{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:19:08Z","timestamp":1750220348585,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":50,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,7,21]],"date-time":"2021-07-21T00:00:00Z","timestamp":1626825600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100004332","name":"JPMorgan Chase and Company","doi-asserted-by":"publisher","award":["JPMorgan Chase Faculty Research Award"],"award-info":[{"award-number":["JPMorgan Chase Faculty Research Award"]}],"id":[{"id":"10.13039\/100004332","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012642","name":"Mozilla Foundation","doi-asserted-by":"publisher","award":["Mozilla Research Grant"],"award-info":[{"award-number":["Mozilla Research Grant"]}],"id":[{"id":"10.13039\/501100012642","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1850187 and CNS-1942772"],"award-info":[{"award-number":["CNS-1850187 and CNS-1942772"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,7,21]]},"DOI":"10.1145\/3461702.3462625","type":"proceedings-article","created":{"date-parts":[[2021,7,31]],"date-time":"2021-07-31T01:21:32Z","timestamp":1627694492000},"page":"1000-1009","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Differentially Private Normalizing Flows for Privacy-Preserving Density Estimation"],"prefix":"10.1145","author":[{"given":"Chris","family":"Waites","sequence":"first","affiliation":[{"name":"Stanford University, Stanford, CA, USA"}]},{"given":"Rachel","family":"Cummings","sequence":"additional","affiliation":[{"name":"Columbia University, New York, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,7,30]]},"reference":[{"volume-title":"Proceedings of the 2016 ACM Conference on Computer and Communications Security, CCS '16, 308--318","author":"Abadi","key":"e_1_3_2_2_1_1","unstructured":"Abadi _2016Abadi, M.; Chu , A. ; Goodfellow , I. ; McMahan , H. B. ; Mironov , I. ; Talwar , K. ; and Zhang , L . 2016. Deep learning with differential privacy . In Proceedings of the 2016 ACM Conference on Computer and Communications Security, CCS '16, 308--318 . Abadi_2016Abadi, M.; Chu, A.; Goodfellow, I.; McMahan, H. B.; Mironov, I.; Talwar, K.; and Zhang, L. 2016. Deep learning with differential privacy. In Proceedings of the 2016 ACM Conference on Computer and Communications Security, CCS '16, 308--318."},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1161\/CIRCOUTCOMES.118.005122"},{"key":"e_1_3_2_2_3_1","volume-title":"Using Noisy Binary Search for Differentially Private Anomaly Detection. In Proceedings of the 2nd International Symposium on Cyber Security Cryptography and Machine Learning (CSCML)","volume":"10879","author":"Bittner D.","unstructured":"inbook Bittner , D. ; Sarwate , A. D. ; and Wright , R . 2018 . Using Noisy Binary Search for Differentially Private Anomaly Detection. In Proceedings of the 2nd International Symposium on Cyber Security Cryptography and Machine Learning (CSCML) , volume 10879 , 20--37. inbookBittner, D.; Sarwate, A. D.; and Wright, R. 2018. Using Noisy Binary Search for Differentially Private Anomaly Detection. In Proceedings of the 2nd International Symposium on Cyber Security Cryptography and Machine Learning (CSCML), volume 10879, 20--37."},{"key":"e_1_3_2_2_4_1","unstructured":"jax2018githubBradbury J.; Frostig R.; Hawkins P.; Johnson M. J.; Leary C.; Maclaurin D.; and Wanderman-Milne S. 2018. JAX: composable transformations of Python  jax2018githubBradbury J.; Frostig R.; Hawkins P.; Johnson M. J.; Leary C.; Maclaurin D.; and Wanderman-Milne S. 2018. JAX: composable transformations of Python"},{"key":"e_1_3_2_2_5_1","unstructured":"NumPy programs. prefixhttp:\/\/github.com\/google\/jax.  