{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,23]],"date-time":"2025-06-23T16:10:04Z","timestamp":1750695004475,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":66,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,6,15]]},"DOI":"10.1145\/3717823.3718295","type":"proceedings-article","created":{"date-parts":[[2025,6,15]],"date-time":"2025-06-15T23:34:42Z","timestamp":1750030482000},"page":"2374-2385","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Fingerprinting Codes Meet Geometry: Improved Lower Bounds for Private Query Release and Adaptive Data Analysis"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9440-5671","authenticated-orcid":false,"given":"Xin","family":"Lyu","sequence":"first","affiliation":[{"name":"University of California at Berkeley, Berkeley, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-5661-3541","authenticated-orcid":false,"given":"Kunal","family":"Talwar","sequence":"additional","affiliation":[{"name":"Apple, Cupertino, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,6,15]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"John M. Abowd Robert Ashmead Ryan Cumings-Menon Simson Garfinkel Micah Heineck Christine Heiss Robert Johns Daniel Kifer Philip Leclerc Ashwin Machanavajjhala Brett Moran William Sexton Matthew Spence and Pavel Zhuravlev. 2022. The 2020 Census Disclosure Avoidance System TopDown Algorithm. arxiv:2204.08986. arXiv 2204.08986","DOI":"10.1162\/99608f92.529e3cb9"},{"key":"e_1_3_2_1_2_1","volume-title":"Proceedings of the 32nd International Conference on Algorithmic Learning Theory, Vitaly Feldman, Katrina Ligett, and Sivan Sabato (Eds.) (Proceedings of Machine Learning Research","volume":"78","author":"Acharya Jayadev","year":"2021","unstructured":"Jayadev Acharya, Ziteng Sun, and Huanyu Zhang. 2021. Differentially Private Assouad, Fano, and Le Cam. In Proceedings of the 32nd International Conference on Algorithmic Learning Theory, Vitaly Feldman, Katrina Ligett, and Sivan Sabato (Eds.) (Proceedings of Machine Learning Research, Vol. 132). PMLR, 48\u201378. https:\/\/proceedings.mlr.press\/v132\/acharya21a.html"},{"key":"e_1_3_2_1_3_1","article-title":"Learning with privacy at scale","volume":"1","author":"Privacy Team Apple\u2019s Differential","year":"2017","unstructured":"Apple\u2019s Differential Privacy Team. 2017. Learning with privacy at scale. Apple Machine Learning Journal, 1, 9 (2017).","journal-title":"Apple Machine Learning Journal"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897518.2897566"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2014.56"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3519935.3520064"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3498334"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3375395.3387643"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","unstructured":"Guy Blanc. 2024. Subsampling Suffices for Adaptive Data Analysis. J. ACM Oct. issn:0004-5411 https:\/\/doi.org\/10.1145\/3698104 10.1145\/3698104","DOI":"10.1145\/3698104"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/3310435.3310587"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065167.1065184"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2450142.2450148"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/18.705568"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53641-4_24"},{"key":"e_1_3_2_1_15_1","volume-title":"Vadhan","author":"Bun Mark","year":"2014","unstructured":"Mark Bun, Jonathan R. Ullman, and Salil P. Vadhan. 2014. Fingerprinting codes and the price of approximate differential privacy. In STOC. ACM, 1\u201310."},{"key":"e_1_3_2_1_16_1","volume-title":"Score Attack: A Lower Bound Technique for Optimal Differentially Private Learning. arxiv:2303.07152. arxiv:2303.07152","author":"Cai T. Tony","year":"2023","unstructured":"T. Tony Cai, Yichen Wang, and Linjun Zhang. 