{"id":"https://openalex.org/W4415366879","doi":"https://doi.org/10.1109/isit63088.2025.11195662","title":"On the Extremal Mechanisms for Local Differential Privacy &amp; Binary Maximal Leakage","display_name":"On the Extremal Mechanisms for Local Differential Privacy &amp; Binary Maximal Leakage","publication_year":2025,"publication_date":"2025-06-22","ids":{"openalex":"https://openalex.org/W4415366879","doi":"https://doi.org/10.1109/isit63088.2025.11195662"},"language":null,"primary_location":{"id":"doi:10.1109/isit63088.2025.11195662","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit63088.2025.11195662","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5120072202","display_name":"Cemre Cadir","orcid":null},"institutions":[{"id":"https://openalex.org/I5124864","display_name":"\u00c9cole Polytechnique F\u00e9d\u00e9rale de Lausanne","ror":"https://ror.org/02s376052","country_code":"CH","type":"education","lineage":["https://openalex.org/I2799323385","https://openalex.org/I5124864"]}],"countries":["CH"],"is_corresponding":true,"raw_author_name":"Cemre Cadir","raw_affiliation_strings":["School of Computer &#x0026; Communication Sciences, &#x00C9;cole Polytechnique F&#x00E9;d&#x00E9;rale de Lausanne (EPFL),Switzerland"],"affiliations":[{"raw_affiliation_string":"School of Computer &#x0026; Communication Sciences, &#x00C9;cole Polytechnique F&#x00E9;d&#x00E9;rale de Lausanne (EPFL),Switzerland","institution_ids":["https://openalex.org/I5124864"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5052329970","display_name":"Yanina Y. Shkel","orcid":"https://orcid.org/0000-0002-2575-1762"},"institutions":[{"id":"https://openalex.org/I5124864","display_name":"\u00c9cole Polytechnique F\u00e9d\u00e9rale de Lausanne","ror":"https://ror.org/02s376052","country_code":"CH","type":"education","lineage":["https://openalex.org/I2799323385","https://openalex.org/I5124864"]}],"countries":["CH"],"is_corresponding":false,"raw_author_name":"Yanina Y. Shkel","raw_affiliation_strings":["School of Computer &#x0026; Communication Sciences, &#x00C9;cole Polytechnique F&#x00E9;d&#x00E9;rale de Lausanne (EPFL),Switzerland"],"affiliations":[{"raw_affiliation_string":"School of Computer &#x0026; Communication Sciences, &#x00C9;cole Polytechnique F&#x00E9;d&#x00E9;rale de Lausanne (EPFL),Switzerland","institution_ids":["https://openalex.org/I5124864"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5120072202"],"corresponding_institution_ids":["https://openalex.org/I5124864"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.1642408,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9945999979972839,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/binary-number","display_name":"Binary number","score":0.703000009059906},{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.6965000033378601},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.5902000069618225},{"id":"https://openalex.org/keywords/erasure","display_name":"Erasure","score":0.5673999786376953},{"id":"https://openalex.org/keywords/measure","display_name":"Measure (data warehouse)","score":0.47450000047683716},{"id":"https://openalex.org/keywords/binary-data","display_name":"Binary data","score":0.4332999885082245},{"id":"https://openalex.org/keywords/information-theory","display_name":"Information theory","score":0.3756999969482422}],"concepts":[{"id":"https://openalex.org/C48372109","wikidata":"https://www.wikidata.org/wiki/Q3913","display_name":"Binary number","level":2,"score":0.703000009059906},{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.6965000033378601},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.5902000069618225},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.5860000252723694},{"id":"https://openalex.org/C2778790127","wikidata":"https://www.wikidata.org/wiki/Q484885","display_name":"Erasure","level":2,"score":0.5673999786376953},{"id":"https://openalex.org/C2780009758","wikidata":"https://www.wikidata.org/wiki/Q6804172","display_name":"Measure (data