NumPy programs. prefixhttp:\/\/github.com\/google\/jax."},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"crossref","unstructured":"bu2019deepBu Z.; Dong J.; Long Q.; and Su W. J. 2020. Deep Learning with Gaussian Differential Privacy. Harvard Data Science Review 2(3).  bu2019deepBu Z.; Dong J.; Long Q.; and Su W. J. 2020. Deep Learning with Gaussian Differential Privacy. Harvard Data Science Review 2(3).","DOI":"10.1162\/99608f92.cfc5dd25"},{"volume-title":"Proceedings of the 13th Conference on Theory of Cryptography, TCC '16, 635--658","author":"Bun","key":"e_1_3_2_2_7_1","unstructured":"DBLP:journals\/corr\/ Bun S16Bun, M.; and Steinke , T . 2016. Concentrated differential privacy: Simplifications, extensions, and lower bounds . In Proceedings of the 13th Conference on Theory of Cryptography, TCC '16, 635--658 . DBLP:journals\/corr\/BunS16Bun, M.; and Steinke, T. 2016. Concentrated differential privacy: Simplifications, extensions, and lower bounds. In Proceedings of the 13th Conference on Theory of Cryptography, TCC '16, 635--658."},{"key":"e_1_3_2_2_8_1","first-page":"2652","article-title":"_5014Chaudhuri, K.; and Vinterbo, S. A. 2013. A Stability-based Validation Procedure for Differentially Private Machine Learning","volume":"13","author":"NIPS","year":"2013","unstructured":"NIPS 2013 _5014Chaudhuri, K.; and Vinterbo, S. A. 2013. A Stability-based Validation Procedure for Differentially Private Machine Learning . In Advances in Neural Information Processing Systems 26, NIPS ' 13 , 2652 -- 2660 . NIPS2013_5014Chaudhuri, K.; and Vinterbo, S. A. 2013. A Stability-based Validation Procedure for Differentially Private Machine Learning. In Advances in Neural Information Processing Systems 26, NIPS '13, 2652--2660.","journal-title":"Advances in Neural Information Processing Systems 26, NIPS '"},{"volume-title":"Proceedings of the Conference on Uncertainty in Artificial Intelligence, UAI '05","author":"Chawla S.","key":"e_1_3_2_2_9_1","unstructured":"chawla2005histograms Chawla , S. ; Dwork , C. ; McSherry , F. ; and Talwar , K . 2005. On the Utility of Privacy-Preserving Histograms . In Proceedings of the Conference on Uncertainty in Artificial Intelligence, UAI '05 . chawla2005histogramsChawla, S.; Dwork, C.; McSherry, F.; and Talwar, K. 2005. On the Utility of Privacy-Preserving Histograms. In Proceedings of the Conference on Uncertainty in Artificial Intelligence, UAI '05."},{"key":"e_1_3_2_2_10_1","volume-title":"NICE: Non-linear Independent Components Estimation. ArXiv preprint 1410.8516.","author":"Dinh","year":"2014","unstructured":"Dinh 2014NICENIDinh, L.; Krueger , D. ; and Bengio , Y . 2014 . NICE: Non-linear Independent Components Estimation. ArXiv preprint 1410.8516. Dinh2014NICENIDinh, L.; Krueger, D.; and Bengio, Y. 2014. NICE: Non-linear Independent Components Estimation. ArXiv preprint 1410.8516."},{"volume-title":"Proceedings of the International Conference on Learning Representations, ICLR '17","author":"Dinh L.","key":"e_1_3_2_2_11_1","unstructured":"dinh2016density Dinh , L. ; Sohl-Dickstein , J. ; and Bengio , S . 2017. Density estimation using Real NVP . In Proceedings of the International Conference on Learning Representations, ICLR '17 . dinh2016densityDinh, L.; Sohl-Dickstein, J.; and Bengio, S. 2017. Density estimation using Real NVP. In Proceedings of the International Conference on Learning Representations, ICLR '17."},{"key":"e_1_3_2_2_12_1","unstructured":"DBLP:journals\/corr\/abs-1905-02383Dong J.; Roth A.; and Su W. J. 2019. Gaussian Differential Privacy. ArXiv preprint 1905.02383.  