{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T16:28:57Z","timestamp":1729614537208,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,10]]},"DOI":"10.1109\/focs.2016.59","type":"proceedings-article","created":{"date-parts":[[2016,12,17]],"date-time":"2016-12-17T03:07:55Z","timestamp":1481944075000},"page":"487-494","source":"Crossref","is-referenced-by-count":16,"title":["Max-Information, Differential Privacy, and Post-selection Hypothesis Testing"],"prefix":"10.1109","author":[{"given":"Ryan","family":"Rogers","sequence":"first","affiliation":[]},{"given":"Aaron","family":"Roth","sequence":"additional","affiliation":[]},{"given":"Adam","family":"Smith","sequence":"additional","affiliation":[]},{"given":"Om","family":"Thakkar","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Controlling bias in adaptive data analysis using information theory","author":"russo","year":"2016","journal-title":"Proceedings of the 19th International Conference on Artificial Intelligence and Statistics AISTATS"},{"key":"ref11","article-title":"A minimax theory for adaptive data analysis","volume":"abs 1602 4287","author":"wang","year":"2016","journal-title":"CoRR"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2487575.2487687"},{"key":"ref13","doi-asserted-by":"crossref","DOI":"10.29012\/jpc.v5i1.629","article-title":"Privacy-preserving data sharing for genome-wide association studies","volume":"5","author":"uhler","year":"2013","journal-title":"Journal of Privacy and Confidentiality"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2014.01.008"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1214\/15-AOS1358"},{"key":"ref16","article-title":"Private false discovery rate control","author":"dwork","year":"2015","journal-title":"arXiv preprint arXiv 1511 05271"},{"key":"ref17","article-title":"Differentially private least squares: Estimation, confidence and rejecting the null hypothesis","author":"sheffet","year":"2015","journal-title":"arXiv preprint arXiv 1507 02482"},{"key":"ref18","article-title":"Differentially private hypothesis testing, revisited","author":"wang","year":"2015","journal-title":"arXiv preprint arXiv 1511 05271"},{"key":"ref19","article-title":"Differentially private chi-squared hypothesis testing: Goodness of tit and independence testing","author":"gaboardi","year":"2016","journal-title":"arXiv preprint arXiv 1602 04875"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"486","DOI":"10.1007\/11761679_29","article-title":"Our data, ourselves: Privacy via distributed noise generation","author":"dwork","year":"2006","journal-title":"Advances in Cryptology - EUROCRYPT 2006 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1145\/2746539.2746580","article-title":"Preserving statistical validity in adaptive data analysis","author":"dwork","year":"2015","journal-title":"Proceedings of the Forty-Seventh Annual ACM on Symposium on Theory of Computing ser STOC'15"},{"key":"ref27","doi-asserted-by":"crossref","DOI":"10.29012\/jpc.v6i1.634","article-title":"On the ‘Semantics’ of Differential Privacy: A Bayesian Formulation","volume":"6","author":"kasiviswanathan","year":"2014","journal-title":"Journal of Privacy and Confidentiality"},{"key":"ref3","article-title":"Exact post-selection inference, with application to the lasso","author":"lee","year":"2013","journal-title":"arXiv preprint arXiv 1311 6238"},{"key":"ref6","first-page":"2341","article-title":"Generalization in adaptive data analysis and holdout reuse","volume":"28","author":"dwork","year":"2015","journal-title":"Advances in neural information processing systems"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2897518.2897566"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1080\/00031305.2016.1154108"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1511\/2014.111.460"},{"key":"ref2","article-title":"Optimal inference after model selection","author":"fithian","year":"2014","journal-title":"arXiv preprint arXiv 1410 2597"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1177\/0956797611417632"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1214\/12-AOS1077"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2010.12"},{"key":"ref22","first-page":"106","article-title":"The limits of two-party differential privacy","volume":"18","author":"mcgregor","year":"2011","journal-title":"Electronic Colloquium on Computational Complexity (ECCC)"},{"key":"ref21","first-page":"321","article-title":"Lower bounds in differential privacy","author":"de","year":"2012","journal-title":"Proceedings of the 9th InternationalConference on Theory of Cryptography ser TCC'12"},{"key":"ref24","article-title":"Adaptive learning with robust generalization guarantees","author":"cummings","year":"2016","journal-title":"arXiv preprint arXiv 1602 04875"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1007\/11681878_14","article-title":"Calibrating noise to sensitivity in private data analysis","author":"dwork","year":"2006","journal-title":"Proceedings of the 3rd Theory of Cryptography Conference"},{"key":"ref26","first-page":"1588","article-title":"Interactive fingerprinting codes and the hardness of preventing false discovery","author":"steinke","year":"2015","journal-title":"Proc 28th Conf Learn Theory"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2014.55"}],"event":{"name":"2016 IEEE 57th Annual Symposium on Foundations of Computer Science (FOCS)","start":{"date-parts":[[2016,10,9]]},"location":"New Brunswick, NJ, USA","end":{"date-parts":[[2016,10,11]]}},"container-title":["2016 IEEE 57th Annual Symposium on Foundations of Computer Science (FOCS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7781469\/7782901\/07782963.pdf?arnumber=7782963","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,16]],"date-time":"2019-09-16T12:49:07Z","timestamp":1568638147000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7782963\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/focs.2016.59","relation":{},"subject":[],"published":{"date-parts":[[2016,10]]}}}