{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,23]],"date-time":"2025-06-23T16:10:05Z","timestamp":1750695005538,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","funder":[{"name":"NSF (National Science Foundation)","award":["CCF-1763786, CNS-2120667, DMS-2022446"],"award-info":[{"award-number":["CCF-1763786, CNS-2120667, DMS-2022446"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,6,15]]},"DOI":"10.1145\/3717823.3718247","type":"proceedings-article","created":{"date-parts":[[2025,6,15]],"date-time":"2025-06-15T22:21:27Z","timestamp":1750026087000},"page":"2350-2361","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Privately Evaluating Untrusted Black-Box Functions"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-1143-3649","authenticated-orcid":false,"given":"Ephraim","family":"Linder","sequence":"first","affiliation":[{"name":"Boston University, Boston, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4902-050X","authenticated-orcid":false,"given":"Sofya","family":"Raskhodnikova","sequence":"additional","affiliation":[{"name":"Boston University, Boston, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9393-1127","authenticated-orcid":false,"given":"Adam","family":"Smith","sequence":"additional","affiliation":[{"name":"Boston University, Boston, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-1977-0197","authenticated-orcid":false,"given":"Thomas","family":"Steinke","sequence":"additional","affiliation":[{"name":"Google Research, Mountain View, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,6,15]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"14106","article-title":"Instance-optimality in differential privacy via approximate inverse sensitivity mechanisms","author":"Asi Hilal","year":"2020","unstructured":"Hilal Asi and John C Duchi. 2020. Instance-optimality in differential privacy via approximate inverse sensitivity mechanisms. In Advances in Neural Information Processing Systems. 33, Curran Associates, Inc., 14106\u201314117.","journal-title":"Advances in Neural Information Processing Systems. 33, Curran Associates, Inc."},{"key":"e_1_3_2_1_2_1","first-page":"1121","article-title":"From Robustness to Privacy and Back. In Proceedings of the 40th International Conference on Machine Learning","volume":"202","author":"Asi Hilal","year":"2023","unstructured":"Hilal Asi, Jonathan Ullman, and Lydia Zakynthinou. 2023. From Robustness to Privacy and Back. In Proceedings of the 40th International Conference on Machine Learning, ICML. 202, 1121\u20131146.","journal-title":"ICML."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2692372.2692373"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","unstructured":"Jeremiah Blocki Avrim Blum Anupam Datta and Or Sheffet. 2013. Differentially private data analysis of social networks via restricted sensitivity. In Innovations in Theoretical Computer Science ITCS. ACM 87\u201396. https:\/\/doi.org\/10.1145\/2422436.2422449 10.1145\/2422436.2422449","DOI":"10.1145\/2422436.2422449"},{"key":"e_1_3_2_1_5_1","first-page":"1369","article-title":"Private Graphon Estimation for Sparse Graphs","volume":"28","author":"Borgs Christian","year":"2015","unstructured":"Christian Borgs, Jennifer T. Chayes, and Adam D. Smith. 2015. Private Graphon Estimation for Sparse Graphs. In Advances in Neural Information Processing Systems. 28, 1369\u20131377.","journal-title":"Advances in Neural Information Processing Systems."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2018.00057"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3188745.3188946"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2015.45"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53641-4_24"},{"key":"e_1_3_2_1_10_1","first-page":"90771","article-title":"Private Edge Density Estimation for Random Graphs: Optimal, Efficient and Robust","author":"Chen Hongjie","year":"2024","unstructured":"Hongjie Chen, Jingqiu Ding, Yiding Hua, and David Steurer. 2024. Private Edge Density Estimation for Random Graphs: Optimal, Efficient and Robust. In Advances in Neural Information Processing Systems. 37, Curran Associates, Inc., 90771\u201390817.","journal-title":"Advances in Neural Information Processing Systems. 37, Curran Associates, Inc."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2463676.2465304"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3564246.3585148"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611975994.32"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2882903.2926745"},{"key":"e_1_3_2_1_15_1","unstructured":"Jinshuo Dong Aaron Roth and Weijie J Su. 2019. Gaussian differential privacy. arXiv preprint arXiv:1905.02383."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536466"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.29012\/JPC.V7I3.405"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1561\/0400000042"},{"key":"e_1_3_2_1_19_1","volume-title":"Rothblum","author":"Dwork Cynthia","year":"2016","unstructured":"Cynthia Dwork and Guy N. Rothblum. 2016. Concentrated Differential Privacy. CoRR, abs\/1603.01887 (2016), arXiv:1603.01887. arxiv:1603.01887"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560567"},{"key":"e_1_3_2_1_21_1","volume-title":"On User-Level Private Convex Optimization. In International Conference on Machine Learning, ICML (Proceedings of Machine Learning Research","volume":"11299","author":"Ghazi Badih","year":"2023","unstructured":"Badih Ghazi, Pritish Kamath, Ravi Kumar, Pasin Manurangsi, Raghu Meka, and Chiyuan Zhang. 2023. On User-Level Private Convex Optimization. In International Conference on Machine Learning, ICML (Proceedings of Machine Learning Research, Vol. 202). PMLR, 11283\u201311299."},{"key":"e_1_3_2_1_22_1","unstructured":"Badih Ghazi Pritish Kamath Ravi Kumar Pasin Manurangsi Raghu Meka and Chiyuan Zhang. 2023. User-Level Differential Privacy With Few Examples Per User. In Advances in Neural Information Processing Systems 36 (NeurIPS)."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1137\/09076828X"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3564246.3585115"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1002\/9780470434697"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP54263.2024.00196"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1137\/110840741"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3584372.3588671"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.5555\/1283383.1283478"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36594-2_26"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.56553\/POPETS-2023-0089"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611978322.93"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"crossref","unstructured":"Ephraim Linder Sofya Raskhodnikova Adam Smith and Thomas Steinke. 2025. Privately Evaluating Untrusted Black-Box Functions. arxiv:2503.19268.","DOI":"10.1145\/3717823.3718247"},{"key":"e_1_3_2_1_34_1","unstructured":"Xin Lyu and Thomas Steinke. 2025. Differentially Private Algorithms that Never Fail. DifferentialPrivacy.org. https:\/\/differentialprivacy.org\/fail-prob\/"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1002\/9781119214656"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250790.1250803"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4939-2864-4_549"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2016.60"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.29012\/jpc.745"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1993636.1993743"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.4230\/LIPIcs.ITCS.2018.45"},{"key":"e_1_3_2_1_42_1","unstructured":"Thomas Steinke. 2023. Beyond Local Sensitivity via Down Sensitivity. DifferentialPrivacy.org. https:\/\/differentialprivacy.org\/down-sensitivity\/"}],"event":{"name":"STOC '25: 57th Annual ACM Symposium on Theory of Computing","sponsor":["SIGACT ACM Special Interest Group on Algorithms and Computation Theory"],"location":"Prague Czechia","acronym":"STOC '25"},"container-title":["Proceedings of the 57th Annual ACM Symposium on Theory of Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3717823.3718247","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,23]],"date-time":"2025-06-23T15:46:13Z","timestamp":1750693573000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3717823.3718247"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,15]]},"references-count":42,"alternative-id":["10.1145\/3717823.3718247","10.1145\/3717823"],"URL":"https:\/\/doi.org\/10.1145\/3717823.3718247","relation":{},"subject":[],"published":{"date-parts":[[2025,6,15]]},"assertion":[{"value":"2025-06-15","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}