DBLP:journals\/corr\/abs-1905-02383Dong J.; Roth A.; and Su W. J. 2019. Gaussian Differential Privacy. ArXiv preprint 1905.02383."},{"key":"e_1_3_2_2_13_1","unstructured":"Dua:2019Dua D.; and Graff C. 2017. UCI Machine Learning Repository. prefixhttp:\/\/archive.ics.uci.edu\/ml.  Dua:2019Dua D.; and Graff C. 2017. UCI Machine Learning Repository. prefixhttp:\/\/archive.ics.uci.edu\/ml."},{"volume-title":"NeurIPS '19","author":"alDurkan C.","key":"e_1_3_2_2_14_1","unstructured":"durkan2019neur alDurkan , C. ; Bekasov , A. ; Murray , I. ; and Papamakarios , G . 2019. Neural Spline Flows. In Advances in Neural Information Processing Systems 32 , NeurIPS '19 . durkan2019neuralDurkan, C.; Bekasov, A.; Murray, I.; and Papamakarios, G. 2019. Neural Spline Flows. In Advances in Neural Information Processing Systems 32, NeurIPS '19."},{"key":"e_1_3_2_2_15_1","series-title":"Lecture Notes in Computer Science","volume-title":"Differential Privacy: A Survey of Results. In Theory and Applications of Models of Computation (TAMC)","author":"alDwork C.","year":"2008","unstructured":"dwork2008differenti alDwork , C. 2008 . Differential Privacy: A Survey of Results. In Theory and Applications of Models of Computation (TAMC) , volume 4978 of Lecture Notes in Computer Science , 1--19. Springer Verlag . dwork2008differentialDwork, C. 2008. Differential Privacy: A Survey of Results. In Theory and Applications of Models of Computation (TAMC), volume 4978 of Lecture Notes in Computer Science, 1--19. Springer Verlag."},{"volume-title":"Proceedings of the 41st ACM Symposium on Theory of Computing, STOC '09, 371--380","author":"Dwork C.","key":"e_1_3_2_2_16_1","unstructured":"DL09 Dwork , C. ; and Lei , J . 2009. Differential privacy and robust statistics . In Proceedings of the 41st ACM Symposium on Theory of Computing, STOC '09, 371--380 . DL09Dwork, C.; and Lei, J. 2009. Differential privacy and robust statistics. In Proceedings of the 41st ACM Symposium on Theory of Computing, STOC '09, 371--380."},{"volume-title":"Proceedings of the 3rd Conference on Theory of Cryptography, TCC '06","author":"Dwork C.","key":"e_1_3_2_2_17_1","unstructured":"DMNS06 Dwork , C. ; McSherry , F. ; Nissim , K. ; and Smith , A . 2006. Calibrating noise to sensitivity in private data analysis . In Proceedings of the 3rd Conference on Theory of Cryptography, TCC '06 , 265--284. DMNS06Dwork, C.; McSherry, F.; Nissim, K.; and Smith, A. 2006. Calibrating noise to sensitivity in private data analysis. In Proceedings of the 3rd Conference on Theory of Cryptography, TCC '06, 265--284."},{"volume-title":"Proceedings of the 42nd ACM Symposium on Theory of Computing, STOC '10, 715--724","author":"Dwork C.","key":"e_1_3_2_2_18_1","unstructured":"DNPR10 Dwork , C. ; Naor , M. ; Pitassi , T. ; and Rothblum , G. N . 2010. Differential privacy under continual observation . In Proceedings of the 42nd ACM Symposium on Theory of Computing, STOC '10, 715--724 . DNPR10Dwork, C.; Naor, M.; Pitassi, T.; and Rothblum, G. N. 2010. Differential privacy under continual observation. In Proceedings of the 42nd ACM Symposium on Theory of Computing, STOC '10, 715--724."},{"volume-title":"Proceedings of the 41st ACM Symposium on Theory of Computing, STOC '09, 381--390","author":"Dwork C.","key":"e_1_3_2_2_19_1","unstructured":"DNRRV09 Dwork , C. ; Naor , M. ; Reingold , O. ; Rothblum , G. N. ; and Vadhan , S. P . 2009. On the complexity of differentially private data release: Efficient algorithms and hardness results . In Proceedings of the 41st ACM Symposium on Theory of Computing, STOC '09, 381--390 . DNRRV09Dwork, C.; Naor, M.; Reingold, O.; Rothblum, G. N.; and Vadhan, S. P. 2009. On the complexity of differentially private data release: Efficient algorithms and hardness results. In Proceedings of the 41st ACM Symposium on Theory of Computing, STOC '09, 381--390."