author":"Kelly Christopher J","year":"2019","unstructured":"Christopher J Kelly, Alan Karthikesalingam, Mustafa Suleyman, Greg Corrado, and Dominic King. 2019. Key challenges for delivering clinical impact with artificial intelligence. BMC medicine 17, 1 (2019), 195."},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.7326\/0003-4819-153-8-201010190-00274"},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.5555\/3305381.3305576"},{"key":"e_1_3_2_2_58_1","unstructured":"Pang Wei W Koh Kai-Siang Ang Hubert Teo and Percy S Liang. 2019. On the accuracy of influence functions for measuring group effects. In Advances in Neural Information Processing Systems. 5255--5265."},{"key":"e_1_3_2_2_59_1","unstructured":"Yann LeCun Corinna Cortes and CJ Burges. 2010. MNIST handwritten digit database. (2010)."},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2007.367856"},{"key":"e_1_3_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313276.3316377"},{"key":"e_1_3_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.1053\/j.ajkd.2011.08.018"},{"key":"e_1_3_2_2_63_1","unstructured":"J Michael McGinnis Leigh Stuckhardt Robert Saunders Mark Smith et al. 2013. Best care at lower cost: the path to continuously learning health care in America. National Academies Press."},{"key":"e_1_3_2_2_64_1","doi-asserted-by":"publisher","DOI":"10.1001\/jamanetworkopen.2018.6040"},{"key":"e_1_3_2_2_65_1","volume-title":"IEEE Symposium on Research in Security and Privacy","author":"Narayanan A","year":"2008","unstructured":"A Narayanan and V Shmatikov. 2008. Robust de-anonymization of large sparse datasets [Netflix]. In IEEE Symposium on Research in Security and Privacy, Oakland, CA."},{"key":"e_1_3_2_2_66_1","volume-title":"Differentially private objective perturbation: Beyond smoothness and convexity. arXiv preprint arXiv:1909.01783","author":"Neel Seth","year":"2019","unstructured":"Seth Neel, Aaron Roth, Giuseppe Vietri, and Zhiwei Steven Wu. 2019. Differentially private objective perturbation: Beyond smoothness and convexity. arXiv preprint arXiv:1909.01783 (2019)."},{"key":"e_1_3_2_2_67_1","volume-title":"Willie Boag, Gabriela Berner, Tristan Naumann, Michael C Hughes, Anna Goldenberg, and Marzyeh Ghassemi.","author":"Nestor Bret","year":"2019","unstructured":"Bret Nestor, Matthew B A McDermott, Willie Boag, Gabriela Berner, Tristan Naumann, Michael C Hughes, Anna Goldenberg, and Marzyeh Ghassemi. 2019. Feature Robustness in Non-stationary Health Records: Caveats to Deployable Model Performance in Common Clinical Machine Learning Tasks."},{"key":"e_1_3_2_2_68_1","volume-title":"Hyejin Shin, and Junbum Shin.","author":"Nguy\u00ebn Th\u00f4ng T","year":"2016","unstructured":"Th\u00f4ng T Nguy\u00ebn, Xiaokui Xiao, Yin Yang, Siu Cheung Hui, Hyejin Shin, and Junbum Shin. 2016. Collecting and analyzing data from smart device users with local differential privacy. arXiv preprint arXiv:1606.05053 (2016)."},{"key":"e_1_3_2_2_69_1","volume-title":"On the generalization properties of differential privacy. CoRR, abs\/1504.05800","author":"Nissim Kobbi","year":"2015","unstructured":"Kobbi Nissim and Uri Stemmer. 2015. On the generalization properties of differential privacy. CoRR, abs\/1504.05800 (2015)."},{"key":"e_1_3_2_2_70_1","volume-title":"Dissecting racial bias in an algorithm used to manage the health of populations. Science 366, 6464","author":"Obermeyer Ziad","year":"2019","unstructured":"Ziad Obermeyer, Brian Powers, Christine Vogeli, and Sendhil Mullainathan. 