{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,4]],"date-time":"2025-04-04T00:46:17Z","timestamp":1743727577864,"version":"3.37.3"},"publisher-location":"New York, NY, USA","reference-count":44,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,6,14]],"date-time":"2015-06-14T00:00:00Z","timestamp":1434240000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS 1253345, CCF 1101389"],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,6,14]]},"DOI":"10.1145\/2746539.2746580","type":"proceedings-article","created":{"date-parts":[[2015,6,3]],"date-time":"2015-06-03T15:35:56Z","timestamp":1433345756000},"page":"117-126","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":110,"title":["Preserving Statistical Validity in Adaptive Data Analysis"],"prefix":"10.1145","author":[{"given":"Cynthia","family":"Dwork","sequence":"first","affiliation":[{"name":"Microsoft Research, Mountain View, CA, USA"}]},{"given":"Vitaly","family":"Feldman","sequence":"additional","affiliation":[{"name":"IBM Research, San Jose, CA, USA"}]},{"given":"Moritz","family":"Hardt","sequence":"additional","affiliation":[{"name":"IBM Research, San Jose, CA, USA"}]},{"given":"Toniann","family":"Pitassi","sequence":"additional","affiliation":[{"name":"University of Toronto, Toronto, Canada"}]},{"given":"Omer","family":"Reingold","sequence":"additional","affiliation":[{"name":"Samsung Research, Sunnyvale, CA, USA"}]},{"given":"Aaron Leon","family":"Roth","sequence":"additional","affiliation":[{"name":"University of Pennsylvania, Philadelphia, PA, USA"}]}],"member":"320","published-online":{"date-parts":[[2015,6,14]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Five lessons from Kaggle's event recommendation engine challenge. http:\/\/www.rouli.net\/2013\/02\/five-lessons-from-kaggles-event.html. Accessed: 2014-10-07. Five lessons from Kaggle's event recommendation engine challenge. http:\/\/www.rouli.net\/2013\/02\/five-lessons-from-kaggles-event.html. Accessed: 2014-10-07."},{"key":"e_1_3_2_1_2_1","unstructured":"Kaggle blog: No free hunch. http:\/\/blog.kaggle.com\/. Accessed: 2014-10-07. Kaggle blog: No free hunch. http:\/\/blog.kaggle.com\/. Accessed: 2014-10-07."},{"key":"e_1_3_2_1_3_1","unstructured":"Kaggle user forums. https:\/\/www.kaggle.com\/forums. Accessed: 2014-10-07. Kaggle user forums. https:\/\/www.kaggle.com\/forums. Accessed: 2014-10-07."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCBB.2010.105"},{"key":"e_1_3_2_1_5_1","volume-title":"Generalized a-investing: definitions, optimality results and application to public databases. Journal of the Royal Statistical Society: Series B (Statistical Methodology), 76(4):771--794","author":"Aharoni E.","year":"2014","unstructured":"E. Aharoni and S. Rosset . Generalized a-investing: definitions, optimality results and application to public databases. Journal of the Royal Statistical Society: Series B (Statistical Methodology), 76(4):771--794 , 2014 . E. Aharoni and S. Rosset. Generalized a-investing: definitions, optimality results and application to public databases. Journal of the Royal Statistical Society: Series B (Statistical Methodology), 76(4):771--794, 2014."},{"key":"e_1_3_2_1_6_1","volume-title":"More general queries and less generalization error in adaptive data analysis. CoRR, abs\/1503.04843","author":"Bassily R.","year":"2015","unstructured":"R. Bassily , A. Smith , T. Steinke , and J. Ullman . More general queries and less generalization error in adaptive data analysis. CoRR, abs\/1503.04843 , 2015 . R. Bassily, A. Smith, T. Steinke, and J. Ullman. More general queries and less generalization error in adaptive data analysis. CoRR, abs\/1503.04843, 2015."},{"key":"e_1_3_2_1_7_1","volume-title":"Private empirical risk minimization, revisited. CoRR, abs\/1405.7085","author":"Bassily R.","year":"2014","unstructured":"R. Bassily , A. Smith , and A. Thakurta . Private empirical risk minimization, revisited. CoRR, abs\/1405.7085 , 2014 . R. Bassily, A. Smith, and A. Thakurta. Private empirical risk minimization, revisited. CoRR, abs\/1405.7085, 2014."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1038\/483531a"},{"key":"e_1_3_2_1_9_1","volume-title":"Controlling the false discovery rate -- a practical and powerful approach to multiple testing. Journal of the Royal Statistics Society: Series B (Statistical Methodology), 57:289--300","author":"Benjamini Y.","year":"1995","unstructured":"Y. Benjamini and Y. Hochberg . Controlling the false discovery rate -- a practical and powerful approach to multiple testing. Journal of the Royal Statistics Society: Series B (Statistical Methodology), 57:289--300 , 1995 . Y. Benjamini and Y. Hochberg. Controlling the false discovery rate -- a practical and powerful approach to multiple testing. Journal of the Royal Statistics Society: Series B (Statistical Methodology), 57:289--300, 1995."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065167.1065184"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1162\/153244302760200704"},{"key":"e_1_3_2_1_12_1","first-page":"281","volume-title":"Proceedings of NIPS","author":"Chu C.","year":"2006","unstructured":"C. Chu , S. Kim , Y. Lin , Y. Yu , G. Bradski , A. Ng , and K. Olukotun . Map-reduce for machine learning on multicore . In Proceedings of NIPS , pages 281 -- 288 , 2006 . C. Chu, S. Kim, Y. Lin, Y. Yu, G. Bradski, A. Ng, and K. Olukotun. Map-reduce for machine learning on multicore. In Proceedings of NIPS, pages 281--288, 2006."