{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,4]],"date-time":"2025-09-04T13:59:13Z","timestamp":1756994353764,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,26]],"date-time":"2023-11-26T00:00:00Z","timestamp":1700956800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,30]]},"DOI":"10.1145\/3605764.3623910","type":"proceedings-article","created":{"date-parts":[[2023,11,21]],"date-time":"2023-11-21T12:12:17Z","timestamp":1700568737000},"page":"1-9","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Differentially Private Logistic Regression with Sparse Solutions"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5566-095X","authenticated-orcid":false,"given":"Amol","family":"Khanna","sequence":"first","affiliation":[{"name":"Booz Allen Hamilton, Annapolis Junction, MD, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1026-5734","authenticated-orcid":false,"given":"Fred","family":"Lu","sequence":"additional","affiliation":[{"name":"Booz Allen Hamilton &amp; University of Maryland, Baltimore County, Annapolis Junction, MD, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9900-1972","authenticated-orcid":false,"given":"Edward","family":"Raff","sequence":"additional","affiliation":[{"name":"Booz Allen Hamilton &amp; University of Maryland, Baltimore County, Annapolis Junction, MD, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2349-9564","authenticated-orcid":false,"given":"Brian","family":"Testa","sequence":"additional","affiliation":[{"name":"Air Force Research Laboratory, Rome, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,11,26]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"e_1_3_2_1_2_1","volume-title":"Differential privacy on finite computers. arXiv preprint arXiv:1709.05396","author":"Balcer Victor","year":"2017","unstructured":"Victor Balcer and Salil Vadhan. 2017. Differential privacy on finite computers. arXiv preprint arXiv:1709.05396 (2017)."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/2946645.2946650"},{"key":"e_1_3_2_1_4_1","volume-title":"Privacy-preserving logistic regression training. BMC medical genomics","author":"Bonte Charlotte","year":"2018","unstructured":"Charlotte Bonte and Frederik Vercauteren. 2018. Privacy-preserving logistic regression training. BMC medical genomics, Vol. 11 (2018), 13--21."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1961189.1961199"},{"key":"e_1_3_2_1_6_1","volume-title":"Privacy-preserving logistic regression. Advances in neural information processing systems","author":"Chaudhuri Kamalika","year":"2008","unstructured":"Kamalika Chaudhuri and Claire Monteleoni. 2008. Privacy-preserving logistic regression. Advances in neural information processing systems, Vol. 21 (2008)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1824777.1824783"},{"key":"e_1_3_2_1_8_1","first-page":"1","article-title":"Statistical comparisons of classifiers over multiple data sets","volume":"7","author":"Janez Demvs","year":"2006","unstructured":"Janez Demvs ar. 2006. Statistical comparisons of classifiers over multiple data sets. The Journal of Machine learning research, Vol. 7 (2006), 1--30.","journal-title":"The Journal of Machine learning research"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/11761679_29"},{"key":"e_1_3_2_1_10_1","volume-title":"Foundations and Trends\u00ae in Theoretical Computer Science","volume":"9","author":"Dwork Cynthia","year":"2014","unstructured":"Cynthia Dwork, Aaron Roth, et al. 2014. The algorithmic foundations of differential privacy. Foundations and Trends\u00ae in Theoretical Computer Science, Vol. 9, 3--4 (2014), 211--407."},{"key":"e_1_3_2_1_11_1","volume-title":"An algorithm for quadratic programming. Naval research logistics quarterly","author":"Frank Marguerite","year":"1956","unstructured":"Marguerite Frank and Philip Wolfe. 1956. An algorithm for quadratic programming. Naval research logistics quarterly, Vol. 3, 1--2 (1956), 95--110."},{"key":"e_1_3_2_1_12_1","volume-title":"France","author":"Gasso Gilles","year":"2019","unstructured":"Gilles Gasso. 2019. Logistic regression. INSA Rouen-ASI Departement Laboratory: Saint-Etienne-du-Rouvray, France (2019), 1--30."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536464"},{"key":"e_1_3_2_1_14_1","volume-title":"Ralf Gommers, Pauli Virtanen, David Cournapeau, Eric Wieser, Julian Taylor","author":"Harris Charles R","year":"2020","unstructured":"Charles R Harris, K Jarrod Millman, St\u00e9fan J Van Der Walt, Ralf Gommers, Pauli Virtanen, David Cournapeau, Eric Wieser, Julian Taylor, Sebastian Berg, Nathaniel J Smith, et al. 2020. Array programming with NumPy. Nature, Vol. 585, 7825 (2020), 357--362."},{"volume-title":"Statistical learning with sparsity: the lasso and generalizations","author":"Hastie Trevor","key":"e_1_3_2_1_15_1","unstructured":"Trevor Hastie, Robert Tibshirani, and Martin Wainwright. 2015a. Statistical learning with sparsity: the lasso and generalizations. CRC press."},{"volume-title":"Statistical learning with sparsity: the lasso and generalizations","author":"Hastie Trevor","key":"e_1_3_2_1_16_1","unstructured":"Trevor Hastie, Robert Tibshirani, and Martin Wainwright. 