2019. Dissecting racial bias in an algorithm used to manage the health of populations. Science 366, 6464 (2019), 447--453."},{"key":"e_1_3_2_2_71_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1475-6773.2005.00444.x"},{"key":"e_1_3_2_2_72_1","volume-title":"Black-white health disparities in the United States and","author":"Orsi Jennifer M","year":"2010","unstructured":"Jennifer M Orsi, Helen Margellos-Anast, and Steven Whitman. 2010. Black-white health disparities in the United States and Chicago: a 15-year progress analysis. American journal of public health 100, 2 (2010), 349--356."},{"key":"e_1_3_2_2_73_1","volume-title":"Semi-supervised Knowledge Transfer for Deep Learning from Private Training Data. (Oct","author":"Papernot Nicolas","year":"2016","unstructured":"Nicolas Papernot, Mart\u00edn Abadi, \u00dalfar Erlingsson, Ian Goodfellow, and Kunal Talwar. 2016. Semi-supervised Knowledge Transfer for Deep Learning from Private Training Data. (Oct. 2016). arXiv:1610.05755 [stat.ML]"},{"key":"e_1_3_2_2_74_1","unstructured":"Nicolas Papernot Steve Chien Shuang Song Abhradeep Thakurta and Ulfar Erlingsson. 2020. Making the Shoe Fit: Architectures Initializations and Tuning for Learning with Privacy. https:\/\/openreview.net\/forum?id=rJg851rYwH"},{"key":"e_1_3_2_2_75_1","article-title":"Scikit-learn: Machine Learning in Python","author":"Pedregosa Fabian","year":"2011","unstructured":"Fabian Pedregosa, Ga\u00ebl Varoquaux, Alexandre Gramfort, Vincent Michel, Bertrand Thirion, Olivier Grisel, Mathieu Blondel, Peter Prettenhofer, Ron Weiss, Vincent Dubourg, Jake Vanderplas, Alexandre Passos, David Cournapeau, Matthieu Brucher, Matthieu Perrot, and \u00c9douard Duchesnay. 2011. Scikit-learn: Machine Learning in Python. Journal of Machine Learning Research 12 (Oct. 2011), 2825--2830. http:\/\/jmlr.csail.mit.edu\/papers\/v12\/pedregosa11a.html","journal-title":"Journal of Machine Learning Research 12"},{"key":"e_1_3_2_2_76_1","volume-title":"Federated and Differentially Private Learning for Electronic Health Records. arXiv preprint arXiv:1911.05861","author":"Pfohl Stephen R","year":"2019","unstructured":"Stephen R Pfohl, Andrew M Dai, and Katherine Heller. 2019. Federated and Differentially Private Learning for Electronic Health Records. arXiv preprint arXiv:1911.05861 (2019)."},{"key":"e_1_3_2_2_77_1","volume-title":"An Empirical Characterization of Fair Machine Learning For Clinical Risk Prediction. arXiv preprint arXiv:2007.10306","author":"Pfohl Stephen R","year":"2020","unstructured":"Stephen R Pfohl, Agata Foryciarz, and Nigam H Shah. 2020. An Empirical Characterization of Fair Machine Learning For Clinical Risk Prediction. arXiv preprint arXiv:2007.10306 (2020)."},{"key":"e_1_3_2_2_78_1","unstructured":"Stephan Rabanser Stephan G\u00fcnnemann and Zachary Lipton. 2019. Failing loudly: an empirical study of methods for detecting dataset shift. In Advances in Neural Information Processing Systems. 1394--1406."},{"key":"e_1_3_2_2_79_1","doi-asserted-by":"publisher","DOI":"10.7326\/M18-1990"},{"key":"e_1_3_2_2_80_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41746-018-0029-1"},{"key":"e_1_3_2_2_81_1","volume-title":"Machine learning for prediction in electronic health data. JAMA network open 1, 4","author":"Rose Sherri","year":"2018","unstructured":"Sherri Rose. 2018. Machine learning for prediction in electronic health data. JAMA network open 1, 4 (2018), e181404-e181404."