{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,11]],"date-time":"2026-01-11T05:34:22Z","timestamp":1768109662842,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T00:00:00Z","timestamp":1667779200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"HKRGC","award":["16201819, 16205420, 16205422"],"award-info":[{"award-number":["16201819, 16205420, 16205422"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,11,7]]},"DOI":"10.1145\/3548606.3560567","type":"proceedings-article","created":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T11:41:28Z","timestamp":1667821288000},"page":"1009-1022","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["Shifted Inverse"],"prefix":"10.1145","author":[{"given":"Juanru","family":"Fang","sequence":"first","affiliation":[{"name":"Hong Kong University of Science and Technology, Hong Kong, Hong Kong"}]},{"given":"Wei","family":"Dong","sequence":"additional","affiliation":[{"name":"Hong Kong University of Science and Technology, Hong Kong, Hong Kong"}]},{"given":"Ke","family":"Yi","sequence":"additional","affiliation":[{"name":"Hong Kong University of Science and Technology, Hong Kong, Hong Kong"}]}],"member":"320","published-online":{"date-parts":[[2022,11,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1006\/jcss.1997.1545"},{"key":"e_1_3_2_1_2_1","volume-title":"Proceedings of the 36th International Conference on Machine Learning","volume":"97","author":"Amin Kareem","year":"2019","unstructured":"Kareem Amin , Alex Kulesza , Andres Mu\u00f1oz Medina , and Sergei Vassilvitskii . 2019 . Bounding user contributions: A bias-variance trade-off in differential privacy . In Proceedings of the 36th International Conference on Machine Learning , Vol. 97 . PMLR, 263--271. Kareem Amin, Alex Kulesza, Andres Mu\u00f1oz Medina, and Sergei Vassilvitskii. 2019. Bounding user contributions: A bias-variance trade-off in differential privacy. In Proceedings of the 36th International Conference on Machine Learning, Vol. 97. PMLR, 263--271."},{"key":"e_1_3_2_1_3_1","volume-title":"Duchi","author":"Asi Hilal","year":"2020","unstructured":"Hilal Asi and John C . Duchi . 2020 . Instance-optimality in differential privacy via approximate inverse sensitivity mechanisms. In Advances in Neural Information Processing Systems, Vol. 33 . Curran Associates, Inc ., 14106--14117. Hilal Asi and John C. Duchi. 2020. Instance-optimality in differential privacy via approximate inverse sensitivity mechanisms. In Advances in Neural Information Processing Systems, Vol. 33. Curran Associates, Inc., 14106--14117."},{"key":"e_1_3_2_1_4_1","volume-title":"Duchi","author":"Asi Hilal","year":"2020","unstructured":"Hilal Asi and John C . Duchi . 2020 . Near instance-optimality in differential privacy. ArXiv e-prints (2020). Hilal Asi and John C. Duchi. 2020. Near instance-optimality in differential privacy. ArXiv e-prints (2020)."},{"key":"e_1_3_2_1_5_1","unstructured":"Ghazi Badih Kumar Ravi and Manurangsi Pasin. 2021. User-level private learning via correlated sampling. In Advances in Neural Information Processing Systems.  Ghazi Badih Kumar Ravi and Manurangsi Pasin. 2021. User-level private learning via correlated sampling. In Advances in Neural Information Processing Systems."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2422436.2422449"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2463676.2465304"},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of the Forty-First Annual ACM Symposium on Theory of Computing. Association for Computing Machinery","author":"Cynthia Dwork","year":"2009","unstructured":"Dwork Cynthia and Lei Jing . 2009 . Differential privacy and robust statistics . In Proceedings of the Forty-First Annual ACM Symposium on Theory of Computing. Association for Computing Machinery , New York, NY, USA, 371--380. Dwork Cynthia and Lei Jing. 2009. Differential privacy and robust statistics. In Proceedings of the Forty-First Annual ACM Symposium on Theory of Computing. Association for Computing Machinery, New York, NY, USA, 371--380."