{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T18:39:22Z","timestamp":1770835162673,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,26]],"date-time":"2023-11-26T00:00:00Z","timestamp":1700956800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Monash University Indonesia"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,30]]},"DOI":"10.1145\/3605772.3624003","type":"proceedings-article","created":{"date-parts":[[2023,11,21]],"date-time":"2023-11-21T17:10:01Z","timestamp":1700586601000},"page":"5-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["How Resilient is Privacy-preserving Machine Learning Towards Data-Driven Policy? Jakarta COVID-19 Patient Study Case"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6526-7185","authenticated-orcid":false,"given":"Bahrul Ilmi","family":"Nasution","sequence":"first","affiliation":[{"name":"Jakarta Smart City, Jakarta, Indonesia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1875-0219","authenticated-orcid":false,"given":"Yudhistira","family":"Nugraha","sequence":"additional","affiliation":[{"name":"Jakarta Smart City &amp; Telkom University Bandung, Jakarta; Bandung, Indonesia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6354-6164","authenticated-orcid":false,"given":"Irfan Dwiki","family":"Bhaswara","sequence":"additional","affiliation":[{"name":"Jakarta Smart City, Jakarta, Indonesia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5614-2276","authenticated-orcid":false,"given":"Muhamad Erza","family":"Aminanto","sequence":"additional","affiliation":[{"name":"Monash University Indonesia, Banten, Indonesia"}]}],"member":"320","published-online":{"date-parts":[[2023,11,26]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1161\/CIRCOUTCOMES.118.005122"},{"key":"e_1_3_2_1_3_1","article-title":"Differentially private empirical risk minimization","volume":"12","author":"Chaudhuri Kamalika","year":"2011","unstructured":"Kamalika Chaudhuri , Claire Monteleoni , and Anand D Sarwate . 2011 . Differentially private empirical risk minimization . Journal of Machine Learning Research , Vol. 12 , 3 (2011). Kamalika Chaudhuri, Claire Monteleoni, and Anand D Sarwate. 2011. Differentially private empirical risk minimization. Journal of Machine Learning Research , Vol. 12, 3 (2011).","journal-title":"Journal of Machine Learning Research"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1613\/jair.953"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/11787006_1"},{"key":"e_1_3_2_1_6_1","volume-title":"Privacy-preserving Prediction. Conference on Learning Theory (COLT) 2018 (mar 2018","author":"Dwork Cynthia","year":"2018","unstructured":"Cynthia Dwork , Vitaly Feldman , and Google Brain . 2018 . Privacy-preserving Prediction. Conference on Learning Theory (COLT) 2018 (mar 2018 ). arxiv: 1803.10266 https:\/\/arxiv.org\/abs\/1803.10266v2 Cynthia Dwork, Vitaly Feldman, and Google Brain. 2018. Privacy-preserving Prediction. Conference on Learning Theory (COLT) 2018 (mar 2018). arxiv: 1803.10266 https:\/\/arxiv.org\/abs\/1803.10266v2"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_14"},{"key":"e_1_3_2_1_8_1","volume-title":"Differentially private random decision forests using smooth sensitivity. Expert systems with applications","author":"Fletcher Sam","year":"2017","unstructured":"Sam Fletcher and Md Zahidul Islam . 2017. Differentially private random decision forests using smooth sensitivity. Expert systems with applications , Vol. 78 ( 2017 ), 16--31. Sam Fletcher and Md Zahidul Islam. 2017. Differentially private random decision forests using smooth sensitivity. Expert systems with applications , Vol. 78 (2017), 16--31."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1177\/1745691616650285"},{"key":"e_1_3_2_1_10_1","volume-title":"Evaluating Differentially Private Machine Learning in Practice. In 28th USENIX Security Symposium (USENIX Security 19)","author":"Jayaraman Bargav","year":"2019","unstructured":"Bargav Jayaraman and David Evans . 2019 . Evaluating Differentially Private Machine Learning in Practice. In 28th USENIX Security Symposium (USENIX Security 19) . USENIX Association, Santa Clara, CA , 1895--1912. https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/jayaraman Bargav Jayaraman and David Evans. 