},{"key":"e_1_3_2_2_82_1","doi-asserted-by":"publisher","DOI":"10.1056\/NEJMc1908881"},{"key":"e_1_3_2_2_83_1","volume-title":"CheXclusion: Fairness gaps in deep chest X-ray classifiers. arXiv preprint arXiv:2003.00827","author":"Seyyed-Kalantari Laleh","year":"2020","unstructured":"Laleh Seyyed-Kalantari, Guanxiong Liu, Matthew McDermott, and Marzyeh Ghassemi. 2020. CheXclusion: Fairness gaps in deep chest X-ray classifiers. arXiv preprint arXiv:2003.00827 (2020)."},{"key":"e_1_3_2_2_84_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.41"},{"key":"e_1_3_2_2_85_1","volume-title":"Characterizing private clipped gradient descent on convex generalized linear problems. arXiv preprint arXiv:2006.06783","author":"Song Shuang","year":"2020","unstructured":"Shuang Song, Om Thakkar, and Abhradeep Thakurta. 2020. Characterizing private clipped gradient descent on convex generalized linear problems. arXiv preprint arXiv:2006.06783 (2020)."},{"key":"e_1_3_2_2_86_1","doi-asserted-by":"crossref","unstructured":"Stephen M Stigler. 1989. Francis Galton's account of the invention of correlation. Statist. Sci. (1989) 73--79.","DOI":"10.1214\/ss\/1177012580"},{"key":"e_1_3_2_2_87_1","doi-asserted-by":"publisher","DOI":"10.1186\/1745-6215-14-177"},{"key":"e_1_3_2_2_88_1","volume-title":"Preventing failures due to dataset shift: Learning predictive models that transport. arXiv preprint arXiv:1812.04597","author":"Subbaswamy Adarsh","year":"2018","unstructured":"Adarsh Subbaswamy, Peter Schulam, and Suchi Saria. 2018. Preventing failures due to dataset shift: Learning predictive models that transport. arXiv preprint arXiv:1812.04597 (2018)."},{"key":"e_1_3_2_2_89_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"e_1_3_2_2_90_1","first-page":"29","article-title":"Only you, your doctor, and many others may know","volume":"2015092903","author":"Sweeney Latanya","year":"2015","unstructured":"Latanya Sweeney. 2015. Only you, your doctor, and many others may know. Technology Science 2015092903, 9 (2015), 29.","journal-title":"Technology Science"},{"key":"e_1_3_2_2_91_1","volume-title":"Privacy loss in apple's implementation of differential privacy on macos 10.12. arXiv preprint arXiv:1709.02753","author":"Tang Jun","year":"2017","unstructured":"Jun Tang, Aleksandra Korolova, Xiaolong Bai, Xueqiang Wang, and Xiaofeng Wang. 2017. Privacy loss in apple's implementation of differential privacy on macos 10.12. arXiv preprint arXiv:1709.02753 (2017)."},{"key":"e_1_3_2_2_92_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41586-019-1390-1"},{"key":"e_1_3_2_2_93_1","volume-title":"High-performance medicine: the convergence of human and artificial intelligence. Nature medicine 25, 1","author":"Topol Eric J","year":"2019","unstructured":"Eric J Topol. 2019. High-performance medicine: the convergence of human and artificial intelligence. Nature medicine 25, 1 (2019), 44--56."},{"key":"e_1_3_2_2_94_1","doi-asserted-by":"publisher","DOI":"10.1136\/thx.2006.066837"},{"key":"e_1_3_2_2_95_1","volume-title":"Tutorials on the Foundations of Cryptography","author":"Vadhan Salil","unstructured":"Salil Vadhan. 2017. The complexity of differential privacy. In Tutorials on the Foundations of Cryptography. Springer, 347--450."