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2882903.2926745"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3514221.3517844"},{"key":"e_1_3_2_1_11_1","volume-title":"The algorithmic foundations of differential privacy. Foundations and Trends in Theoretical Computer Science 9","author":"Dwork Cynthia","year":"2014","unstructured":"Cynthia Dwork and Aaron Roth . 2014. The algorithmic foundations of differential privacy. Foundations and Trends in Theoretical Computer Science 9 ( 2014 ). Cynthia Dwork and Aaron Roth. 2014. The algorithmic foundations of differential privacy. Foundations and Trends in Theoretical Computer Science 9 (2014)."},{"key":"e_1_3_2_1_12_1","unstructured":"Alessandro Epasto Mohammad Mahdian Jieming Mao Vahab Mirrokni and Lijie Ren. 2020. Smoothly bounding user contributions in differential privacy. In Advances in Neural Information Processing Systems.  Alessandro Epasto Mohammad Mahdian Jieming Mao Vahab Mirrokni and Lijie Ren. 2020. Smoothly bounding user contributions in differential privacy. In Advances in Neural Information Processing Systems."},{"key":"e_1_3_2_1_13_1","unstructured":"Ziyue Huang Yuting Liang and Ke Yi. 2021. Instance-optimal mean estimation under differential privacy. In Advances in Neural Information Processing Systems.  Ziyue Huang Yuting Liang and Ke Yi. 2021. Instance-optimal mean estimation under differential privacy. In Advances in Neural Information Processing Systems."},{"key":"e_1_3_2_1_14_1","volume-title":"SNAP datasets: Stanford large network dataset collection","author":"Jure Leskovec","year":"2014","unstructured":"Leskovec Jure and Krevl Andrej . 2016. SNAP datasets: Stanford large network dataset collection ( 2014 ). URL http:\/\/snap. stanford. edu\/data (2016), 49. Leskovec Jure and Krevl Andrej. 2016. SNAP datasets: Stanford large network dataset collection (2014). URL http:\/\/snap. stanford. edu\/data (2016), 49."},{"key":"e_1_3_2_1_15_1","series-title":"Lecture Notes in Computer Science 7785 LNCS","volume-title":"Analyzing graphs with node differential privacy","author":"Kasiviswanathan Shiva Prasad","unstructured":"Shiva Prasad Kasiviswanathan , Kobbi Nissim , Sofya Raskhodnikova , and Adam Smith . 2013. Analyzing graphs with node differential privacy . Lecture Notes in Computer Science 7785 LNCS . Shiva Prasad Kasiviswanathan, Kobbi Nissim, Sofya Raskhodnikova, and Adam Smith. 2013. Analyzing graphs with node differential privacy. Lecture Notes in Computer Science 7785 LNCS."},{"key":"e_1_3_2_1_16_1","volume-title":"Algorithm design","author":"Kleinberg Jon","unstructured":"Jon Kleinberg and Eva Tardos . 2005. Algorithm design . Addison-Wesley Longman Publishing Co., Inc. , USA. Jon Kleinberg and Eva Tardos. 2005. Algorithm design. Addison-Wesley Longman Publishing Co., Inc., USA."},{"key":"e_1_3_2_1_17_1","volume-title":"Proceedings of the Thirty-Ninth Annual ACM Symposium on Theory of Computing. Association for Computing Machinery","author":"Kobbi Nissim","year":"2007","unstructured":"Nissim Kobbi , Raskhodnikova Sofya , and Smith Adam . 2007 . Smooth sensitivity and sampling in private data analysis . In Proceedings of the Thirty-Ninth Annual ACM Symposium on Theory of Computing. Association for Computing Machinery , New York, NY, USA, 75--84. Nissim Kobbi, Raskhodnikova Sofya, and Smith Adam. 2007. Smooth sensitivity and sampling in private data analysis. In Proceedings of the Thirty-Ninth Annual ACM Symposium on Theory of Computing. Association for Computing Machinery, New York, NY, USA, 75--84."},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings of the VLDB Endowment.","author":"Kotsogiannis Ios","year":"2018","unstructured":"Ios Kotsogiannis , Yuchao Tao , Xi He , Maryam Fanaeepour , Ashwin Machanavajjhala , Michael Hay , and Gerome Miklau . 2018 . PrivateSQL: a differentially private SQL query engine . In Proceedings of the VLDB Endowment. Ios Kotsogiannis, Yuchao Tao, Xi He, Maryam Fanaeepour, Ashwin Machanavajjhala, Michael Hay, and Gerome Miklau. 