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/773153.773173"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866739.1866758"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/11761679_29"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_14"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536467"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-28628-8_32"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1561\/0400000042"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1561\/0400000042"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2488608.2488692"},{"key":"e_1_3_2_1_22_1","volume-title":"Alpha-investing: A procedure for sequential control of expected false discoveries. J. Royal Statistical Soc.: Series B (Statistical Methodology), 70(2):429--444","author":"Foster D.","year":"2008","unstructured":"D. Foster and R. Stine . Alpha-investing: A procedure for sequential control of expected false discoveries. J. Royal Statistical Soc.: Series B (Statistical Methodology), 70(2):429--444 , 2008 . D. Foster and R. Stine. Alpha-investing: A procedure for sequential control of expected false discoveries. J. Royal Statistical Soc.: Series B (Statistical Methodology), 70(2):429--444, 2008."},{"issue":"2","key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","first-page":"152","DOI":"10.1080\/00031305.1983.10482729","article-title":"A note on screening regression equations","volume":"37","author":"Freedman D. A.","year":"1983","unstructured":"D. A. Freedman . A note on screening regression equations . The American Statistician , 37 ( 2 ): 152 -- 155 , 1983 . D. A. Freedman. A note on screening regression equations. The American Statistician, 37(2):152--155, 1983.","journal-title":"The American Statistician"},{"key":"e_1_3_2_1_24_1","volume-title":"The garden of forking paths: Why multiple comparisons can be a problem, even when there is no \"fishing expedition\" or \"p-hacking\" and the research hypothesis was posited ahead of time","author":"Gelman A.","year":"2013","unstructured":"A. Gelman and E. Loken . The garden of forking paths: Why multiple comparisons can be a problem, even when there is no \"fishing expedition\" or \"p-hacking\" and the research hypothesis was posited ahead of time , 2013 . A. Gelman and E. Loken. The garden of forking paths: Why multiple comparisons can be a problem, even when there is no \"fishing expedition\" or \"p-hacking\" and the research hypothesis was posited ahead of time, 2013."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2010.85"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2014.55"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-84858-7"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1001\/jama.294.2.218"},{"issue":"8","key":"e_1_3_2_1_29_1","first-page":"124","volume":"2","author":"Ioannidis J. P. A.","year":"2005","unstructured":"J. P. A. Ioannidis . Why Most Published Research Findings Are False. PLoS Medicine , 2 ( 8 ): 124 , Aug. 2005 . J. P. A. Ioannidis. Why Most Published Research Findings Are False. PLoS Medicine, 2(8):124, Aug. 2005.","journal-title":"Why Most Published Research Findings Are False. PLoS Medicine"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/293347.293351"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.5555\/200548"},{"key":"e_1_3_2_1_32_1","unstructured":"F. McSherry and K. Talwar 2014. Personal communication. F. McSherry and K. Talwar 2014. Personal communication."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10444-004-7634-z"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1038\/nature02341"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1038\/nrd3439-c1"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972788.54"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.5555\/944919.944978"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806689.1806794"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781107298019"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.5555\/1756006.1953019"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1177\/0956797611417632"},{"key":"e_1_3_2_1_42_1","volume-title":"Interactive fingerprinting codes and the hardness of preventing false discovery. arXiv preprint arXiv:1410.1228","author":"Steinke T.","year":"2014","unstructured":"T. Steinke and J. Ullman . Interactive fingerprinting codes and the hardness of preventing false discovery. arXiv preprint arXiv:1410.1228 , 2014 . T. Steinke and J. Ullman. Interactive fingerprinting codes and the hardness of preventing false discovery. arXiv preprint arXiv:1410.1228, 2014."},{"key":"e_1_3_2_1_43_1","volume-title":"Learning with differential privacy: Stability, learnability and the sufficiency and necessity of ERM principle. CoRR, abs\/1502.06309","author":"Wang Y.","year":"2015","unstructured":"Y. Wang , J. Lei , and S. E. Fienberg . Learning with differential privacy: Stability, learnability and the sufficiency and necessity of ERM principle. CoRR, abs\/1502.06309 , 2015 . Y. Wang, J. Lei, and S. E. Fienberg. Learning with differential privacy: Stability, learnability and the sufficiency and necessity of ERM principle. CoRR, abs\/1502.06309, 2015."},{"key":"e_1_3_2_1_44_1","unstructured":"D. Wind. Learning from the best. http:\/\/blog.kaggle.com\/2014\/08\/01\/learning-from-the-best\/. Accessed: 2014-10-07. D. Wind. Learning from the best. http:\/\/blog.kaggle.com\/2014\/08\/01\/learning-from-the-best\/. Accessed: 2014-10-07."}],"event":{"name":"STOC '15: Symposium on Theory of Computing","sponsor":["SIGACT ACM Special Interest Group on Algorithms and Computation Theory"],"location":"Portland Oregon USA","acronym":"STOC '15"},"container-title":["Proceedings of the forty-seventh annual ACM symposium on Theory of Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2746539.2746580","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,9]],"date-time":"2024-06-09T09:51:10Z","timestamp":1717926670000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2746539.2746580"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6,14]]},"references-count":44,"alternative-id":["10.1145\/2746539.2746580","10.1145\/2746539"],"URL":"https:\/\/doi.org\/10.1145\/2746539.2746580","relation":{},"subject":[],"published":{"date-parts":[[2015,6,14]]},"assertion":[{"value":"2015-06-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}