{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T17:36:22Z","timestamp":1770226582348,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":54,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,4,30]],"date-time":"2023-04-30T00:00:00Z","timestamp":1682812800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"CCF- AFSG Research Fund"},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2021YFB3100300"],"award-info":[{"award-number":["2021YFB3100300"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U20A20178 and 62072395"],"award-info":[{"award-number":["U20A20178 and 62072395"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,4,30]]},"DOI":"10.1145\/3543507.3583450","type":"proceedings-article","created":{"date-parts":[[2023,4,26]],"date-time":"2023-04-26T23:30:25Z","timestamp":1682551825000},"page":"2306-2317","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["Quantifying and Defending against Privacy Threats on Federated Knowledge Graph Embedding"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5780-6898","authenticated-orcid":false,"given":"Yuke","family":"Hu","sequence":"first","affiliation":[{"name":"Zhejiang University, China and HIC-ZJU, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7115-5593","authenticated-orcid":false,"given":"Wei","family":"Liang","sequence":"additional","affiliation":[{"name":"Zhejiang University, China and HIC-ZJU, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2005-6058","authenticated-orcid":false,"given":"Ruofan","family":"Wu","sequence":"additional","affiliation":[{"name":"Ant Group, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5181-1917","authenticated-orcid":false,"given":"Kai","family":"Xiao","sequence":"additional","affiliation":[{"name":"Ant Group, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6159-619X","authenticated-orcid":false,"given":"Weiqiang","family":"Wang","sequence":"additional","affiliation":[{"name":"Ant Group, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3722-4783","authenticated-orcid":false,"given":"Xiaochen","family":"Li","sequence":"additional","affiliation":[{"name":"Zhejiang University, China and HIC-ZJU, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2921-2827","authenticated-orcid":false,"given":"Jinfei","family":"Liu","sequence":"additional","affiliation":[{"name":"Zhejiang University, China and HIC-ZJU, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7872-6969","authenticated-orcid":false,"given":"Zhan","family":"Qin","sequence":"additional","affiliation":[{"name":"Zhejiang University, China and HIC-ZJU, China"}]}],"member":"320","published-online":{"date-parts":[[2023,4,30]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2016. GDPR: General Data Protection Regulation. (2016). https:\/\/eur-lex.europa.eu\/eli\/reg\/2016\/679\/oj"},{"key":"e_1_3_2_1_2_1","unstructured":"2018. CCPA: California Consumer Privacy Act. (2018). https:\/\/www.oag.ca.gov\/privacy\/ccpa"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1376616.1376746"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1067"},{"key":"e_1_3_2_1_6_1","unstructured":"Antoine Bordes Nicolas Usunier Alberto Garc\u00eda-Dur\u00e1n Jason Weston and Oksana Yakhnenko. 2013. Translating Embeddings for Modeling Multi-relational Data. In Advances in Neural Information Processing Systems Christopher J.\u00a0C. Burges L\u00e9on Bottou Zoubin Ghahramani and Kilian\u00a0Q. Weinberger (Eds.). 2787\u20132795."},{"key":"e_1_3_2_1_7_1","volume-title":"30th USENIX Security Symposium, USENIX Security 2021","author":"Carlini Nicholas","year":"2021","unstructured":"Nicholas Carlini, Florian Tram\u00e8r, Eric Wallace, Matthew Jagielski, Ariel Herbert-Voss, Katherine Lee, Adam Roberts, Tom\u00a0B. Brown, Dawn Song, \u00dalfar Erlingsson, Alina Oprea, and Colin Raffel. 2021. Extracting Training Data from Large Language Models. In 30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021, Michael Bailey and Rachel Greenstadt (Eds.). USENIX Association, 2633\u20132650."