{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T01:04:10Z","timestamp":1772240650842,"version":"3.50.1"},"reference-count":16,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"9","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Fundamentals"],"published-print":{"date-parts":[[2025,9,1]]},"DOI":"10.1587\/transfun.2024dmp0010","type":"journal-article","created":{"date-parts":[[2025,3,23]],"date-time":"2025-03-23T18:07:00Z","timestamp":1742753220000},"page":"1196-1205","source":"Crossref","is-referenced-by-count":1,"title":["Think Different: Adaptive Privacy Budget Allocation for Privacy-Preserving Machine Learning"],"prefix":"10.1587","volume":"E108.A","author":[{"given":"Bingchang","family":"HE","sequence":"first","affiliation":[{"name":"Graduate School of Engineering, Osaka University"}]},{"given":"Atsuko","family":"MIYAJI","sequence":"additional","affiliation":[{"name":"Graduate School of Engineering, Osaka University"}]}],"member":"532","reference":[{"key":"1","doi-asserted-by":"publisher","unstructured":"[1] J. Feng, L.T. Yang, X. Nie, and N.J. Gati, \u201cEdge-cloud-aided differentially private tucker decomposition for cyber-physical-social systems,\u201d IEEE Internet Things J., vol.9, no.11, pp.8387-8396, 2020. 10.1109\/jiot.2020.3004826","DOI":"10.1109\/JIOT.2020.3004826"},{"key":"2","doi-asserted-by":"publisher","unstructured":"[2] H. Hu, Z. Salcic, L. Sun, G. Dobbie, P.S. Yu, and X. Zhang, \u201cMembership inference attacks on machine learning: A survey,\u201d ACM Comput. Surv. (CSUR), vol.54, no.11s, pp.1-37, 2022. 10.1145\/3523273","DOI":"10.1145\/3523273"},{"key":"3","doi-asserted-by":"publisher","unstructured":"[3] K. Wei, J. Li, M. Ding, C. Ma, H.H. Yang, F. Farokhi, S. Jin, T.Q. Quek, and H.V. Poor, \u201cFederated learning with differential privacy: Algorithms and performance analysis,\u201d IEEE Trans. Inf. Forensics Security, vol.15, pp.3454-3469, 2020. 10.1109\/tifs.2020.2988575","DOI":"10.1109\/TIFS.2020.2988575"},{"key":"4","doi-asserted-by":"crossref","unstructured":"[4] J. Wang, S. He, and Q. Lin, \u201cRRML: Privacy preserving machine learning based on random response technology,\u201d International Conference on Network and System Security, NSS 2023, IEEE, 2023. 10.1007\/978-3-031-39828-5_12","DOI":"10.1007\/978-3-031-39828-5_12"},{"key":"5","doi-asserted-by":"crossref","unstructured":"[5] D. Wang and J. Xu, \u201cPrincipal component analysis in the local differential privacy model,\u201d Proc. Twenty-Eighth International Joint Conference on Artificial Intelligence, IJCAI-19, pp.4795-4801, International Joint Conferences on Artificial Intelligence Organization, July 2019. 10.24963\/ijcai.2019\/666","DOI":"10.24963\/ijcai.2019\/666"},{"key":"6","doi-asserted-by":"publisher","unstructured":"[6] C. Yin, B. Zhou, Z. Yin, and J. Wang, \u201cLocal privacy protection classification based on human-centric computing,\u201d Hum. Cent. Comput. Inf. Sci., vol.9, 33, 2019. 10.1186\/s13673-019-0195-4","DOI":"10.1186\/s13673-019-0195-4"},{"key":"7","doi-asserted-by":"publisher","unstructured":"[7] T. Wang, J. Zhao, Z. Hu, X. Yang, X. Ren, and K.Y. Lam, \u201cLocal differential privacy for data collection and analysis,\u201d Neurocomputing, vol.426, pp.114-133, 2021. 