{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,12,14]],"date-time":"2024-12-14T05:26:25Z","timestamp":1734153985963,"version":"3.30.2"},"publisher-location":"New York, NY, USA","reference-count":87,"publisher":"ACM","funder":[{"DOI":"10.13039\/501100020370","name":"CISPA-Stanford Center for Cybersecurity","doi-asserted-by":"publisher","award":["FKZ:13N1S0762"],"id":[{"id":"10.13039\/501100020370","id-type":"DOI","asserted-by":"publisher"}]},{"name":"the Helmholtz Association within the project ``Trustworthy Federated Data Analytics'","award":["ZT-I-OO1 4"]},{"name":"ZJU ? DAS-Security Joint Research Institute of Frontier Technologies"},{"name":"Funding for Postdoctoral Scientific Research Projects in Zhejiang Province","award":["ZJ2022072"]},{"name":"National Natural Science Foundation of China","award":["62302441"]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,15]]},"DOI":"10.1145\/3576915.3616593","type":"proceedings-article","created":{"date-parts":[[2023,11,21]],"date-time":"2023-11-21T17:35:13Z","timestamp":1700588113000},"page":"2621-2635","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["DPMLBench: Holistic Evaluation of Differentially Private Machine Learning"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8849-8808","authenticated-orcid":false,"given":"Chengkun","family":"Wei","sequence":"first","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-7038-7873","authenticated-orcid":false,"given":"Minghu","family":"Zhao","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7208-3392","authenticated-orcid":false,"given":"Zhikun","family":"Zhang","sequence":"additional","affiliation":[{"name":"Stanford University & CISPA Helmholtz Center for Information Security, Stanford, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1128-7989","authenticated-orcid":false,"given":"Min","family":"Chen","sequence":"additional","affiliation":[{"name":"CISPA Helmholtz Center for Information Security, Saarbr\u00fccken, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-2613-0676","authenticated-orcid":false,"given":"Wenlong","family":"Meng","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7395-4513","authenticated-orcid":false,"given":"Bo","family":"Liu","sequence":"additional","affiliation":[{"name":"Dbappsecurity, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-3712-8304","authenticated-orcid":false,"given":"Yuan","family":"Fan","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1674-4701","authenticated-orcid":false,"given":"Wenzhi","family":"Chen","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]}],"member":"320","published-online":{"date-parts":[[2023,11,21]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"e_1_3_2_1_2_1","volume-title":"Differentially private learning with adaptive clipping. Advances in Neural Information Processing Systems","author":"Andrew Galen","year":"2021","unstructured":"Galen Andrew, Om Thakkar, Brendan McMahan, and Swaroop Ramaswamy. 2021. Differentially private learning with adaptive clipping. Advances in Neural Information Processing Systems (2021)."},{"key":"e_1_3_2_1_3_1","unstructured":"Tom Brown Benjamin Mann Nick Ryder Melanie Subbiah Jared D Kaplan Prafulla Dhariwal Arvind Neelakantan Pranav Shyam Girish Sastry Amanda Askell et al. 2020. Language models are few-shot learners. Advances in neural information processing systems (2020)."},{"key":"e_1_3_2_1_4_1","volume-title":"Gianpaolo Francesco Trotta, and Vitoantonio Bevilacqua","author":"Brunetti Antonio","year":"2018","unstructured":"Antonio Brunetti, Domenico Buongiorno, Gianpaolo Francesco Trotta, and Vitoantonio Bevilacqua. 2018. Computer vision and deep learning techniques for pedestrian detection and tracking: A survey. Neurocomputing (2018)."