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/2898607.2898816"},{"key":"e_1_3_2_1_9_1","volume-title":"FedE: Embedding Knowledge Graphs in Federated Setting. In IJCKG\u201921: The 10th International Joint Conference on Knowledge Graphs","author":"Chen Mingyang","year":"2021","unstructured":"Mingyang Chen, Wen Zhang, Zonggang Yuan, Yantao Jia, and Huajun Chen. 2021. FedE: Embedding Knowledge Graphs in Federated Setting. In IJCKG\u201921: The 10th International Joint Conference on Knowledge Graphs, Virtual Event, Thailand, December 6 - 8, 2021. ACM, 80\u201388."},{"key":"e_1_3_2_1_10_1","volume-title":"Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems","author":"Durfee David","year":"2019","unstructured":"David Durfee and Ryan\u00a0M. Rogers. 2019. Practical Differentially Private Top-k Selection with Pay-what-you-get Composition. In Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019, NeurIPS 2019, December 8-14, 2019, Vancouver, BC, Canada, Hanna\u00a0M. Wallach, Hugo Larochelle, Alina Beygelzimer, Florence d\u2019Alch\u00e9-Buc, Emily\u00a0B. Fox, and Roman Garnett (Eds.). 3527\u20133537."},{"key":"e_1_3_2_1_11_1","volume-title":"33rd International Colloquium, ICALP 2006, Venice, Italy, July 10-14, 2006, Proceedings, Part II(Lecture Notes in Computer Science, Vol.\u00a04052)","author":"Dwork Cynthia","year":"2006","unstructured":"Cynthia Dwork. 2006. Differential Privacy. In Automata, Languages and Programming, 33rd International Colloquium, ICALP 2006, Venice, Italy, July 10-14, 2006, Proceedings, Part II(Lecture Notes in Computer Science, Vol.\u00a04052), Michele Bugliesi, Bart Preneel, Vladimiro Sassone, and Ingo Wegener (Eds.). Springer, 1\u201312."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536466"},{"key":"e_1_3_2_1_13_1","first-page":"3","article-title":"The Algorithmic Foundations of Differential Privacy","volume":"9","author":"Dwork Cynthia","year":"2014","unstructured":"Cynthia Dwork and Aaron Roth. 2014. The Algorithmic Foundations of Differential Privacy. Found. Trends Theor. Comput. Sci. 9, 3-4 (2014), 211\u2013407.","journal-title":"Found. Trends Theor. Comput. Sci."},{"key":"e_1_3_2_1_14_1","volume-title":"https:\/\/github.com\/pytorch\/opacus\/tree\/main\/opacus","year":"2022","unstructured":"facebook-github bot. 2022. Opacus. (2022). https:\/\/github.com\/pytorch\/opacus\/tree\/main\/opacus"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.14778\/3467861.3467876"},{"key":"e_1_3_2_1_16_1","volume-title":"Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020","author":"Geiping Jonas","year":"2020","unstructured":"Jonas Geiping, Hartmut Bauermeister, Hannah Dr\u00f6ge, and Michael Moeller. 2020. Inverting Gradients - How easy is it to break privacy in federated learning?. In Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, NeurIPS 2020, December 6-12, 2020, virtual, Hugo Larochelle, Marc\u2019Aurelio Ranzato, Raia Hadsell, Maria-Florina Balcan, and Hsuan-Tien Lin (Eds.)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.websem.2021.100696"},{"key":"e_1_3_2_1_18_1","volume-title":"Accurate Estimation of the Degree Distribution of Private Networks. In ICDM 2009, The Ninth IEEE International Conference on Data Mining","author":"Hay Michael","year":"2009","unstructured":"Michael Hay, Chao Li, Gerome Miklau, and David\u00a0D. Jensen. 2009. Accurate Estimation of the Degree Distribution of Private Networks. In ICDM 2009, The Ninth IEEE International Conference on Data Mining, Miami, Florida, USA, 6-9 December 2009, Wei Wang, Hillol Kargupta, Sanjay Ranka, Philip\u00a0S. Yu, and Xindong Wu (Eds.). IEEE Computer Society, 169\u2013178."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0008"},{"key":"e_1_3_2_1_20_1","volume-title":"30th USENIX Security Symposium, USENIX Security 2021","author":"He Xinlei","year":"2021","unstructured":"Xinlei He, Jinyuan Jia, Michael Backes, Neil\u00a0Zhenqiang Gong, and Yang Zhang. 2021. Stealing Links from Graph Neural Networks. In 30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021, Michael Bailey and Rachel Greenstadt (Eds.). USENIX Association, 2669\u20132686."