2018. PrivateSQL: a differentially private SQL query engine. In Proceedings of the VLDB Endowment."},{"key":"e_1_3_2_1_19_1","unstructured":"Daniel Levy Ziteng Sun Kareem Amin Satyen Kale Alex Kulesza Mehryar Mohri and Ananda Suresh. 2021. Learning with user-level privacy. In Advances in Neural Information Processing Systems.  Daniel Levy Ziteng Sun Kareem Amin Satyen Kale Alex Kulesza Mehryar Mohri and Ananda Suresh. 2021. Learning with user-level privacy. In Advances in Neural Information Processing Systems."},{"key":"e_1_3_2_1_20_1","volume-title":"Felix Yu, Sanjiv Kumar, and Michael Riley.","author":"Liu Yuhan","year":"2020","unstructured":"Yuhan Liu , Ananda Theertha Suresh , Felix Yu, Sanjiv Kumar, and Michael Riley. 2020 . Learning discrete distributions: user vs item-level privacy. In Advances in Neural Information Processing Systems . Yuhan Liu, Ananda Theertha Suresh, Felix Yu, Sanjiv Kumar, and Michael Riley. 2020. Learning discrete distributions: user vs item-level privacy. In Advances in Neural Information Processing Systems."},{"key":"e_1_3_2_1_21_1","volume-title":"48th Annual IEEE Symposium on Foundations of Computer Science. 94--103","author":"McSherry Frank","year":"2008","unstructured":"Frank McSherry and Kunal Talwar . 2008 . Mechanism design via differential privacy . In 48th Annual IEEE Symposium on Foundations of Computer Science. 94--103 . Frank McSherry and Kunal Talwar. 2008. Mechanism design via differential privacy. In 48th Annual IEEE Symposium on Foundations of Computer Science. 94--103."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"Johnson Noah Near Joseph P. and Song Dawn. 2018. Towards practical differential privacy for SQL queries. (2018) 526--539.  Johnson Noah Near Joseph P. and Song Dawn. 2018. Towards practical differential privacy for SQL queries. (2018) 526--539.","DOI":"10.1145\/3187009.3177733"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1993636.1993743"},{"key":"e_1_3_2_1_24_1","volume-title":"2016 IEEE 57th Annual Symposium on Foundations of Computer Science. 495--504","author":"Sofya Raskhodnikova","year":"2016","unstructured":"Raskhodnikova Sofya and Smith Adam . 2016 . Lipschitz extensions for node-private graph statistics and the generalized exponential mechanism . In 2016 IEEE 57th Annual Symposium on Foundations of Computer Science. 495--504 . Raskhodnikova Sofya and Smith Adam. 2016. Lipschitz extensions for node-private graph statistics and the generalized exponential mechanism. In 2016 IEEE 57th Annual Symposium on Foundations of Computer Science. 495--504."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3318464.3389762"},{"key":"e_1_3_2_1_26_1","volume-title":"The complexity of differential privacy","author":"Vadhan Salil","unstructured":"Salil Vadhan . 2017. The complexity of differential privacy . Springer International Publishing , Cham . 347--450 pages. Salil Vadhan. 2017. The complexity of differential privacy. Springer International Publishing, Cham. 347--450 pages."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0025"}],"event":{"name":"CCS '22: 2022 ACM SIGSAC Conference on Computer and Communications Security","location":"Los Angeles CA USA","acronym":"CCS '22","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3548606.3560567","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3548606.3560567","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:50:57Z","timestamp":1750182657000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3548606.3560567"}},"subtitle":["A General Mechanism for Monotonic Functions under User Differential Privacy"],"short-title":[],"issued":{"date-parts":[[2022,11,7]]},"references-count":27,"alternative-id":["10.1145\/3548606.3560567","10.1145\/3548606"],"URL":"https:\/\/doi.org\/10.1145\/3548606.3560567","relation":{},"subject":[],"published":{"date-parts":[[2022,11,7]]},"assertion":[{"value":"2022-11-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}