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"crossref","unstructured":"10\n   .1561\/0400000042Dwork C.; and Roth A. 2014. The Algorithmic Foundations of Differential Privacy. Foundations and Trends\u00ae in Theoretical Computer Science 9(3--4).  10.1561\/0400000042Dwork C.; and Roth A. 2014. The Algorithmic Foundations of Differential Privacy. Foundations and Trends\u00ae in Theoretical Computer Science 9(3--4).","DOI":"10.1561\/0400000042"},{"key":"e_1_3_2_2_21_1","unstructured":"fakoor2020tradeFakoor R.; Chaudhari P.; Mueller J.; and Smola A. J. 2020. TraDE: Transformers for Density Estimation. ArXiv preprint 2004.02441.  fakoor2020tradeFakoor R.; Chaudhari P.; Mueller J.; and Smola A. J. 2020. TraDE: Transformers for Density Estimation. ArXiv preprint 2004.02441."},{"volume-title":"Proceedings of the IEEE 13th International Conference on Data Mining Workshops, 833--840","author":"Fan L.","key":"e_1_3_2_2_22_1","unstructured":"6754007 Fan , L. ; and Xiong , L . 2013. Differentially Private Anomaly Detection with a Case Study on Epidemic Outbreak Detection . In Proceedings of the IEEE 13th International Conference on Data Mining Workshops, 833--840 . 6754007Fan, L.; and Xiong, L. 2013. Differentially Private Anomaly Detection with a Case Study on Epidemic Outbreak Detection. In Proceedings of the IEEE 13th International Conference on Data Mining Workshops, 833--840."},{"key":"e_1_3_2_2_23_1","series-title":"Proceedings of Machine Learning Research","volume-title":"MADE: Masked Autoencoder for Distribution Estimation. In Proceedings of the 32nd International Conference on Machine Learning","author":"Germain","year":"2015","unstructured":"DBLP:journals\/corr\/ Germain GML15Germain, M.; Gregor , K. ; Murray , I. ; and Larochelle , H . 2015 . MADE: Masked Autoencoder for Distribution Estimation. In Proceedings of the 32nd International Conference on Machine Learning , volume 37 of Proceedings of Machine Learning Research , 881--889. DBLP:journals\/corr\/GermainGML15Germain, M.; Gregor, K.; Murray, I.; and Larochelle, H. 2015. MADE: Masked Autoencoder for Distribution Estimation. In Proceedings of the 32nd International Conference on Machine Learning, volume 37 of Proceedings of Machine Learning Research, 881--889."},{"key":"e_1_3_2_2_24_1","unstructured":"tensorflowprivacyGoogle. 2018. TensorFlow Privacy. prefixhttps:\/\/github.com\/tensorflow\/privacy.  tensorflowprivacyGoogle. 2018. TensorFlow Privacy. prefixhttps:\/\/github.com\/tensorflow\/privacy."},{"volume-title":"Proceedings of International Conference on Learning Representations, ICLR '19","author":"Grathwohl W.","key":"e_1_3_2_2_25_1","unstructured":"DBLP:journals\/corr\/abs-1810-01367 Grathwohl , W. ; Chen , R. T. Q. ; Bettencourt , J. ; Sutskever , I. ; and Duvenaud , D . 2019. FFJORD: Free-form Continuous Dynamics for Scalable Reversible Generative Models . In Proceedings of International Conference on Learning Representations, ICLR '19 . DBLP:journals\/corr\/abs-1810-01367Grathwohl, W.; Chen, R. T. Q.; Bettencourt, J.; Sutskever, I.; and Duvenaud, D. 2019. FFJORD: Free-form Continuous Dynamics for Scalable Reversible Generative Models. In Proceedings of International Conference on Learning Representations, ICLR '19."},{"volume-title":"Proceedings of the 21st Annual ACM-SIAM Symposium on Discrete Algorithms, SODA '10, 1106--1125","author":"Gupta A.","key":"e_1_3_2_2_26_1","unstructured":"DBLP:journals\/corr\/abs-0903--4510 Gupta , A. ; Ligett , K. ; McSherry , F. ; Roth , A. ; and Talwar , K . 