2015b. Statistical learning with sparsity: the lasso and generalizations. CRC press."},{"key":"e_1_3_2_1_17_1","volume-title":"International conference on machine learning. PMLR, 427--435","author":"Jaggi Martin","year":"2013","unstructured":"Martin Jaggi. 2013. Revisiting Frank-Wolfe: Projection-free sparse convex optimization. In International conference on machine learning. PMLR, 427--435."},{"key":"e_1_3_2_1_18_1","volume-title":"Martin","author":"Jurafsky Dan","year":"2021","unstructured":"Dan Jurafsky and James H. Martin. 2021. Speech and Language Processing."},{"key":"e_1_3_2_1_19_1","volume-title":"International conference on machine learning. PMLR, 1376--1385","author":"Kairouz Peter","year":"2015","unstructured":"Peter Kairouz, Sewoong Oh, and Pramod Viswanath. 2015. The composition theorem for differential privacy. In International conference on machine learning. PMLR, 1376--1385."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"Amol Khanna Vincent Schaffer Gamze G\u00fcrsoy and Mark Gerstein. 2022. Privacy-preserving Model Training for Disease Prediction Using Federated Learning with Differential Privacy. In 2022 44th Annual International Conference of the IEEE Engineering in Medicine & Biology Society (EMBC). IEEE 1358--1361.","DOI":"10.1109\/EMBC48229.2022.9871742"},{"key":"e_1_3_2_1_21_1","volume-title":"Conference on Learning Theory. JMLR Workshop and Conference Proceedings, 25--1.","author":"Kifer Daniel","year":"2012","unstructured":"Daniel Kifer, Adam Smith, and Abhradeep Thakurta. 2012. Private convex empirical risk minimization and high-dimensional regression. In Conference on Learning Theory. JMLR Workshop and Conference Proceedings, 25--1."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.3390\/su12166325"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2925496"},{"key":"e_1_3_2_1_24_1","volume-title":"A unified approach to interpreting model predictions. Advances in neural information processing systems","author":"Lundberg Scott M","year":"2017","unstructured":"Scott M Lundberg and Su-In Lee. 2017. A unified approach to interpreting model predictions. Advances in neural information processing systems, Vol. 30 (2017)."},{"volume-title":"Probabilistic machine learning: an introduction","author":"Murphy Kevin P","key":"e_1_3_2_1_25_1","unstructured":"Kevin P Murphy. 2022. Probabilistic machine learning: an introduction. MIT press."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1080\/10618600.2000.10474883"},{"key":"e_1_3_2_1_27_1","volume-title":"Foundations and Trends\u00ae in Machine Learning","volume":"4","author":"Shai","year":"2012","unstructured":"Shai Shalev-Shwartz et al. 2012. Online learning and online convex optimization. Foundations and Trends\u00ae in Machine Learning, Vol. 4, 2 (2012), 107--194."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.41"},{"key":"e_1_3_2_1_29_1","volume-title":"Abhradeep Guha Thakurta, and Li Zhang","author":"Talwar Kunal","year":"2015","unstructured":"Kunal Talwar, Abhradeep Guha Thakurta, and Li Zhang. 2015. Nearly optimal private lasso. Advances in Neural Information Processing Systems , Vol. 28 (2015)."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"crossref","unstructured":"Pauli Virtanen Ralf Gommers Travis E Oliphant Matt Haberland Tyler Reddy David Cournapeau Evgeni Burovski Pearu Peterson Warren Weckesser Jonathan Bright et al. 2020. SciPy 1.0: fundamental algorithms for scientific computing in Python. Nature methods Vol. 17 3 (2020) 261--272.","DOI":"10.1038\/s41592-020-0772-5"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.5555\/3367471.3367561"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2019.09.020"},{"key":"e_1_3_2_1_33_1","volume-title":"International Conference, PSD 2014, Ibiza, Spain, September 17--19, 2014. Proceedings. Springer, 170--184","author":"Yu Fei","year":"2014","unstructured":"Fei Yu, Michal Rybar, Caroline Uhler, and Stephen E Fienberg. 2014. Differentially-private logistic regression for detecting multiple-SNP association in GWAS databases. In Privacy in Statistical Databases: UNESCO Chair in Data Privacy, International Conference, PSD 2014, Ibiza, Spain, September 17--19, 2014. Proceedings. Springer, 170--184."}],"event":{"name":"CCS '23: ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Copenhagen Denmark","acronym":"CCS '23"},"container-title":["Proceedings of the 16th ACM Workshop on Artificial Intelligence and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3605764.3623910","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3605764.3623910","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T01:37:24Z","timestamp":1755913044000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3605764.3623910"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,26]]},"references-count":33,"alternative-id":["10.1145\/3605764.3623910","10.1145\/3605764"],"URL":"https:\/\/doi.org\/10.1145\/3605764.3623910","relation":{},"subject":[],"published":{"date-parts":[[2023,11,26]]},"assertion":[{"value":"2023-11-26","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}