2023. Score Attack: A Lower Bound Technique for Optimal Differentially Private Learning. arxiv:2303.07152. arxiv:2303.07152"},{"key":"e_1_3_2_1_17_1","first-page":"1","article-title":"Generalized Private Selection and Testing with High Confidence. In ITCS (LIPIcs, Vol. 251)","volume":"39","author":"Cohen Edith","year":"2023","unstructured":"Edith Cohen, Xin Lyu, Jelani Nelson, Tam\u00e1s Sarl\u00f3s, and Uri Stemmer. 2023. Generalized Private Selection and Testing with High Confidence. In ITCS (LIPIcs, Vol. 251). Schloss Dagstuhl - Leibniz-Zentrum f\u00fcr Informatik, 39:1\u201339:23.","journal-title":"Schloss Dagstuhl - Leibniz-Zentrum f\u00fcr Informatik"},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings of Thirty Fifth Conference on Learning Theory, Po-Ling Loh and Maxim Raginsky (Eds.) (Proceedings of Machine Learning Research","volume":"661","author":"Dagan Yuval","year":"2022","unstructured":"Yuval Dagan and Gil Kur. 2022. A bounded-noise mechanism for differential privacy. In Proceedings of Thirty Fifth Conference on Learning Theory, Po-Ling Loh and Maxim Raginsky (Eds.) (Proceedings of Machine Learning Research, Vol. 178). PMLR, 625\u2013661. https:\/\/proceedings.mlr.press\/v178\/dagan22a.html"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/3294996.3295115"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"Irit Dinur and Kobbi Nissim. 2003. Revealing information while preserving privacy. In PODS. ACM 202\u2013210.","DOI":"10.1145\/773153.773173"},{"key":"e_1_3_2_1_21_1","volume-title":"Advances in Cryptology \u2013 EUROCRYPT","author":"Dinur Itai","year":"2023","unstructured":"Itai Dinur, Uri Stemmer, David P. Woodruff, and Samson Zhou. 2023. On Differential Privacy and\u00a0Adaptive Data Analysis with\u00a0Bounded Space. In Advances in Cryptology \u2013 EUROCRYPT 2023, Carmit Hazay and Martijn Stam (Eds.). Springer Nature Switzerland, Cham. 35\u201365. isbn:978-3-031-30620-4"},{"key":"e_1_3_2_1_22_1","volume-title":"Advances in Neural Information Processing Systems","author":"Dwork Cynthia","year":"2015","unstructured":"Cynthia Dwork, Vitaly Feldman, Moritz Hardt, Toni Pitassi, Omer Reingold, and Aaron Roth. 2015. Generalization in Adaptive Data Analysis and Holdout Reuse. In Advances in Neural Information Processing Systems, C. Cortes, N. Lawrence, D. Lee, M. Sugiyama, and R. Garnett (Eds.). 28, Curran Associates, Inc.. https:\/\/proceedings.neurips.cc\/paper_files\/paper\/2015\/file\/bad5f33780c42f2588878a9d07405083-Paper.pdf"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.aaa9375"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2746539.2746580"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.29012\/jpc.v7i3.405"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250790.1250804"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536467"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00454-015-9678-x"},{"key":"e_1_3_2_1_29_1","volume-title":"Rothblum","author":"Dwork Cynthia","year":"2016","unstructured":"Cynthia Dwork and Guy N. Rothblum. 2016. Concentrated Differential Privacy. CoRR, abs\/1603.01887 (2016), arXiv:1603.01887. arxiv:1603.01887"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2010.12"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2015.46"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2591796.2591883"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85174-5_26"},{"key":"e_1_3_2_1_34_1","volume-title":"Challenges in Bayesian Adaptive Data Analysis. CoRR, abs\/1604.02492","author":"Elder Sam","year":"2016","unstructured":"Sam Elder. 