2010. Differentially Private Combinatorial Optimization . In Proceedings of the 21st Annual ACM-SIAM Symposium on Discrete Algorithms, SODA '10, 1106--1125 . DBLP:journals\/corr\/abs-0903--4510Gupta, A.; Ligett, K.; McSherry, F.; Roth, A.; and Talwar, K. 2010. Differentially Private Combinatorial Optimization. In Proceedings of the 21st Annual ACM-SIAM Symposium on Discrete Algorithms, SODA '10, 1106--1125."},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/2567709.2502603"},{"volume-title":"Proceedings of the 2015 IEEE International Conference on Computer Vision (ICCV), ICCV '15, 1026--1034","author":"He","key":"e_1_3_2_2_28_1","unstructured":"DBLP:journals\/corr\/ He ZR015He, K.; Zhang , X. ; Ren , S. ; and Sun , J . 2015. Delving Deep into Rectifiers: Surpassing Human-Level Performance on ImageNet Classification . In Proceedings of the 2015 IEEE International Conference on Computer Vision (ICCV), ICCV '15, 1026--1034 . DBLP:journals\/corr\/HeZR015He, K.; Zhang, X.; Ren, S.; and Sun, J. 2015. Delving Deep into Rectifiers: Surpassing Human-Level Performance on ImageNet Classification. In Proceedings of the 2015 IEEE International Conference on Computer Vision (ICCV), ICCV '15, 1026--1034."},{"key":"e_1_3_2_2_29_1","unstructured":"DBLP:journals\/corr\/abs-1804-00779\n      Huang C.-W.\n    ; \n      Krueger D.\n    ; \n      Lacoste A.\n    ; and \n      Courville A\n  . \n  2018\n  . Neural Autoregressive Flows. In Proceedings of the 35th International Conference on \n  Machine Learning volume \n  80\n   of \n  Proceedings of Machine Learning Research 2078--2087.  DBLP:journals\/corr\/abs-1804-00779Huang C.-W.; Krueger D.; Lacoste A.; and Courville A. 2018. Neural Autoregressive Flows. In Proceedings of the 35th International Conference on Machine Learning volume 80 of Proceedings of Machine Learning Research 2078--2087."},{"key":"e_1_3_2_2_30_1","volume-title":"Proceedings of the 32nd International Conference on International Conference on Machine Learning -","volume":"37","author":"Ioffe","unstructured":"DBLP:journals\/corr\/ Ioffe S15Ioffe, S.; and Szegedy , C . 2015. Batch Normalization: Accelerating Deep Network Training by Reducing Internal Covariate Shift . In Proceedings of the 32nd International Conference on International Conference on Machine Learning - Volume 37 , ICML '15, 448--456. DBLP:journals\/corr\/IoffeS15Ioffe, S.; and Szegedy, C. 2015. Batch Normalization: Accelerating Deep Network Training by Reducing Internal Covariate Shift. In Proceedings of the 32nd International Conference on International Conference on Machine Learning - Volume 37, ICML '15, 448--456."},{"key":"e_1_3_2_2_31_1","unstructured":"izmailov2019semisupervised\n      Izmailov P.\n    ; \n      Kirichenko P.\n    ; \n      Finzi M.\n    ; and \n      Wilson A. G\n  . \n  2020\n  . Semi-Supervised Learning with Normalizing Flows. In Proceedings of the 37th International Conference on \n  Machine Learning volume \n  119\n   of \n  Proceedings of Machine Learning Research 4615--4630.  izmailov2019semisupervisedIzmailov P.; Kirichenko P.; Finzi M.; and Wilson A. G. 2020. Semi-Supervised Learning with Normalizing Flows. In Proceedings of the 37th International Conference on Machine Learning volume 119 of Proceedings of Machine Learning Research 4615--4630."},{"volume-title":"NeurIPS '19","author":"Kamath G.","key":"e_1_3_2_2_32_1","unstructured":"dpgmmkamath Kamath , G. ; Sheffet , O. ; Singhal , V. ; and Ullman , J . 