{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T02:28:04Z","timestamp":1776824884835,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,4,14]],"date-time":"2022-04-14T00:00:00Z","timestamp":1649894400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Library Of Medicine of the National Institutes of Health","award":["R01LM013429"],"award-info":[{"award-number":["R01LM013429"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,4,14]]},"DOI":"10.1145\/3508398.3511519","type":"proceedings-article","created":{"date-parts":[[2022,4,16]],"date-time":"2022-04-16T04:13:31Z","timestamp":1650082411000},"page":"77-88","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["Genomic Data Sharing under Dependent Local Differential Privacy"],"prefix":"10.1145","author":[{"given":"Emre","family":"Yilmaz","sequence":"first","affiliation":[{"name":"University of Houston-Downtown, Houston, TX, USA"}]},{"given":"Tianxi","family":"Ji","sequence":"additional","affiliation":[{"name":"Case Western Reserve University, Cleveland, OH, USA"}]},{"given":"Erman","family":"Ayday","sequence":"additional","affiliation":[{"name":"Case Western Reserve University, Cleveland, OH, USA"}]},{"given":"Pan","family":"Li","sequence":"additional","affiliation":[{"name":"Case Western Reserve University, Cleveland, OH, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,4,15]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517840.2517843"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2021-0036"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046785"},{"key":"e_1_3_2_1_4_1","unstructured":"Raef Bassily Kobbi Nissim Uri Stemmer and Abhradeep Guha Thakurta. 2017. Practical locally private heavy hitters. In Advances in Neural Information Processing Systems. 2288--2296.  Raef Bassily Kobbi Nissim Uri Stemmer and Abhradeep Guha Thakurta. 2017. Practical locally private heavy hitters. In Advances in Neural Information Processing Systems. 2288--2296."},{"key":"e_1_3_2_1_5_1","volume-title":"Dynamic programming and optimal control","author":"Bertsekas Dimitri P","unstructured":"Dimitri P Bertsekas , Dimitri P Bertsekas , Dimitri P Bertsekas , and Dimitri P Bertsekas . 1995. Dynamic programming and optimal control . Vol. 1 . Athena scientific Belmont, MA. Dimitri P Bertsekas, Dimitri P Bertsekas, Dimitri P Bertsekas, and Dimitri P Bertsekas. 1995. Dynamic programming and optimal control . Vol. 1. Athena scientific Belmont, MA."},{"key":"e_1_3_2_1_6_1","volume-title":"Stochastic dynamic programming with factored representations. Artificial intelligence","author":"Boutilier Craig","year":"2000","unstructured":"Craig Boutilier , Richard Dearden , and Mois\u00e9s Goldszmidt . 2000. Stochastic dynamic programming with factored representations. Artificial intelligence , Vol. 121 , 1--2 ( 2000 ), 49--107. Craig Boutilier, Richard Dearden, and Mois\u00e9s Goldszmidt. 2000. Stochastic dynamic programming with factored representations. Artificial intelligence , Vol. 121, 1--2 (2000), 49--107."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243750"},{"key":"e_1_3_2_1_8_1","volume-title":"mbox","author":"International HapMap Consortium et al","year":"2003","unstructured":"International HapMap Consortium et al mbox . 2003 . The international HapMap project. Nature , Vol. 426 , 6968 (2003), 789. International HapMap Consortium et almbox. 2003. The international HapMap project. Nature , Vol. 426, 6968 (2003), 789."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3183713.3196906"},{"key":"e_1_3_2_1_10_1","unstructured":"Thomas Dean and Robert Givan. 1997. Model minimization in Markov decision processes. In AAAI\/IAAI. 106--111.  Thomas Dean and Robert Givan. 1997. Model minimization in Markov decision processes. In AAAI\/IAAI. 106--111."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCBB.2017.2709740"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2013.53"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/1791834.1791836"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611975482.151"},{"key":"e_1_3_2_1_15_1","volume-title":"Providing Input-Discriminative Protection for Local Differential Privacy. arXiv preprint arXiv:1911.01402","author":"Gu Xiaolan","year":"2019","unstructured":"Xiaolan Gu , Ming Li , Li Xiong , and Yang Cao . 2019. Providing Input-Discriminative Protection for Local Differential Privacy. arXiv preprint arXiv:1911.01402 ( 2019 ). Xiaolan Gu, Ming Li, Li Xiong, and Yang Cao. 2019. Providing Input-Discriminative Protection for Local Differential Privacy. arXiv preprint arXiv:1911.01402 (2019)."},{"key":"e_1_3_2_1_16_1","volume-title":"Proceedings of AAAI Spring Symposium on Search Techniques from Problem Solving under Uncertainty and Incomplete Information .","author":"Hansen Eric A","year":"1999","unstructured":"Eric A Hansen and Shlomo Zilberstein . 1999 . Solving Markov decision problems using heuristic search . In Proceedings of AAAI Spring Symposium on Search Techniques from Problem Solving under Uncertainty and Incomplete Information . Eric A Hansen and Shlomo Zilberstein. 