2016. Challenges in Bayesian Adaptive Data Analysis. CoRR, abs\/1604.02492 (2016), arXiv:1604.02492. arxiv:1604.02492"},{"key":"e_1_3_2_1_35_1","unstructured":"Vitaly Feldman Audra McMillan Satchit Sivakumar and Kunal Talwar. 2024. Instance-Optimal Private Density Estimation in the Wasserstein Distance. In Advances in Neural Information Processing Systems."},{"key":"e_1_3_2_1_36_1","volume-title":"Proceedings of the 2017 Conference on Learning Theory, Satyen Kale and Ohad Shamir (Eds.) (Proceedings of Machine Learning Research","volume":"757","author":"Feldman Vitaly","year":"2017","unstructured":"Vitaly Feldman and Thomas Steinke. 2017. Generalization for Adaptively-chosen Estimators via Stable Median. In Proceedings of the 2017 Conference on Learning Theory, Satyen Kale and Ohad Shamir (Eds.) (Proceedings of Machine Learning Research, Vol. 65). PMLR, 728\u2013757. https:\/\/proceedings.mlr.press\/v65\/feldman17a.html"},{"key":"e_1_3_2_1_37_1","volume-title":"Proceedings of the 31st Conference On Learning Theory, S\u00e9bastien Bubeck, Vianney Perchet, and Philippe Rigollet (Eds.) (Proceedings of Machine Learning Research","volume":"544","author":"Feldman Vitaly","year":"2018","unstructured":"Vitaly Feldman and Thomas Steinke. 2018. Calibrating Noise to Variance in Adaptive Data Analysis. In Proceedings of the 31st Conference On Learning Theory, S\u00e9bastien Bubeck, Vianney Perchet, and Philippe Rigollet (Eds.) (Proceedings of Machine Learning Research, Vol. 75). PMLR, 535\u2013544. https:\/\/proceedings.mlr.press\/v75\/feldman18a.html"},{"key":"e_1_3_2_1_38_1","volume-title":"Proceedings of the 31st International Conference on Algorithmic Learning Theory, Aryeh Kontorovich and Gergely Neu (Eds.) (Proceedings of Machine Learning Research","volume":"318","author":"Fish Benjamin","unstructured":"Benjamin Fish, Lev Reyzin, and Benjamin I. P. Rubinstein. 2020. Sampling Without Compromising Accuracy in Adaptive Data Analysis. In Proceedings of the 31st International Conference on Algorithmic Learning Theory, Aryeh Kontorovich and Gergely Neu (Eds.) (Proceedings of Machine Learning Research, Vol. 117). PMLR, 297\u2013318. https:\/\/proceedings.mlr.press\/v117\/fish20a.html"},{"volume-title":"A Study of Privacy and Fairness in Sensitive Data Analysis. Ph. D. Dissertation","author":"Hardt Moritz","key":"e_1_3_2_1_39_1","unstructured":"Moritz Hardt. 2011. A Study of Privacy and Fairness in Sensitive Data Analysis. Ph. D. Dissertation. Princeton University, USA."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2010.85"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806689.1806786"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2014.55"},{"key":"e_1_3_2_1_43_1","volume-title":"Advances in Neural Information Processing Systems","author":"Hasidim Avinatan","year":"2020","unstructured":"Avinatan Hasidim, Haim Kaplan, Yishay Mansour, Yossi Matias, and Uri Stemmer. 2020. Adversarially Robust Streaming Algorithms via Differential Privacy. In Advances in Neural Information Processing Systems, H. Larochelle, M. Ranzato, R. Hadsell, M.F. Balcan, and H. Lin (Eds.). 33, Curran Associates, Inc., 147\u2013158. https:\/\/proceedings.neurips.cc\/paper_files\/paper\/2020\/file\/0172d289da48c48de8c5ebf3de9f7ee1-Paper.pdf"},{"key":"e_1_3_2_1_44_1","unstructured":"Shlomi Hod and Ran Canetti. 2024. Differentially Private Release of Israel\u2019s National Registry of Live Births. arxiv:2405.00267."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3406325.3465358"},{"key":"e_1_3_2_1_46_1","volume-title":"Advances in Neural Information Processing Systems, S. Koyejo, S. Mohamed, A. Agarwal, D. Belgrave, K. Cho, and A. Oh (Eds.). 35, Curran Associates","author":"Kamath Gautam","year":"2022","unstructured":"Gautam Kamath, Argyris Mouzakis, and Vikrant Singhal. 