},{"key":"e_1_3_2_1_5_1","volume-title":"Privacy-preserving logistic regression. Advances in neural information processing systems","author":"Chaudhuri Kamalika","year":"2008","unstructured":"Kamalika Chaudhuri and Claire Monteleoni. 2008. Privacy-preserving logistic regression. Advances in neural information processing systems (2008)."},{"key":"e_1_3_2_1_6_1","volume-title":"Differentially private empirical risk minimization. Journal of Machine Learning Research","author":"Chaudhuri Kamalika","year":"2011","unstructured":"Kamalika Chaudhuri, Claire Monteleoni, and Anand D Sarwate. 2011. Differentially private empirical risk minimization. Journal of Machine Learning Research (2011)."},{"key":"e_1_3_2_1_7_1","unstructured":"Dingfan Chen Raouf Kerkouche and Mario Fritz. 2022a. Private Set Generation with Discriminative Information. In Neural Information Processing Systems (NeurIPS)."},{"key":"e_1_3_2_1_8_1","volume-title":"Gs-wgan: A gradient-sanitized approach for learning differentially private generators. Advances in Neural Information Processing Systems","author":"Chen Dingfan","year":"2020","unstructured":"Dingfan Chen, Tribhuvanesh Orekondy, and Mario Fritz. 2020. Gs-wgan: A gradient-sanitized approach for learning differentially private generators. Advances in Neural Information Processing Systems (2020)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.00820"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Min Chen Zhikun Zhang Tianhao Wang Michael Backes Mathias Humbert and Yang Zhang. 2021. When Machine Unlearning Jeopardize Privacy. In ACM CCS.","DOI":"10.1145\/3460120.3484756"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Min Chen Zhikun Zhang Tianhao Wang Michael Backes Mathias Humbert and Yang Zhang. 2022c. Graph Unlearning. In ACM CCS.","DOI":"10.1145\/3548606.3559352"},{"key":"e_1_3_2_1_12_1","unstructured":"Min Chen Zhikun Zhang Tianhao Wang Michael Backes and Yang Zhang. 2023. FACE-AUDITOR: Data Auditing in Facial Recognition Systems. In USENIX Security."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i6.20586"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2882903.2912574"},{"volume-title":"Comparison of two feature extraction methods based on maximization of mutual information. In 2006 16th IEEE signal processing society workshop on machine learning for signal processing","author":"Chumerin Nikolay","key":"e_1_3_2_1_15_1","unstructured":"Nikolay Chumerin and Marc M Van Hulle. 2006. Comparison of two feature extraction methods based on maximization of mutual information. In 2006 16th IEEE signal processing society workshop on machine learning for signal processing. IEEE."},{"key":"e_1_3_2_1_16_1","volume-title":"Unlocking high-accuracy differentially private image classification through scale. arXiv preprint arXiv:2204.13650","author":"De Soham","year":"2022","unstructured":"Soham De, Leonard Berrada, Jamie Hayes, Samuel L Smith, and Borja Balle. 2022. Unlocking high-accuracy differentially private image classification through scale. arXiv preprint arXiv:2204.13650 (2022)."},{"key":"e_1_3_2_1_17_1","volume-title":"AHEAD: Adaptive Hierarchical Decomposition for Range Query under Local Differential Privacy. In ACM CCS.","author":"Du Linkang","year":"2021","unstructured":"Linkang Du, Zhikun Zhang, Shaojie Bai, Changchang Liu, Shouling Ji, Peng Cheng, and Jiming Chen. 2021. AHEAD: Adaptive Hierarchical Decomposition for Range Query under Local Differential Privacy. In ACM CCS."},{"key":"e_1_3_2_1_18_1","unstructured":"Yuntao Du Yujia Hu Zhikun Zhang Ziquan Fang Lu Chen Baihua Zheng and Yunjun Gao. 2023. LDPTrace: Locally Differentially Private Trajectory Synthesis. In VLDB."},{"key":"e_1_3_2_1_19_1","volume-title":"Implicit generation and modeling with energy based models. Advances in Neural Information Processing Systems","author":"Du Yilun","year":"2019","unstructured":"Yilun Du and Igor Mordatch. 