10.1016\/j.neucom.2020.09.073","DOI":"10.1016\/j.neucom.2020.09.073"},{"key":"8","doi-asserted-by":"crossref","unstructured":"[8] A. Miyaji, T. Takahashi, P. Wang, T. Yamatsuki, and T. Mimoto, \u201cPrivacy-preserving data analysis without trusted third party,\u201d IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, pp.710-717, IEEE, 2022. 10.1109\/trustcom56396.2022.00101","DOI":"10.1109\/TrustCom56396.2022.00101"},{"key":"9","doi-asserted-by":"crossref","unstructured":"[9] A. Miyaji, T. Yamatsuki, B. He, S. Yamashita, and T. Mimoto, \u201cRe-visited privacy-preserving machine learning,\u201d International Conference on Privacy, Security &amp; Trust, PST 2023, IEEE, 2023. 10.1109\/pst58708.2023.10320156","DOI":"10.1109\/PST58708.2023.10320156"},{"key":"10","doi-asserted-by":"crossref","unstructured":"[10] B. He and A. Miyaji, \u201cBalanced privacy budget allocation for privacy-preserving machine learning,\u201d International Conference on Information Security, pp.42-56, Springer, 2023. 10.1007\/978-3-031-49187-0_3","DOI":"10.1007\/978-3-031-49187-0_3"},{"key":"11","unstructured":"[11] P. Kairouz, S. Oh, and P. Viswanath, \u201cExtremal mechanisms for local differential privacy,\u201d Advances in Neural Information Processing Systems, vol.27, 2014."},{"key":"12","unstructured":"[12] F. Pedregosa, G. Varoquaux, A. Gramfort, V. Michel, B. Thirion, O. Grisel, M. Blondel, P. Prettenhofer, R. Weiss, V. Dubourg, J. Vanderplas, A. Passos, D. Cournapeau, M. Brucher, M. Perrot, and \u00c9. Duchesnay, \u201cScikit-learn: Machine learning in Python,\u201d Journal of Machine Learning Research, vol.12, no.85, pp.2825-2830, 2011."},{"key":"13","doi-asserted-by":"publisher","unstructured":"[13] X. Chen, C. Wang, Q. Yang, T. Hu, and C. Jiang, \u201cThe opportunity in difficulty: A dynamic privacy budget allocation mechanism for privacy-preserving multi-dimensional data collection,\u201d ACM Trans. Manage. Inf. Syst., vol.14, no.1, pp.1-24, Jan. 2023. 10.1145\/3569944","DOI":"10.1145\/3569944"},{"key":"14","unstructured":"[14] W. Wolberg, O. Mangasarian, N. Street, and W. Street, \u201cBreast cancer Wisconsin (diagnostic),\u201d UCI Machine Learning Repository, 1995. DOI: 10.24432\/C5DW2B. 10.24432\/C5DW2B"},{"key":"15","unstructured":"[15] V. Sigillito, S. Wing, L. Hutton, and K. Baker, \u201cIonosphere,\u201d UCI Machine Learning Repository, 1989. DOI: 10.24432\/C5W01B. 10.24432\/C5W01B"},{"key":"16","unstructured":"[16] D. Chapman and A. Jain, \u201cMusk (version 2),\u201d UCI Machine Learning Repository, 1994. DOI: 10.24432\/C51608. 10.24432\/C51608"}],"container-title":["IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transfun\/E108.A\/9\/E108.A_2024DMP0010\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,6]],"date-time":"2025-09-06T03:33:45Z","timestamp":1757129625000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transfun\/E108.A\/9\/E108.A_2024DMP0010\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,1]]},"references-count":16,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.1587\/transfun.2024dmp0010","relation":{},"ISSN":["0916-8508","1745-1337"],"issn-type":[{"value":"0916-8508","type":"print"},{"value":"1745-1337","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9,1]]},"article-number":"2024DMP0010"}}