2022. New Lower Bounds for Private Estimation and a Generalized Fingerprinting Lemma. In Advances in Neural Information Processing Systems, S. Koyejo, S. Mohamed, A. Agarwal, D. Belgrave, K. Cho, and A. Oh (Eds.). 35, Curran Associates, Inc., 24405\u201324418. https:\/\/proceedings.neurips.cc\/paper_files\/paper\/2022\/file\/9a6b278218966499194491f55ccf8b75-Paper-Conference.pdf"},{"key":"e_1_3_2_1_47_1","unstructured":"Aryeh Kontorovich Menachem Sadigurschi and Uri Stemmer. 2022. Adaptive Data Analysis with Correlated Observations. In Proceedings of the 39th International Conference on Machine Learning Kamalika Chaudhuri Stefanie Jegelka Le Song Csaba Szepesvari Gang Niu and Sivan Sabato (Eds.) (Proceedings of Machine Learning Research Vol. 162). PMLR 11483\u201311498. https:\/\/proceedings.mlr.press\/v162\/kontorovich22a.html"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"crossref","unstructured":"S. Muthukrishnan and Aleksandar Nikolov. 2012. Optimal private halfspace counting via discrepancy. In STOC. ACM 1285\u20131292.","DOI":"10.1145\/2213977.2214090"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.2310.06289"},{"key":"e_1_3_2_1_50_1","unstructured":"Shyam Narayanan Vahab Mirrokni and Hossein Esfandiari. 2022. Tight and Robust Private Mean Estimation with Few Users. In Proceedings of the 39th International Conference on Machine Learning Kamalika Chaudhuri Stefanie Jegelka Le Song Csaba Szepesvari Gang Niu and Sivan Sabato (Eds.) (Proceedings of Machine Learning Research Vol. 162). PMLR 16383\u201316412. https:\/\/proceedings.mlr.press\/v162\/narayanan22a.html"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2488608.2488652"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.5555\/3327345.3327536"},{"key":"e_1_3_2_1_53_1","volume-title":"Proceedings of the 37th International Conference on Neural Information Processing Systems (NIPS \u201923)","author":"Nissim Kobbi","year":"2024","unstructured":"Kobbi Nissim, Uri Stemmer, and Eliad Tsfadia. 2024. Adaptive data analysis in a balanced adversarial model. In Proceedings of the 37th International Conference on Neural Information Processing Systems (NIPS \u201923). Curran Associates Inc., Red Hook, NY, USA. Article 1120, 13 pages."},{"key":"e_1_3_2_1_54_1","volume-title":"Proceedings of Thirty Seventh Conference on Learning Theory, Shipra Agrawal and Aaron Roth (Eds.) (Proceedings of Machine Learning Research","volume":"4239","author":"Peter Naty","year":"2024","unstructured":"Naty Peter, Eliad Tsfadia, and Jonathan Ullman. 2024. Smooth Lower Bounds for Differentially Private Algorithms via Padding-and-Permuting Fingerprinting Codes. In Proceedings of Thirty Seventh Conference on Learning Theory, Shipra Agrawal and Aaron Roth (Eds.) (Proceedings of Machine Learning Research, Vol. 247). PMLR, 4207\u20134239. https:\/\/proceedings.mlr.press\/v247\/peter24a.html"},{"key":"e_1_3_2_1_55_1","volume-title":"Lower Bounds for Private Estimation of Gaussian Covariance Matrices under All Reasonable Parameter Regimes. ArXiv, abs\/2404.17714","author":"Portella Victor Sanches","year":"2024","unstructured":"Victor Sanches Portella and Nick Harvey. 2024. Lower Bounds for Private Estimation of Gaussian Covariance Matrices under All Reasonable Parameter Regimes. ArXiv, abs\/2404.17714 (2024), https:\/\/api.semanticscholar.org\/CorpusID:269448715"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2016.59"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806689.1806794"},{"key":"e_1_3_2_1_58_1","volume-title":"Proceedings of the 19th International Conference on Artificial Intelligence and Statistics, Arthur Gretton and Christian C. Robert (Eds.) (Proceedings of Machine Learning Research","volume":"1240","author":"Russo Daniel","year":"2016","unstructured":"Daniel Russo and James Zou. 2016. Controlling Bias in Adaptive Data Analysis Using Information Theory. In Proceedings of the 19th International Conference on Artificial Intelligence and Statistics, Arthur Gretton and Christian C. Robert (Eds.) (Proceedings of Machine Learning Research, Vol. 51). PMLR, Cadiz, Spain. 