2019. Implicit generation and modeling with energy based models. Advances in Neural Information Processing Systems (2019)."},{"key":"e_1_3_2_1_20_1","volume-title":"Differential Privacy: A Survey of Results. In Theory and Applications of Models of Computation, Manindra Agrawal, Dingzhu Du, Zhenhua Duan, and Angsheng Li (Eds.).","author":"Dwork Cynthia","year":"2008","unstructured":"Cynthia Dwork. 2008. Differential Privacy: A Survey of Results. In Theory and Applications of Models of Computation, Manindra Agrawal, Dingzhu Du, Zhenhua Duan, and Angsheng Li (Eds.)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/1873601.1873617"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"Cynthia Dwork Aaron Roth et al. 2014. The algorithmic foundations of differential privacy. Found. Trends Theor. Comput. Sci. (2014).","DOI":"10.1561\/9781601988195"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813677"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-64148-1_13"},{"key":"e_1_3_2_1_25_1","volume-title":"Deep Learning with Label Differential Privacy. Advances in Neural Information Processing Systems","author":"Ghazi Badih","year":"2021","unstructured":"Badih Ghazi, Noah Golowich, Ravi Kumar, Pasin Manurangsi, and Chiyuan Zhang. 2021. Deep Learning with Label Differential Privacy. Advances in Neural Information Processing Systems (2021)."},{"key":"e_1_3_2_1_26_1","volume-title":"A survey on deep learning based face recognition. Computer vision and image understanding","author":"Guo Guodong","year":"2019","unstructured":"Guodong Guo and Na Zhang. 2019. A survey on deep learning based face recognition. Computer vision and image understanding (2019)."},{"key":"e_1_3_2_1_27_1","volume-title":"FedGraphNN: A Federated Learning Benchmark System for Graph Neural Networks. In ICLR 2021 Workshop on Distributed and Private Machine Learning (DPML).","author":"He Chaoyang","year":"2021","unstructured":"Chaoyang He, Keshav Balasubramanian, Emir Ceyani, Carl Yang, Han Xie, Lichao Sun, Lifang He, Liangwei Yang, Philip S Yu, Yu Rong, et al. 2021. FedGraphNN: A Federated Learning Benchmark System for Graph Neural Networks. In ICLR 2021 Workshop on Distributed and Private Machine Learning (DPML)."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"Hai Huang Zhikun Zhang Yun Shen Michael Backes Qi Li and Yang Zhang. 2022. On the Privacy Risks of Cell-Based NAS Architectures. In ACM CCS.","DOI":"10.1145\/3548606.3560619"},{"key":"e_1_3_2_1_30_1","volume-title":"Proceedings of the 32nd International Conference on Machine Learning.","author":"Ioffe Sergey","year":"2015","unstructured":"Sergey Ioffe and Christian Szegedy. 2015. Batch Normalization: Accelerating Deep Network Training by Reducing Internal Covariate Shift. In Proceedings of the 32nd International Conference on Machine Learning."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00001"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3508398.3511513"},{"key":"e_1_3_2_1_33_1","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Jayaraman Bargav","year":"2019","unstructured":"Bargav Jayaraman and David Evans. 2019. Evaluating differentially private machine learning in practice. In 28th USENIX Security Symposium (USENIX Security 19)."},{"volume-title":"A survey of feature selection and feature extraction techniques in machine learning. In 2014 science and information conference","author":"Khalid Samina","key":"e_1_3_2_1_34_1","unstructured":"Samina Khalid, Tehmina Khalil, and Shamila Nasreen. 2014. A survey of feature selection and feature extraction techniques in machine learning. In 2014 science and information conference. IEEE."