},{"key":"e_1_3_2_1_21_1","volume-title":"PATE-GAN: Generating Synthetic Data with Differential Privacy Guarantees. In 7th International Conference on Learning Representations, ICLR 2019","author":"Jordon James","year":"2019","unstructured":"James Jordon, Jinsung Yoon, and Mihaela van\u00a0der Schaar. 2019. PATE-GAN: Generating Synthetic Data with Differential Privacy Guarantees. In 7th International Conference on Learning Representations, ICLR 2019, New Orleans, LA, USA, May 6-9, 2019. OpenReview.net."},{"key":"e_1_3_2_1_22_1","volume-title":"Kingma and Jimmy Ba","author":"P.","year":"2015","unstructured":"Diederik\u00a0P. Kingma and Jimmy Ba. 2015. Adam: A Method for Stochastic Optimization. In 3rd International Conference on Learning Representations, ICLR 2015, San Diego, CA, USA, May 7-9, 2015, Conference Track Proceedings, Yoshua Bengio and Yann LeCun (Eds.)."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623723"},{"key":"e_1_3_2_1_24_1","volume-title":"ACM Asia Conference on Computer and Communications Security","author":"Li Ninghui","year":"2022","unstructured":"Ninghui Li. 2022. Differentially Private Data Synthesis: State of the Art and Challenges. In ASIA CCS \u201922: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022, Yuji Suga, Kouichi Sakurai, Xuhua Ding, and Kazue Sako (Eds.). ACM, 815."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.14778\/3055330.3055331"},{"key":"e_1_3_2_1_26_1","volume-title":"Exploiting Unintended Feature Leakage in Collaborative Learning. In 2019 IEEE Symposium on Security and Privacy, SP 2019","author":"Melis Luca","year":"2019","unstructured":"Luca Melis, Congzheng Song, Emiliano\u00a0De Cristofaro, and Vitaly Shmatikov. 2019. Exploiting Unintended Feature Leakage in Collaborative Learning. In 2019 IEEE Symposium on Security and Privacy, SP 2019, San Francisco, CA, USA, May 19-23, 2019. IEEE, 691\u2013706."},{"key":"e_1_3_2_1_27_1","volume-title":"R\u00e9nyi Differential Privacy. In 30th IEEE Computer Security Foundations Symposium, CSF 2017","author":"Mironov Ilya","year":"2017","unstructured":"Ilya Mironov. 2017. R\u00e9nyi Differential Privacy. In 30th IEEE Computer Security Foundations Symposium, CSF 2017, Santa Barbara, CA, USA, August 21-25, 2017. IEEE Computer Society, 263\u2013275."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.10.007"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00065"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3459637.3482252"},{"key":"e_1_3_2_1_31_1","volume-title":"AdaCliP: Adaptive Clipping for Private SGD. CoRR abs\/1908.07643","author":"Pichapati Venkatadheeraj","year":"2019","unstructured":"Venkatadheeraj Pichapati, Ananda\u00a0Theertha Suresh, Felix\u00a0X. Yu, Sashank\u00a0J. Reddi, and Sanjiv Kumar. 2019. AdaCliP: Adaptive Clipping for Private SGD. CoRR abs\/1908.07643 (2019). http:\/\/arxiv.org\/abs\/1908.07643"},{"key":"e_1_3_2_1_32_1","volume-title":"Membership Inference Attacks Against Machine Learning Models. In 2017 IEEE Symposium on Security and Privacy, SP 2017","author":"Shokri Reza","year":"2017","unstructured":"Reza Shokri, Marco Stronati, Congzheng Song, and Vitaly Shmatikov. 2017. Membership Inference Attacks Against Machine Learning Models. In 2017 IEEE Symposium on Security and Privacy, SP 2017, San Jose, CA, USA, May 22-26, 2017. IEEE Computer Society, 3\u201318."},{"key":"e_1_3_2_1_33_1","volume-title":"Advances in Neural Information Processing Systems 26: 27th Annual Conference on Neural Information Processing Systems","author":"Socher Richard","year":"2013","unstructured":"Richard Socher, Danqi Chen, Christopher\u00a0D. Manning, and Andrew\u00a0Y. Ng. 2013. Reasoning With Neural Tensor Networks for Knowledge Base Completion. In Advances in Neural Information Processing Systems 26: 27th Annual Conference on Neural Information Processing Systems 2013. Proceedings of a meeting held December 5-8, 2013, Lake Tahoe, Nevada, United States, Christopher J.\u00a0C. Burges, L\u00e9on Bottou, Zoubin Ghahramani, and Kilian\u00a0Q. Weinberger (Eds.). 