1232\u20131240. https:\/\/proceedings.mlr.press\/v51\/russo16.html"},{"key":"e_1_3_2_1_59_1","volume-title":"Advances in Neural Information Processing Systems, H. Wallach, H. Larochelle, A. Beygelzimer, F. d' Alch\u00e9-Buc","author":"Shenfeld Moshe","year":"2019","unstructured":"Moshe Shenfeld and Katrina Ligett. 2019. A Necessary and Sufficient Stability Notion for Adaptive Generalization. In Advances in Neural Information Processing Systems, H. Wallach, H. Larochelle, A. Beygelzimer, F. d' Alch\u00e9-Buc, E. Fox, and R. Garnett (Eds.). 32, Curran Associates, Inc.. https:\/\/proceedings.neurips.cc\/paper_files\/paper\/2019\/file\/c5df4f4eabf1cbcfeb50fbbf97c5289f-Paper.pdf"},{"key":"e_1_3_2_1_60_1","volume-title":"Information, Privacy and Stability in Adaptive Data Analysis. CoRR, abs\/1706.00820","author":"Smith Adam D.","year":"2017","unstructured":"Adam D. Smith. 2017. Information, Privacy and Stability in Adaptive Data Analysis. CoRR, abs\/1706.00820 (2017), arXiv:1706.00820. arxiv:1706.00820"},{"key":"e_1_3_2_1_61_1","volume-title":"Proceedings of The 28th Conference on Learning Theory, Peter Gr\u00fcnwald, Elad Hazan, and Satyen Kale (Eds.) (Proceedings of Machine Learning Research","volume":"1628","author":"Steinke Thomas","year":"2015","unstructured":"Thomas Steinke and Jonathan Ullman. 2015. Interactive Fingerprinting Codes and the Hardness of Preventing False Discovery. In Proceedings of The 28th Conference on Learning Theory, Peter Gr\u00fcnwald, Elad Hazan, and Satyen Kale (Eds.) (Proceedings of Machine Learning Research, Vol. 40). PMLR, Paris, France. 1588\u20131628. https:\/\/proceedings.mlr.press\/v40\/Steinke15.html"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2017.57"},{"key":"e_1_3_2_1_63_1","article-title":"Between Pure and Approximate Differential Privacy","volume":"7","author":"Steinke Thomas","year":"2016","unstructured":"Thomas Steinke and Jonathan R. Ullman. 2016. Between Pure and Approximate Differential Privacy. J. Priv. Confidentiality, 7, 2 (2016).","journal-title":"J. Priv. Confidentiality"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/780542.780561"},{"key":"e_1_3_2_1_65_1","unstructured":"Zheng Xu Yanxiang Zhang Galen Andrew Christopher A. Choquette-Choo Peter Kairouz H. Brendan McMahan Jesse Rosenstock and Yuanbo Zhang. 2023. Federated Learning of Gboard Language Models with Differential Privacy. arxiv:2305.18465."},{"key":"e_1_3_2_1_66_1","unstructured":"Yuanbo Zhang Daniel Ramage Zheng Xu Yanxiang Zhang Shumin Zhai and Peter Kairouz. 2023. Private Federated Learning in Gboard. arxiv:2306.14793."}],"event":{"name":"STOC '25: 57th Annual ACM Symposium on Theory of Computing","sponsor":["SIGACT ACM Special Interest Group on Algorithms and Computation Theory"],"location":"Prague Czechia","acronym":"STOC '25"},"container-title":["Proceedings of the 57th Annual ACM Symposium on Theory of Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3717823.3718295","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,23]],"date-time":"2025-06-23T15:49:22Z","timestamp":1750693762000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3717823.3718295"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,15]]},"references-count":66,"alternative-id":["10.1145\/3717823.3718295","10.1145\/3717823"],"URL":"https:\/\/doi.org\/10.1145\/3717823.3718295","relation":{},"subject":[],"published":{"date-parts":[[2025,6,15]]},"assertion":[{"value":"2025-06-15","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}