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1989323.1989345"},{"key":"e_1_3_2_1_36_1","unstructured":"Alex Krizhevsky Geoffrey Hinton et al. 2009. Learning multiple layers of features from tiny images. (2009)."},{"key":"e_1_3_2_1_37_1","volume-title":"Imagenet classification with deep convolutional neural networks. Advances in neural information processing systems","author":"Krizhevsky Alex","year":"2012","unstructured":"Alex Krizhevsky, Ilya Sutskever, and Geoffrey E Hinton. 2012. Imagenet classification with deep convolutional neural networks. Advances in neural information processing systems (2012)."},{"key":"e_1_3_2_1_38_1","volume-title":"Toward training at imagenet scale with differential privacy. arXiv preprint arXiv:2201.12328","author":"Kurakin Alexey","year":"2022","unstructured":"Alexey Kurakin, Steve Chien, Shuang Song, Roxana Geambasu, Andreas Terzis, and Abhradeep Thakurta. 2022. Toward training at imagenet scale with differential privacy. arXiv preprint arXiv:2201.12328 (2022)."},{"key":"e_1_3_2_1_39_1","volume-title":"Gradient-based learning applied to document recognition. Proc","author":"LeCun Yann","year":"1998","unstructured":"Yann LeCun, L\u00e9on Bottou, Yoshua Bengio, and Patrick Haffner. 1998. Gradient-based learning applied to document recognition. Proc. IEEE (1998)."},{"key":"e_1_3_2_1_40_1","volume-title":"A tutorial on energy-based learning. Predicting structured data","author":"LeCun Yann","year":"2006","unstructured":"Yann LeCun, Sumit Chopra, Raia Hadsell, M Ranzato, and Fujie Huang. 2006. A tutorial on energy-based learning. Predicting structured data (2006)."},{"key":"e_1_3_2_1_41_1","volume-title":"Large language models can be strong differentially private learners. arXiv preprint arXiv:2110.05679","author":"Li Xuechen","year":"2021","unstructured":"Xuechen Li, Florian Tramer, Percy Liang, and Tatsunori Hashimoto. 2021. Large language models can be strong differentially private learners. arXiv preprint arXiv:2110.05679 (2021)."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.324"},{"key":"e_1_3_2_1_43_1","volume-title":"ML-Doctor: Holistic Risk Assessment of Inference Attacks Against Machine Learning Models. In 31st USENIX Security Symposium (USENIX Security 22)","author":"Liu Yugeng","year":"2022","unstructured":"Yugeng Liu, Rui Wen, Xinlei He, Ahmed Salem, Zhikun Zhang, Michael Backes, Emiliano De Cristofaro, Mario Fritz, and Yang Zhang. 2022. ML-Doctor: Holistic Risk Assessment of Inference Attacks Against Machine Learning Models. In 31st USENIX Security Symposium (USENIX Security 22)."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2008.4497436"},{"key":"e_1_3_2_1_45_1","volume-title":"Antipodes of Label Differential Privacy: PATE and ALIBI. Advances in Neural Information Processing Systems","author":"Esmaeili Mani Malek","year":"2021","unstructured":"Mani Malek Esmaeili, Ilya Mironov, Karthik Prasad, Igor Shilov, and Florian Tramer. 2021. Antipodes of Label Differential Privacy: PATE and ALIBI. Advances in Neural Information Processing Systems (2021)."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00029"},{"volume-title":"R\u00e9nyi differential privacy. In 2017 IEEE 30th computer security foundations symposium (CSF)","author":"Mironov Ilya","key":"e_1_3_2_1_47_1","unstructured":"Ilya Mironov. 2017. R\u00e9nyi differential privacy. In 2017 IEEE 30th computer security foundations symposium (CSF). IEEE."},{"key":"e_1_3_2_1_48_1","volume-title":"arXiv preprint arXiv:1908.10530","author":"Mironov Ilya","year":"2019","unstructured":"Ilya Mironov, Kunal Talwar, and Li Zhang. 2019. R\\'enyi differential privacy of the sampled gaussian mechanism. arXiv preprint arXiv:1908.10530 (2019)."