1999. Solving Markov decision problems using heuristic search. In Proceedings of AAAI Spring Symposium on Search Techniques from Problem Solving under Uncertainty and Incomplete Information ."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516707"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2665943.2665945"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487575.2487687"},{"key":"e_1_3_2_1_20_1","first-page":"21","article-title":"Dependence Makes You Vulnberable: Differential Privacy Under Dependent Tuples","volume":"16","author":"Liu Changchang","year":"2016","unstructured":"Changchang Liu , Supriyo Chakraborty , and Prateek Mittal . 2016 . Dependence Makes You Vulnberable: Differential Privacy Under Dependent Tuples .. In NDSS , Vol. 16. 21 -- 24 . Changchang Liu, Supriyo Chakraborty, and Prateek Mittal. 2016. Dependence Makes You Vulnberable: Differential Privacy Under Dependent Tuples.. In NDSS , Vol. 16. 21--24.","journal-title":"NDSS"},{"key":"e_1_3_2_1_21_1","volume-title":"28th $$USENIX$$ Security Symposium ($$USENIX$$ Security 19) . 1877--1894.","author":"Murakami Takao","unstructured":"Takao Murakami and Yusuke Kawamoto . 2019. Utility-optimized local differential privacy mechanisms for distribution estimation . In 28th $$USENIX$$ Security Symposium ($$USENIX$$ Security 19) . 1877--1894. Takao Murakami and Yusuke Kawamoto. 2019. Utility-optimized local differential privacy mechanisms for distribution estimation. In 28th $$USENIX$$ Security Symposium ($$USENIX$$ Security 19) . 1877--1894."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2767007"},{"key":"e_1_3_2_1_23_1","volume-title":"The complexity of Markov decision processes. Mathematics of operations research","author":"Papadimitriou Christos H","year":"1987","unstructured":"Christos H Papadimitriou and John N Tsitsiklis . 1987. The complexity of Markov decision processes. Mathematics of operations research , Vol. 12 , 3 ( 1987 ), 441--450. Christos H Papadimitriou and John N Tsitsiklis. 1987. The complexity of Markov decision processes. Mathematics of operations research , Vol. 12, 3 (1987), 441--450."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ajhg.2015.09.010"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1038\/nrg2361"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3035918.3064025"},{"key":"e_1_3_2_1_27_1","volume-title":"Reinforcement learning: An introduction","author":"Sutton Richard S","unstructured":"Richard S Sutton and Andrew G Barto . 2018. Reinforcement learning: An introduction . MIT press . Richard S Sutton and Andrew G Barto. 2018. Reinforcement learning: An introduction .MIT press."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3020003"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653726"},{"key":"e_1_3_2_1_30_1","volume-title":"26th $$USENIX$$ Security Symposium ($$USENIX$$ Security 17). 729--745.","author":"Wang Tianhao","unstructured":"Tianhao Wang , Jeremiah Blocki , Ninghui Li , and Somesh Jha . 2017. Locally differentially private protocols for frequency estimation . In 26th $$USENIX$$ Security Symposium ($$USENIX$$ Security 17). 729--745. Tianhao Wang, Jeremiah Blocki, Ninghui Li, and Somesh Jha. 2017. Locally differentially private protocols for frequency estimation. In 26th $$USENIX$$ Security Symposium ($$USENIX$$ Security 17). 729--745."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00035"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1965.10480775"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411497.3420214"},{"key":"e_1_3_2_1_34_1","volume-title":"Genomic Data Sharing under Dependent Local Differential Privacy. arXiv preprint arXiv:2102.07357","author":"Yilmaz Emre","year":"2021","unstructured":"Emre Yilmaz , Tianxi Ji , Erman Ayday , and Pan Li. 2021. Genomic Data Sharing under Dependent Local Differential Privacy. arXiv preprint arXiv:2102.07357 ( 2021 ). Emre Yilmaz, Tianxi Ji, Erman Ayday, and Pan Li. 2021. Genomic Data Sharing under Dependent Local Differential Privacy. arXiv preprint arXiv:2102.07357 (2021)."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2014.01.008"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3074327"}],"event":{"name":"CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy","location":"Baltimore MD USA","acronym":"CODASPY '22","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the Twelfth ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3508398.3511519","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3508398.3511519","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:39Z","timestamp":1750188639000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3508398.3511519"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,14]]},"references-count":36,"alternative-id":["10.1145\/3508398.3511519","10.1145\/3508398"],"URL":"https:\/\/doi.org\/10.1145\/3508398.3511519","relation":{},"subject":[],"published":{"date-parts":[[2022,4,14]]},"assertion":[{"value":"2022-04-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}