2019. Evaluating Differentially Private Machine Learning in Practice. In 28th USENIX Security Symposium (USENIX Security 19). USENIX Association, Santa Clara, CA, 1895--1912. https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/jayaraman"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1126\/SCIADV.ABK3283"},{"key":"e_1_3_2_1_12_1","first-page":"202","article-title":"Scaling up the accuracy of naive-bayes classifiers: A decision-tree hybrid","volume":"96","author":"Ron Kohavi","year":"1996","unstructured":"Ron Kohavi et al. 1996 . Scaling up the accuracy of naive-bayes classifiers: A decision-tree hybrid .. In Kdd , Vol. 96. 202 -- 207 . Ron Kohavi et al. 1996. Scaling up the accuracy of naive-bayes classifiers: A decision-tree hybrid.. In Kdd, Vol. 96. 202--207.","journal-title":"Kdd"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCEAI55464.2022.00132"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1559845.1559850"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.giq.2021.101596"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1093\/SCIPOL"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbusres.2021.03.001"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.giq.2022.101679"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/IDSTA55301.2022.9923037"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/WI-IAT.2013.80"},{"key":"e_1_3_2_1_21_1","volume-title":"Advances in Neural Information Processing Systems","author":"Wang Di","year":"2017","unstructured":"Di Wang , Minwei Ye , and Jinhui Xu. 2017. Differentially Private Empirical Risk Minimization Revisited: Faster and More General . In Advances in Neural Information Processing Systems , , I. Guyon, U. Von Luxburg, S. Bengio, H. Wallach, R. Fergus, S. Vishwanathan, and R. Garnett (Eds.), Vol. 30 . Curran Associates, Inc. https:\/\/proceedings.neurips.cc\/paper\/ 2017 \/file\/f337d999d9ad116a7b4f3d409fcc6480-Paper.pdf Di Wang, Minwei Ye, and Jinhui Xu. 2017. Differentially Private Empirical Risk Minimization Revisited: Faster and More General. In Advances in Neural Information Processing Systems, , I. Guyon, U. Von Luxburg, S. Bengio, H. Wallach, R. Fergus, S. Vishwanathan, and R. Garnett (Eds.), Vol. 30. Curran Associates, Inc. https:\/\/proceedings.neurips.cc\/paper\/2017\/file\/f337d999d9ad116a7b4f3d409fcc6480-Paper.pdf"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2021.07.001"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom53373.2021.00172"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00033"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411495.3421352"},{"key":"e_1_3_2_1_26_1","volume-title":"Yu","author":"Zhu Tianqing","year":"2017","unstructured":"Tianqing Zhu , Gang Li , Wanlei Zhou , and Philip S . Yu . 2017 . Differential Privacy and Applications. Springer International Publishing , Cham, Switzerland. 978--3--319--62004--6 Tianqing Zhu, Gang Li, Wanlei Zhou, and Philip S. Yu. 2017. Differential Privacy and Applications. Springer International Publishing, Cham, Switzerland. 978--3--319--62004--6"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.giq.2021.101577"}],"event":{"name":"CCS '23: ACM SIGSAC Conference on Computer and Communications Security","location":"Copenhagen Denmark","acronym":"CCS '23","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2023 Workshop on Recent Advances in Resilient and Trustworthy ML Systems in Autonomous Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3605772.3624003","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3605772.3624003","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:36:18Z","timestamp":1750178178000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3605772.3624003"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,26]]},"references-count":27,"alternative-id":["10.1145\/3605772.3624003","10.1145\/3605772"],"URL":"https:\/\/doi.org\/10.1145\/3605772.3624003","relation":{},"subject":[],"published":{"date-parts":[[2023,11,26]]},"assertion":[{"value":"2023-11-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}