2019. Differentially Private Algorithms for Learning Mixtures of Separated Gaussians. In Advances in Neural Information Processing Systems 32 , NeurIPS '19 . dpgmmkamathKamath, G.; Sheffet, O.; Singhal, V.; and Ullman, J. 2019. Differentially Private Algorithms for Learning Mixtures of Separated Gaussians. In Advances in Neural Information Processing Systems 32, NeurIPS '19."},{"volume-title":"Proceedings of the 2015 International Conference on Learning Representations, ICLR '15.","author":"Kingma D.","key":"e_1_3_2_2_33_1","unstructured":"kingma2014adam Kingma , D. ; and Ba , J . 2015. Adam: A Method for Stochastic Optimization . In Proceedings of the 2015 International Conference on Learning Representations, ICLR '15. kingma2014adamKingma, D.; and Ba, J. 2015. Adam: A Method for Stochastic Optimization. In Proceedings of the 2015 International Conference on Learning Representations, ICLR '15."},{"volume-title":"NeurIPS '18","author":"Kingma D. P.","key":"e_1_3_2_2_34_1","unstructured":"kingma2018glow Kingma , D. P. ; and Dhariwal , P . 2018. Glow: Generative Flow with Invertible 1x1 Convolutions. In Advances in Neural Information Processing Systems 31 , NeurIPS '18 . kingma2018glowKingma, D. P.; and Dhariwal, P. 2018. Glow: Generative Flow with Invertible 1x1 Convolutions. In Advances in Neural Information Processing Systems 31, NeurIPS '18."},{"volume-title":"NIPS '16","author":"Kingma","key":"e_1_3_2_2_35_1","unstructured":"DBLP:journals\/corr\/ Kingma SW16Kingma, D. P.; Salimans , T. ; Jozefowicz , R. ; Chen , X. ; Sutskever , I. ; and Welling , M . 2016. Improved Variational Inference with Inverse Autoregressive Flow. In Advances in Neural Information Processing Systems 29 , NIPS '16 . DBLP:journals\/corr\/KingmaSW16Kingma, D. P.; Salimans, T.; Jozefowicz, R.; Chen, X.; Sutskever, I.; and Welling, M. 2016. Improved Variational Inference with Inverse Autoregressive Flow. In Advances in Neural Information Processing Systems 29, NIPS '16."},{"volume-title":"Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Computing, STOC '19, 298--309","author":"Liu J.","key":"e_1_3_2_2_36_1","unstructured":"DBLP:journals\/corr\/abs-1811-07971 Liu , J. ; and Talwar , K . 2019. Private Selection from Private Candidates . In Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Computing, STOC '19, 298--309 . DBLP:journals\/corr\/abs-1811-07971Liu, J.; and Talwar, K. 2019. Private Selection from Private Candidates. In Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Computing, STOC '19, 298--309."},{"key":"e_1_3_2_2_37_1","volume-title":"Mixture Models: Inference and Applications to Clustering","author":"Mclachlan G.","year":"1988","unstructured":"mclachlantext Mclachlan , G. ; and Basford , K . 1988 . Mixture Models: Inference and Applications to Clustering . Marcel Dekker . mclachlantextMclachlan, G.; and Basford, K. 1988. Mixture Models: Inference and Applications to Clustering. Marcel Dekker."},{"key":"e_1_3_2_2_38_1","unstructured":"mcmahan2018generalMcMahan H. B.; Andrew G.; Erlingsson U.; Chien S.; Mironov I.; Papernot N.; and Kairouz P. 2018. A General Approach to Adding Differential Privacy to Iterative Training Procedures. ArXiv preprint 1812.06210.  mcmahan2018generalMcMahan H. B.; Andrew G.; Erlingsson U.; Chien S.; Mironov I.; Papernot N.; and Kairouz P. 2018. A General Approach to Adding Differential Privacy to Iterative Training Procedures. ArXiv preprint 1812.06210."},{"volume-title":"Proceedings of the 48th Annual IEEE Symposium on Foundations of Computer Science, FOCS '07, 94--103","author":"McSherry F.","key":"e_1_3_2_2_39_1","unstructured":"MT07 McSherry , F. ; and Talwar , K . 2007. Mechanism Design via Differential Privacy . In Proceedings of the 48th Annual IEEE Symposium on Foundations of Computer Science, FOCS '07, 94--103 . MT07McSherry, F.; and Talwar, K. 2007. Mechanism Design via Differential Privacy. In Proceedings of the 48th Annual IEEE Symposium on Foundations of Computer Science, FOCS '07, 94--103."