},{"key":"e_1_3_2_2_96_1","volume-title":"Private Reinforcement Learning with PAC and Regret Guarantees. arXiv preprint arXiv:2009.09052","author":"Vietri Giuseppe","year":"2020","unstructured":"Giuseppe Vietri, Borja Balle, Akshay Krishnamurthy, and Zhiwei Steven Wu. 2020. Private Reinforcement Learning with PAC and Regret Guarantees. arXiv preprint arXiv:2009.09052 (2020)."},{"key":"e_1_3_2_2_97_1","unstructured":"Darshali A Vyas Leo G Eisenstein and David S Jones. 2020. Hidden in Plain Sight---Reconsidering the Use of Race Correction in Clinical Algorithms."},{"key":"e_1_3_2_2_98_1","volume-title":"MIMIC-Extract: A Data Extraction, Preprocessing, and Representation Pipeline for MIMIC-III. arXiv:1907.08322 [cs, stat] (July","author":"Wang Shirly","year":"2019","unstructured":"Shirly Wang, Matthew B. A. McDermott, Geeticka Chauhan, Michael C. Hughes, Tristan Naumann, and Marzyeh Ghassemi. 2019. MIMIC-Extract: A Data Extraction, Preprocessing, and Representation Pipeline for MIMIC-III. arXiv:1907.08322 [cs, stat] (July 2019). http:\/\/arxiv.org\/abs\/1907.08322 arXiv:1907.08322."},{"key":"e_1_3_2_2_99_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.369"},{"key":"e_1_3_2_2_100_1","volume-title":"Modeling the Biological Pathology Continuum with HSIC-regularized Wasserstein Auto-encoders. arXiv:1901.06618 [cs, stat] (Jan","author":"Wu Denny","year":"2019","unstructured":"Denny Wu, Hirofumi Kobayashi, Charles Ding, Lei Cheng, and Keisuke Goda Marzyeh Ghassemi. 2019. Modeling the Biological Pathology Continuum with HSIC-regularized Wasserstein Auto-encoders. arXiv:1901.06618 [cs, stat] (Jan. 2019). http:\/\/arxiv.org\/abs\/1901.06618 arXiv:1901.06618."},{"key":"e_1_3_2_2_101_1","doi-asserted-by":"publisher","DOI":"10.1145\/3035918.3064047"},{"key":"e_1_3_2_2_102_1","volume-title":"Fashion-mnist: a novel image dataset for benchmarking machine learning algorithms. arXiv preprint arXiv:1708.07747","author":"Xiao Han","year":"2017","unstructured":"Han Xiao, Kashif Rasul, and Roland Vollgraf. 2017. Fashion-mnist: a novel image dataset for benchmarking machine learning algorithms. arXiv preprint arXiv:1708.07747 (2017)."},{"key":"e_1_3_2_2_103_1","doi-asserted-by":"publisher","DOI":"10.1093\/jamia\/ocx111"},{"key":"e_1_3_2_2_104_1","volume-title":"Understanding deep learning requires rethinking generalization. arXiv preprint arXiv:1611.03530","author":"Zhang Chiyuan","year":"2016","unstructured":"Chiyuan Zhang, Samy Bengio, Moritz Hardt, Benjamin Recht, and Oriol Vinyals. 2016. Understanding deep learning requires rethinking generalization. arXiv preprint arXiv:1611.03530 (2016)."}],"event":{"name":"FAccT '21: 2021 ACM Conference on Fairness, Accountability, and Transparency","location":"Virtual Event Canada","acronym":"FAccT '21","sponsor":["ACM Association for Computing Machinery"]},"container-title":["Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3442188.3445934","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3442188.3445934","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:48:57Z","timestamp":1750193337000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3442188.3445934"}},"subtitle":["Differentially Private Prediction in Health Care Settings"],"short-title":[],"issued":{"date-parts":[[2021,3]]},"references-count":104,"alternative-id":["10.1145\/3442188.3445934","10.1145\/3442188"],"URL":"https:\/\/doi.org\/10.1145\/3442188.3445934","relation":{},"subject":[],"published":{"date-parts":[[2021,3]]},"assertion":[{"value":"2021-03-01","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}