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00065"},{"key":"e_1_3_2_1_50_1","unstructured":"Yuval Netzer Tao Wang Adam Coates Alessandro Bissacco Bo Wu and Andrew Y Ng. 2011. Reading digits in natural images with unsupervised feature learning. (2011)."},{"key":"e_1_3_2_1_51_1","volume-title":"Popular ensemble methods: An empirical study. Journal of artificial intelligence research","author":"Opitz David","year":"1999","unstructured":"David Opitz and Richard Maclin. 1999. Popular ensemble methods: An empirical study. Journal of artificial intelligence research (1999)."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298904"},{"key":"e_1_3_2_1_53_1","volume-title":"International Conference on Learning Representations.","author":"Papernot Nicolas","year":"2017","unstructured":"Nicolas Papernot, Mart\u00edn Abadi, \u00dalfar Erlingsson, Ian Goodfellow, and Kunal Talwar. 2017. Semi-supervised Knowledge Transfer for Deep Learning from Private Training Data. In International Conference on Learning Representations."},{"key":"e_1_3_2_1_54_1","volume-title":"Scalable private learning with pate. arXiv preprint arXiv:1802.08908","author":"Papernot Nicolas","year":"2018","unstructured":"Nicolas Papernot, Shuang Song, Ilya Mironov, Ananth Raghunathan, Kunal Talwar, and \u00dalfar Erlingsson. 2018. Scalable private learning with pate. arXiv preprint arXiv:1802.08908 (2018)."},{"key":"e_1_3_2_1_55_1","volume-title":"Hyperparameter Tuning with Renyi Differential Privacy. In International Conference on Learning Representations.","author":"Papernot Nicolas","year":"2021","unstructured":"Nicolas Papernot and Thomas Steinke. 2021. Hyperparameter Tuning with Renyi Differential Privacy. In International Conference on Learning Representations."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i10.17123"},{"key":"e_1_3_2_1_57_1","volume-title":"Pytorch: An imperative style, high-performance deep learning library. Advances in neural information processing systems","author":"Paszke Adam","year":"2019","unstructured":"Adam Paszke, Sam Gross, Francisco Massa, Adam Lerer, James Bradbury, Gregory Chanan, Trevor Killeen, Zeming Lin, Natalia Gimelshein, Luca Antiga, et al. 2019. Pytorch: An imperative style, high-performance deep learning library. Advances in neural information processing systems (2019)."},{"key":"e_1_3_2_1_58_1","volume-title":"Felix X Yu, Sashank J Reddi, and Sanjiv Kumar.","author":"Pichapati Venkatadheeraj","year":"2019","unstructured":"Venkatadheeraj Pichapati, Ananda Theertha Suresh, Felix X Yu, Sashank J Reddi, and Sanjiv Kumar. 2019. AdaCliP: Adaptive clipping for private SGD. arXiv preprint arXiv:1908.07643 (2019)."},{"key":"e_1_3_2_1_59_1","volume-title":"Ml-leaks: Model and data independent membership inference attacks and defenses on machine learning models. arXiv preprint arXiv:1806.01246","author":"Salem Ahmed","year":"2018","unstructured":"Ahmed Salem, Yang Zhang, Mathias Humbert, Pascal Berrang, Mario Fritz, and Michael Backes. 2018. Ml-leaks: Model and data independent membership inference attacks and defenses on machine learning models. arXiv preprint arXiv:1806.01246 (2018)."},{"key":"e_1_3_2_1_60_1","volume-title":"Losing Less: A Loss for Differentially Private Deep Learning.","author":"Shamsabadi Ali Shahin","year":"2021","unstructured":"Ali Shahin Shamsabadi and Nicolas Papernot. 2021. Losing Less: A Loss for Differentially Private Deep Learning. (2021)."},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"crossref","unstructured":"Yun Shen Yufei Han Zhikun Zhang Min Chen Ting Yu Michael Backes Yang Zhang and Gianluca Stringhini. 2022. Finding MNEMON: Reviving Memories of Node Embeddings. In ACM CCS.","DOI":"10.1145\/3548606.3559358"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.41"},{"key":"e_1_3_2_1_63_1","volume-title":"Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556","author":"Simonyan Karen","year":"2014","unstructured":"Karen Simonyan and Andrew Zisserman. 