{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:05:59Z","timestamp":1750309559544,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T00:00:00Z","timestamp":1745280000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Sloan Foundation"},{"DOI":"10.13039\/https:\/\/doi.org\/10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["CCF-2338772,RINGS-2148359"],"award-info":[{"award-number":["CCF-2338772,RINGS-2148359"]}],"id":[{"id":"10.13039\/https:\/\/doi.org\/10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"J.P. Morgan Chase"},{"DOI":"10.13039\/https:\/\/doi.org\/10.13039\/100020198","name":"Bosch-Forschungsstiftung","doi-asserted-by":"publisher","id":[{"id":"10.13039\/https:\/\/doi.org\/10.13039\/100020198","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/https:\/\/doi.org\/10.13039\/100000899","name":"Intel Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/https:\/\/doi.org\/10.13039\/100000899","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/https:\/\/doi.org\/10.13039\/100004340","name":"Siemens USA","doi-asserted-by":"publisher","id":[{"id":"10.13039\/https:\/\/doi.org\/10.13039\/100004340","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/https:\/\/doi.org\/10.13039\/100004351","name":"Cisco Systems","doi-asserted-by":"publisher","id":[{"id":"10.13039\/https:\/\/doi.org\/10.13039\/100004351","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,4,28]]},"DOI":"10.1145\/3696410.3714702","type":"proceedings-article","created":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T22:47:11Z","timestamp":1745362031000},"page":"2579-2595","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Inferentially-Private Private Information"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4962-7501","authenticated-orcid":false,"given":"Shuaiqi","family":"Wang","sequence":"first","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2575-8283","authenticated-orcid":false,"given":"Shuran","family":"Zheng","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8421-2662","authenticated-orcid":false,"given":"Zinan","family":"Lin","sequence":"additional","affiliation":[{"name":"Microsoft Research, Redmond, WA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7671-2624","authenticated-orcid":false,"given":"Giulia","family":"Fanti","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8125-8227","authenticated-orcid":false,"given":"Zhiwei Steven","family":"Wu","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,4,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.3982\/ECTA13958"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1257\/jel.20181489"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25385-0_12"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1525\/9780520411586-009"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1214\/aoms"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1137\/110846671"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.3982\/ECTA16297"},{"key":"e_1_3_2_1_8_1","first-page":"429","article-title":"Towards a methodology for statistical disclosure control","volume":"15","author":"Dalenius T.","year":"1977","unstructured":"T. Dalenius. 1977. Towards a methodology for statistical disclosure control. Statistik Tidskrift 15, 429--444 (1977), 2--1.","journal-title":"Statistik Tidskrift"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897518.2897583"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_14"},{"key":"e_1_3_2_1_11_1","volume-title":"SEC Is Focusing on Earnings Manipulation by Companies. https:\/\/www.wsj.com\/articles\/sec-is-focusing-on-earnings-manipulationby-companies-9bc2c592. Wall Street Journal (March","author":"Eaglesham Jean","year":"2023","unstructured":"Jean Eaglesham. 2023. SEC Is Focusing on Earnings Manipulation by Companies. https:\/\/www.wsj.com\/articles\/sec-is-focusing-on-earnings-manipulationby-companies-9bc2c592. Wall Street Journal (March 2023). (Accessed on 08\/05\/2024)."},{"key":"e_1_3_2_1_12_1","volume-title":"Inferential privacy guarantees for differentially private mechanisms. arXiv preprint arXiv:1603.01508","author":"Ghosh Arpita","year":"2016","unstructured":"Arpita Ghosh and Robert Kleinberg. 2016. Inferential privacy guarantees for differentially private mechanisms. arXiv preprint arXiv:1603.01508 (2016)."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536464"},{"key":"e_1_3_2_1_14_1","unstructured":"Kevin He Fedor Sandomirskiy and Omer Tamuz. 2022. Private Private Information. arXiv:2112.14356 [econ.TH]"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1146\/annurev-economics-080218-025739"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1257\/aer.101.6.2590"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.29012\/jpc.v6i1.634"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2514689"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.2307\/2372255"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2019.2954652"},{"volume-title":"Proceedings of the 23rd ACM Conference on Economics and Computation (EC '22)","author":"Ian","key":"e_1_3_2_1_21_1","unstructured":"Ian M. Schmutte and Nathan Yoder. 2022. Information Design for Differential Privacy. In Proceedings of the 23rd ACM Conference on Economics and Computation (EC '22). Association for Computing Machinery, 1142--1143."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3035918.3064025"},{"key":"e_1_3_2_1_23_1","volume-title":"Privacy Preserving Signals. Available at SSRN 4467608","author":"Strack Philipp","year":"2024","unstructured":"Philipp Strack and Kai Hao Yang. 2024. Privacy Preserving Signals. Available at SSRN 4467608 (2024)."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3531146.3533139"}],"event":{"name":"WWW '25: The ACM Web Conference 2025","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"],"location":"Sydney NSW Australia","acronym":"WWW '25"},"container-title":["Proceedings of the ACM on Web Conference 2025"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3696410.3714702","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3696410.3714702","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:18:57Z","timestamp":1750295937000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3696410.3714702"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,22]]},"references-count":24,"alternative-id":["10.1145\/3696410.3714702","10.1145\/3696410"],"URL":"https:\/\/doi.org\/10.1145\/3696410.3714702","relation":{},"subject":[],"published":{"date-parts":[[2025,4,22]]},"assertion":[{"value":"2025-04-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}