warehouse)","level":2,"score":0.47450000047683716},{"id":"https://openalex.org/C2779190172","wikidata":"https://www.wikidata.org/wiki/Q4913888","display_name":"Binary data","level":3,"score":0.4332999885082245},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4041999876499176},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.3928999900817871},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3871000111103058},{"id":"https://openalex.org/C52622258","wikidata":"https://www.wikidata.org/wiki/Q131222","display_name":"Information theory","level":2,"score":0.3756999969482422},{"id":"https://openalex.org/C89611455","wikidata":"https://www.wikidata.org/wiki/Q6804646","display_name":"Mechanism (biology)","level":2,"score":0.37549999356269836},{"id":"https://openalex.org/C93226319","wikidata":"https://www.wikidata.org/wiki/Q193137","display_name":"Differential (mechanical device)","level":2,"score":0.3752000033855438},{"id":"https://openalex.org/C2777042071","wikidata":"https://www.wikidata.org/wiki/Q6509304","display_name":"Leakage (economics)","level":2,"score":0.34439998865127563},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.328000009059906},{"id":"https://openalex.org/C3017597292","wikidata":"https://www.wikidata.org/wiki/Q25052250","display_name":"Privacy protection","level":2,"score":0.32100000977516174},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.3019999861717224},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.2996000051498413},{"id":"https://openalex.org/C2776441110","wikidata":"https://www.wikidata.org/wiki/Q1436628","display_name":"Randomized response","level":3,"score":0.25049999356269836}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isit63088.2025.11195662","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit63088.2025.11195662","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W1557833142","https://openalex.org/W1873763122","https://openalex.org/W1986293063","https://openalex.org/W2053801139","https://openalex.org/W2074006684","https://openalex.org/W2109426455","https://openalex.org/W2167136065","https://openalex.org/W2473418344","https://openalex.org/W2563994828","https://openalex.org/W2594311007","https://openalex.org/W2792817205","https://openalex.org/W2998261580","https://openalex.org/W3047779216","https://openalex.org/W3135347465","https://openalex.org/W3170524081","https://openalex.org/W4213278605","https://openalex.org/W4287691174","https://openalex.org/W4289655109","https://openalex.org/W4364322723","https://openalex.org/W4385757646","https://openalex.org/W4386215253","https://openalex.org/W4393864507","https://openalex.org/W4393972627","https://openalex.org/W4401692006","https://openalex.org/W4401694015","https://openalex.org/W4401694215","https://openalex.org/W4401879919"],"related_works":[],"abstract_inverted_index":{"We":[0,13,30],"consider":[1],"two":[2,20],"privacy":[3,7,45],"measures,":[4],"local":[5],"differential":[6],"and":[8,25,47,69],"binary":[9,65,85],"maximal":[10,86],"leakage,":[11],"simultaneously.":[12],"study":[14,63],"the":[15,43,51,64,70],"subsequent":[16],"utility-privacy":[17],"trade-off":[18],"for":[19,35,84],"utility":[21,53],"problems:":[22],"information":[23],"preservation":[24],"<tex":[26,56],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[27,57],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">$f$</tex>-divergence":[28],"maximization.":[29],"present":[31],"new":[32],"achievability":[33],"results":[34],"both":[36],"problems":[37],"over":[38,54],"all":[39,55],"mechanisms":[40,81],"that":[41,79],"satisfy":[42],"combined":[44],"measure":[46],"compare":[48],"this":[49],"with":[50,67,74],"optimal":[52],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">$\\epsilon$</tex>-LDP":[58],"mechanisms.":[59],"In":[60],"particular,":[61],"we":[62,77],"mechanism":[66,73],"erasure":[68],"randomized":[71],"response":[72],"erasure.":[75],"Finally,":[76],"show":[78],"singular":[80],"are":[82],"dominating":[83],"leakage.":[87]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-10-21T00:00:00"}