926\u2013934."},{"key":"e_1_3_2_1_34_1","volume-title":"2020 ACM SIGSAC Conference on Computer and Communications Security","author":"Song Congzheng","year":"2020","unstructured":"Congzheng Song and Ananth Raghunathan. 2020. Information Leakage in Embedding Models. In CCS \u201920: 2020 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, USA, November 9-13, 2020, Jay Ligatti, Xinming Ou, Jonathan Katz, and Giovanni Vigna (Eds.). ACM, 377\u2013390."},{"key":"e_1_3_2_1_35_1","volume-title":"7th International Conference on Learning Representations, ICLR 2019","author":"Sun Zhiqing","year":"2019","unstructured":"Zhiqing Sun, Zhi-Hong Deng, Jian-Yun Nie, and Jian Tang. 2019. RotatE: Knowledge Graph Embedding by Relational Rotation in Complex Space. In 7th International Conference on Learning Representations, ICLR 2019, New Orleans, LA, USA, May 6-9, 2019. OpenReview.net."},{"key":"e_1_3_2_1_36_1","volume-title":"https:\/\/github.com\/tensorflow\/privacy\/tree\/master\/tutorials","author":"Privacy Tensorflow","year":"2022","unstructured":"tensorflower gardener. 2022. Tensorflow Privacy. (2022). https:\/\/github.com\/tensorflow\/privacy\/tree\/master\/tutorials"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D15-1174"},{"key":"e_1_3_2_1_38_1","volume-title":"Proceedings of the 33nd International Conference on Machine Learning, ICML 2016, New York City, NY, USA, June 19-24, 2016(JMLR Workshop and Conference Proceedings, Vol.\u00a048)","author":"Trouillon Th\u00e9o","year":"2016","unstructured":"Th\u00e9o Trouillon, Johannes Welbl, Sebastian Riedel, \u00c9ric Gaussier, and Guillaume Bouchard. 2016. Complex Embeddings for Simple Link Prediction. In Proceedings of the 33nd International Conference on Machine Learning, ICML 2016, New York City, NY, USA, June 19-24, 2016(JMLR Workshop and Conference Proceedings, Vol.\u00a048), Maria-Florina Balcan and Kilian\u00a0Q. Weinberger (Eds.). JMLR.org, 2071\u20132080."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2019.2897554"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2629489"},{"key":"e_1_3_2_1_41_1","unstructured":"Chris Waites. 2020. PyVacy: Privacy Algorithms for PyTorch. (2020). https:\/\/github.com\/ChrisWaites\/pyvacy"},{"key":"e_1_3_2_1_42_1","volume-title":"USA","author":"Wang Meng","year":"2018","unstructured":"Meng Wang, Ruijie Wang, Jun Liu, Yihe Chen, Lei Zhang, and Guilin Qi. 2018. Towards Empty Answers in SPARQL: Approximating Querying with RDF Embedding. In The Semantic Web - ISWC 2018 - 17th International Semantic Web Conference, Monterey, CA, USA, October 8-12, 2018, Proceedings, Part I(Lecture Notes in Computer Science, Vol.\u00a011136), Denny Vrandecic, Kalina Bontcheva, Mari\u00a0Carmen Su\u00e1rez-Figueroa, Valentina Presutti, Irene Celino, Marta Sabou, Lucie-Aim\u00e9e Kaffee, and Elena Simperl (Eds.). Springer, 513\u2013529."},{"key":"e_1_3_2_1_43_1","volume-title":"Subsampled Renyi Differential Privacy and Analytical Moments Accountant. In The 22nd International Conference on Artificial Intelligence and Statistics, AISTATS 2019","author":"Wang Yu-Xiang","year":"2019","unstructured":"Yu-Xiang Wang, Borja Balle, and Shiva\u00a0Prasad Kasiviswanathan. 2019. Subsampled Renyi Differential Privacy and Analytical Moments Accountant. In The 22nd International Conference on Artificial Intelligence and Statistics, AISTATS 2019, 16-18 April 2019, Naha, Okinawa, Japan(Proceedings of Machine Learning Research, Vol.\u00a089), Kamalika Chaudhuri and Masashi Sugiyama (Eds.). PMLR, 1226\u20131235."},{"key":"e_1_3_2_1_44_1","volume-title":"Membership Inference Attacks on Knowledge Graphs. CoRR abs\/2104.08273","author":"Wang Yu","year":"2021","unstructured":"Yu Wang and Lichao Sun. 2021. Membership Inference Attacks on Knowledge Graphs. CoRR abs\/2104.08273 (2021)."