},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2017.11"},{"volume-title":"Proceedings of the 39th Annual ACM Symposium on Theory of Computing, STOC '07, 75--84","author":"Nissim K.","key":"e_1_3_2_2_41_1","unstructured":"10 .1145\/1250790.1250803 Nissim , K. ; Raskhodnikova , S. ; and Smith , A . 2007. Smooth Sensitivity and Sampling in Private Data Analysis . In Proceedings of the 39th Annual ACM Symposium on Theory of Computing, STOC '07, 75--84 . 10.1145\/1250790.1250803Nissim, K.; Raskhodnikova, S.; and Smith, A. 2007. Smooth Sensitivity and Sampling in Private Data Analysis. In Proceedings of the 39th Annual ACM Symposium on Theory of Computing, STOC '07, 75--84."},{"volume-title":"Proceedings of the 2015 European Conference on Machine Learning and Knowledge Discovery in Databases -","author":"Okada R.","key":"e_1_3_2_2_42_1","unstructured":"okada2015differentially Okada , R. ; Fukuchi , K. ; and Sakuma , J . 2015. Differentially Private Analysis of Outliers . In Proceedings of the 2015 European Conference on Machine Learning and Knowledge Discovery in Databases - Volume Part II , ECMLPKDD '15, 458--473. okada2015differentiallyOkada, R.; Fukuchi, K.; and Sakuma, J. 2015. Differentially Private Analysis of Outliers. In Proceedings of the 2015 European Conference on Machine Learning and Knowledge Discovery in Databases - Volume Part II, ECMLPKDD '15, 458--473."},{"key":"e_1_3_2_2_43_1","unstructured":"oliva2018transformation\n      Oliva J.\n    ; \n      Dubey A.\n    ; \n      Zaheer M.\n    ; \n      Poczos B.\n    ; \n      Salakhutdinov R.\n    ; \n      Xing E.\n    ; and \n      Schneider J\n  . \n  2018\n  . Transformation Autoregressive Networks. In Proceedings of the 35th International Conference on \n  Machine Learning volume \n  80\n   of \n  Proceedings of Machine Learning Research 3898--3907.  oliva2018transformationOliva J.; Dubey A.; Zaheer M.; Poczos B.; Salakhutdinov R.; Xing E.; and Schneider J. 2018. Transformation Autoregressive Networks. In Proceedings of the 35th International Conference on Machine Learning volume 80 of Proceedings of Machine Learning Research 3898--3907."},{"key":"e_1_3_2_2_44_1","volume-title":"Neural Density Estimation and Likelihood-free Inference. ArXiv preprint","author":"alPapamakarios G.","year":"1910","unstructured":"papamakarios2019neur alPapamakarios , G. 2019. Neural Density Estimation and Likelihood-free Inference. ArXiv preprint 1910 .13233. papamakarios2019neuralPapamakarios, G. 2019. Neural Density Estimation and Likelihood-free Inference. ArXiv preprint 1910.13233."},{"key":"e_1_3_2_2_45_1","first-page":"2338","article-title":"_6828Papamakarios, G.; Pavlakou, T.; and Murray, I. 2017. Masked Autoregressive Flow for Density Estimation","volume":"17","author":"NIPS","year":"2017","unstructured":"NIPS 2017 _6828Papamakarios, G.; Pavlakou, T.; and Murray, I. 2017. Masked Autoregressive Flow for Density Estimation . In Advances in Neural Information Processing Systems 30, NIPS ' 17 , 2338 -- 2347 . NIPS2017_6828Papamakarios, G.; Pavlakou, T.; and Murray, I. 2017. Masked Autoregressive Flow for Density Estimation. In Advances in Neural Information Processing Systems 30, NIPS '17, 2338--2347.","journal-title":"Advances in Neural Information Processing Systems 30, NIPS '"},{"key":"e_1_3_2_2_46_1","unstructured":"pmlr-v54-park17c\n      Park M.\n    ; \n      Foulds J.\n    ; \n      Choudhary K.