2014. Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556 (2014)."},{"key":"e_1_3_2_1_64_1","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Song Liwei","year":"2021","unstructured":"Liwei Song and Prateek Mittal. 2021. Systematic evaluation of privacy risks of machine learning models. In 30th USENIX Security Symposium (USENIX Security 21)."},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2019.00018"},{"key":"e_1_3_2_1_66_1","volume-title":"International Conference on Learning Representations.","author":"Tramer Florian","year":"2020","unstructured":"Florian Tramer and Dan Boneh. 2020. Differentially Private Learning Needs Better Features (or Much More Data). In International Conference on Learning Representations."},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/WI-IAT.2013.80"},{"key":"e_1_3_2_1_68_1","unstructured":"Haiming Wang Zhikun Zhang Tianhao Wang Shibo He Michael Backes Jiming Chen and Yang Zhang. 2023. PrivTrace: Differentially Private Trajectory Synthesis by Adaptive Markov Model. In USENIX Security."},{"key":"e_1_3_2_1_69_1","volume-title":"Zhikun Zhang, Dong Su, Yueqiang Cheng, Zhou Li, Ninghui Li, and Somesh Jha.","author":"Wang Tianhao","year":"2021","unstructured":"Tianhao Wang, Joann Qiongna Chen, Zhikun Zhang, Dong Su, Yueqiang Cheng, Zhou Li, Ninghui Li, and Somesh Jha. 2021. Continuous Release of Data Streams under both Centralized and Local Differential Privacy. In ACM CCS."},{"key":"e_1_3_2_1_70_1","volume-title":"DPMLBench: Holistic Evaluation of Differentially Private Machine Learning. arXiv preprint","author":"Wei Chengkun","year":"2023","unstructured":"Chengkun Wei, Minghu Zhao, Zhikun Zhang, Min Chen, Wenlong Meng, Bo Liu, Yuan Fan, and Wenzhi Chen. 2023. DPMLBench: Holistic Evaluation of Differentially Private Machine Learning. arXiv preprint (2023)."},{"key":"e_1_3_2_1_71_1","volume-title":"Group Normalization. In Proceedings of the European Conference on Computer Vision (ECCV).","author":"Wu Yuxin","year":"2018","unstructured":"Yuxin Wu and Kaiming He. 2018. Group Normalization. In Proceedings of the European Conference on Computer Vision (ECCV)."},{"key":"e_1_3_2_1_72_1","volume-title":"Fashion-mnist: a novel image dataset for benchmarking machine learning algorithms. arXiv preprint arXiv:1708.07747","author":"Xiao Han","year":"2017","unstructured":"Han Xiao, Kashif Rasul, and Roland Vollgraf. 2017. Fashion-mnist: a novel image dataset for benchmarking machine learning algorithms. arXiv preprint arXiv:1708.07747 (2017)."},{"key":"e_1_3_2_1_73_1","volume-title":"Differentially private generative adversarial network. arXiv preprint arXiv:1802.06739","author":"Xie Liyang","year":"2018","unstructured":"Liyang Xie, Kaixiang Lin, Shu Wang, Fei Wang, and Jiayu Zhou. 2018. Differentially private generative adversarial network. arXiv preprint arXiv:1802.06739 (2018)."},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1080\/17442509908834179"},{"key":"e_1_3_2_1_75_1","volume-title":"Opacus: User-friendly differential privacy library in PyTorch. arXiv preprint arXiv:2109.12298","author":"Yousefpour Ashkan","year":"2021","unstructured":"Ashkan Yousefpour, Igor Shilov, Alexandre Sablayrolles, Davide Testuggine, Karthik Prasad, Mani Malek, John Nguyen, Sayan Ghosh, Akash Bharadwaj, Jessica Zhao, et al. 2021. Opacus: User-friendly differential privacy library in PyTorch. arXiv preprint arXiv:2109.12298 (2021)."},{"key":"e_1_3_2_1_76_1","volume-title":"International Conference on Learning Representations (ICLR).","author":"Yu Da","year":"2022","unstructured":"Da Yu, Saurabh Naik, Arturs Backurs, Sivakanth Gopi, Huseyin A Inan, Gautam Kamath, Janardhan Kulkarni, Yin Tat Lee, Andre Manoel, Lukas Wutschitz, et al. 2022. Differentially private fine-tuning of language models. In International Conference on Learning Representations (ICLR)."