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833806"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D17-1060"},{"key":"e_1_3_2_1_47_1","volume-title":"3rd International Conference on Learning Representations, ICLR","author":"Yang Bishan","year":"2015","unstructured":"Bishan Yang, Wen-tau Yih, Xiaodong He, Jianfeng Gao, and Li Deng. 2015. Embedding Entities and Relations for Learning and Inference in Knowledge Bases. In 3rd International Conference on Learning Representations, ICLR 2015, San Diego, CA, USA, May 7-9, 2015, Conference Track Proceedings, Yoshua Bengio and Yann LeCun (Eds.)."},{"key":"e_1_3_2_1_48_1","volume-title":"Differentially Private Model Publishing for Deep Learning. In 2019 IEEE Symposium on Security and Privacy, SP 2019","author":"Yu Lei","year":"2019","unstructured":"Lei Yu, Ling Liu, Calton Pu, Mehmet\u00a0Emre Gursoy, and Stacey Truex. 2019. Differentially Private Model Publishing for Deep Learning. In 2019 IEEE Symposium on Security and Privacy, SP 2019, San Francisco, CA, USA, May 19-23, 2019. IEEE, 332\u2013349."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939673"},{"key":"e_1_3_2_1_50_1","volume-title":"Efficient Federated Learning on Knowledge Graphs via Privacy-preserving Relation Embedding Aggregation. CoRR abs\/2203.09553","author":"Zhang Kai","year":"2022","unstructured":"Kai Zhang, Yu Wang, Hongyi Wang, Lifu Huang, Carl Yang, and Lichao Sun. 2022. Efficient Federated Learning on Knowledge Graphs via Privacy-preserving Relation Embedding Aggregation. CoRR abs\/2203.09553 (2022)."},{"key":"e_1_3_2_1_51_1","volume-title":"Inference Attacks Against Graph Neural Networks. CoRR abs\/2110.02631","author":"Zhang Zhikun","year":"2021","unstructured":"Zhikun Zhang, Min Chen, Michael Backes, Yun Shen, and Yang Zhang. 2021. Inference Attacks Against Graph Neural Networks. CoRR abs\/2110.02631 (2021)."},{"key":"e_1_3_2_1_52_1","volume-title":"PrivSyn: Differentially Private Data Synthesis. In 30th USENIX Security Symposium, USENIX Security 2021","author":"Zhang Zhikun","year":"2021","unstructured":"Zhikun Zhang, Tianhao Wang, Ninghui Li, Jean Honorio, Michael Backes, Shibo He, Jiming Chen, and Yang Zhang. 2021. PrivSyn: Differentially Private Data Synthesis. In 30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021, Michael Bailey and Rachel Greenstadt (Eds.). USENIX Association, 929\u2013946."},{"key":"e_1_3_2_1_53_1","volume-title":"Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019","author":"Zhu Ligeng","year":"2019","unstructured":"Ligeng Zhu, Zhijian Liu, and Song Han. 2019. Deep Leakage from Gradients. In Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019, NeurIPS 2019, December 8-14, 2019, Vancouver, BC, Canada, Hanna\u00a0M. Wallach, Hugo Larochelle, Alina Beygelzimer, Florence d\u2019Alch\u00e9-Buc, Emily\u00a0B. Fox, and Roman Garnett (Eds.). 14747\u201314756."},{"key":"e_1_3_2_1_54_1","volume-title":"International Conference on Artificial Intelligence and Statistics, AISTATS 2022","author":"Zhu Yuqing","year":"2022","unstructured":"Yuqing Zhu and Yu-Xiang Wang. 2022. Adaptive Private-K-Selection with Adaptive K and Application to Multi-label PATE. In International Conference on Artificial Intelligence and Statistics, AISTATS 2022, 28-30 March 2022, Virtual Event(Proceedings of Machine Learning Research, Vol.\u00a0151), Gustau Camps-Valls, Francisco J.\u00a0R. Ruiz, and Isabel Valera (Eds.). PMLR, 5622\u20135635."}],"event":{"name":"WWW '23: The ACM Web Conference 2023","location":"Austin TX USA","acronym":"WWW '23","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"]},"container-title":["Proceedings of the ACM Web Conference 2023"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3543507.3583450","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3543507.3583450","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:47:53Z","timestamp":1750178873000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3543507.3583450"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,30]]},"references-count":54,"alternative-id":["10.1145\/3543507.3583450","10.1145\/3543507"],"URL":"https:\/\/doi.org\/10.1145\/3543507.3583450","relation":{},"subject":[],"published":{"date-parts":[[2023,4,30]]},"assertion":[{"value":"2023-04-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}