\n    ; and \n      Welling M\n  . \n  2017\n  . DP-EM: \n  Differentially Private\n   Expectation Maximization. In Proceedings of the 20th International Conference on \n  Artificial Intelligence and Statistics volume \n  54\n   of \n  Proceedings of Machine Learning Research 896--904.  pmlr-v54-park17cPark M.; Foulds J.; Choudhary K.; and Welling M. 2017. DP-EM: Differentially Private Expectation Maximization. In Proceedings of the 20th International Conference on Artificial Intelligence and Statistics volume 54 of Proceedings of Machine Learning Research 896--904."},{"volume-title":"NIPS '16","author":"Salimans","key":"e_1_3_2_2_47_1","unstructured":"DBLP:journals\/corr\/ Salimans K16Salimans, T.; and Kingma , D. P . 2016. Weight Normalization: A Simple Reparameterization to Accelerate Training of Deep Neural Networks. In Advances in Neural Information Processing Systems 29 , NIPS '16 . DBLP:journals\/corr\/SalimansK16Salimans, T.; and Kingma, D. P. 2016. Weight Normalization: A Simple Reparameterization to Accelerate Training of Deep Neural Networks. In Advances in Neural Information Processing Systems 29, NIPS '16."},{"key":"e_1_3_2_2_48_1","first-page":"95","article-title":"AROSurendra, H. S.; and Mohan, H. S. 2017. A Review Of Synthetic Data Generation Methods For Privacy Preserving Data Publishing","volume":"6","author":"Surendra","year":"2017","unstructured":"Surendra 2017 AROSurendra, H. S.; and Mohan, H. S. 2017. A Review Of Synthetic Data Generation Methods For Privacy Preserving Data Publishing . International Journal of Scientific & Technology Research 6 : 95 -- 101 . Surendra2017AROSurendra, H. S.; and Mohan, H. S. 2017. A Review Of Synthetic Data Generation Methods For Privacy Preserving Data Publishing. International Journal of Scientific & Technology Research 6: 95--101.","journal-title":"International Journal of Scientific & Technology Research"},{"volume-title":"Proceedings of the 22nd International Conference on Artificial Intelligence and Statistics, AISTATS '19, 1226--1235","author":"Wang Y.-X.","key":"e_1_3_2_2_49_1","unstructured":"DBLP:journals\/corr\/abs-1808-00087 Wang , Y.-X. ; Balle , B. ; and Kasiviswanathan , S . 2019. Subsampled R\u00e9nyi Differential Privacy and Analytical Moments Accountant . In Proceedings of the 22nd International Conference on Artificial Intelligence and Statistics, AISTATS '19, 1226--1235 . DBLP:journals\/corr\/abs-1808-00087Wang, Y.-X.; Balle, B.; and Kasiviswanathan, S. 2019. Subsampled R\u00e9nyi Differential Privacy and Analytical Moments Accountant. In Proceedings of the 22nd International Conference on Artificial Intelligence and Statistics, AISTATS '19, 1226--1235."},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/IWQoS.2016.7590445"}],"event":{"name":"AIES '21: AAAI\/ACM Conference on AI, Ethics, and Society","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","AAAI"],"location":"Virtual Event USA","acronym":"AIES '21"},"container-title":["Proceedings of the 2021 AAAI\/ACM Conference on AI, Ethics, and Society"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3461702.3462625","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3461702.3462625","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3461702.3462625","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:17:06Z","timestamp":1750191426000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3461702.3462625"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,21]]},"references-count":50,"alternative-id":["10.1145\/3461702.3462625","10.1145\/3461702"],"URL":"https:\/\/doi.org\/10.1145\/3461702.3462625","relation":{},"subject":[],"published":{"date-parts":[[2021,7,21]]},"assertion":[{"value":"2021-07-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}