},{"key":"e_1_3_2_1_77_1","volume-title":"Do Not Let Privacy Overbill Utility: Gradient Embedding Perturbation for Private Learning. In International Conference on Learning Representations (ICLR).","author":"Yu Da","year":"2021","unstructured":"Da Yu, Huishuai Zhang, Wei Chen, and Tie-Yan Liu. 2021a. Do Not Let Privacy Overbill Utility: Gradient Embedding Perturbation for Private Learning. In International Conference on Learning Representations (ICLR)."},{"key":"e_1_3_2_1_78_1","volume-title":"International Conference on Machine Learning. PMLR.","author":"Yu Da","year":"2021","unstructured":"Da Yu, Huishuai Zhang, Wei Chen, Jian Yin, and Tie-Yan Liu. 2021b. Large scale private learning via low-rank reparametrization. In International Conference on Machine Learning. PMLR."},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00019"},{"key":"e_1_3_2_1_80_1","unstructured":"Quan Yuan Zhikun Zhang Linkang Du Min Chen Peng Cheng and Mingyang Sun. 2023. PrivGraph: Differentially Private Graph Data Publication by Exploiting Community Information. In USENIX Security."},{"key":"e_1_3_2_1_81_1","volume-title":"mixup: Beyond empirical risk minimization. arXiv preprint arXiv:1710.09412","author":"Zhang Hongyi","year":"2017","unstructured":"Hongyi Zhang, Moustapha Cisse, Yann N Dauphin, and David Lopez-Paz. 2017. mixup: Beyond empirical risk minimization. arXiv preprint arXiv:1710.09412 (2017)."},{"key":"e_1_3_2_1_82_1","unstructured":"Zhikun Zhang Min Chen Michael Backes Yun Shen and Yang Zhang. 2022. Inference Attacks Against Graph Neural Networks. In USENIX Security."},{"key":"e_1_3_2_1_83_1","volume-title":"CALM: Consistent Adaptive Local Marginal for Marginal Release under Local Differential Privacy. In ACM CCS.","author":"Zhang Zhikun","year":"2018","unstructured":"Zhikun Zhang, Tianhao Wang, Ninghui Li, Shibo He, and Jiming Chen. 2018. CALM: Consistent Adaptive Local Marginal for Marginal Release under Local Differential Privacy. In ACM CCS."},{"key":"e_1_3_2_1_84_1","unstructured":"Zhikun Zhang Tianhao Wang Ninghui Li Jean Honorio Michael Backes Shibo He Jiming Chen and Yang Zhang. 2021. PrivSyn: Differentially Private Data Synthesis. In USENIX Security."},{"key":"e_1_3_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411495.3421352"},{"key":"e_1_3_2_1_86_1","volume-title":"Bypassing the Ambient Dimension: Private SGD with Gradient Subspace Identification. In 9th International Conference on Learning Representations, ICLR 2021","author":"Zhou Yingxue","year":"2021","unstructured":"Yingxue Zhou, Steven Wu, and Arindam Banerjee. 2021. Bypassing the Ambient Dimension: Private SGD with Gradient Subspace Identification. In 9th International Conference on Learning Representations, ICLR 2021, Virtual Event, Austria, May 3-7, 2021."},{"key":"e_1_3_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.01187"}],"event":{"name":"CCS '23: ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Copenhagen Denmark","acronym":"CCS '23"},"container-title":["Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3576915.3616593","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,13]],"date-time":"2024-12-13T18:40:46Z","timestamp":1734115246000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3576915.3616593"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,15]]},"references-count":87,"alternative-id":["10.1145\/3576915.3616593","10.1145\/3576915"],"URL":"https:\/\/doi.org\/10.1145\/3576915.3616593","relation":{},"subject":[],"published":{"date-parts":[[2023,11,15]]},"assertion":[{"value":"2023-11-21","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}