{"id":"https://openalex.org/W2963446403","doi":"https://doi.org/10.1109/tifs.2017.2779108","title":"Hypothesis Testing Under Mutual Information Privacy Constraints in the High Privacy Regime","display_name":"Hypothesis Testing Under Mutual Information Privacy Constraints in the High Privacy Regime","publication_year":2017,"publication_date":"2017-11-30","ids":{"openalex":"https://openalex.org/W2963446403","doi":"https://doi.org/10.1109/tifs.2017.2779108","mag":"2963446403"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2017.2779108","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2017.2779108","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5048397143","display_name":"Jiachun Liao","orcid":"https://orcid.org/0000-0001-7439-4645"},"institutions":[{"id":"https://openalex.org/I55732556","display_name":"Arizona State University","ror":"https://ror.org/03efmqc40","country_code":"US","type":"education","lineage":["https://openalex.org/I55732556"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Jiachun Liao","raw_affiliation_strings":["Arizona State University, Tempe, AZ, USA"],"affiliations":[{"raw_affiliation_string":"Arizona State University, Tempe, AZ, USA","institution_ids":["https://openalex.org/I55732556"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065366998","display_name":"Lalitha Sankar","orcid":"https://orcid.org/0000-0001-8122-5444"},"institutions":[{"id":"https://openalex.org/I55732556","display_name":"Arizona State University","ror":"https://ror.org/03efmqc40","country_code":"US","type":"education","lineage":["https://openalex.org/I55732556"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Lalitha Sankar","raw_affiliation_strings":["Arizona State University, Tempe, AZ, USA"],"affiliations":[{"raw_affiliation_string":"Arizona State University, Tempe, AZ, USA","institution_ids":["https://openalex.org/I55732556"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058345431","display_name":"Vincent Y. F. Tan","orcid":"https://orcid.org/0000-0002-5008-4527"},"institutions":[{"id":"https://openalex.org/I165932596","display_name":"National University of Singapore","ror":"https://ror.org/01tgyzw49","country_code":"SG","type":"education","lineage":["https://openalex.org/I165932596"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Vincent Y. F. Tan","raw_affiliation_strings":["National University of Singapore, Singapore"],"affiliations":[{"raw_affiliation_string":"National University of Singapore, Singapore","institution_ids":["https://openalex.org/I165932596"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5074697940","display_name":"Fl\u00e1vio P. Calmon","orcid":"https://orcid.org/0000-0002-7493-1428"},"institutions":[{"id":"https://openalex.org/I4210114115","display_name":"IBM Research - Thomas J. Watson Research Center","ror":"https://ror.org/0265w5591","country_code":"US","type":"facility","lineage":["https://openalex.org/I1341412227","https://openalex.org/I4210114115"]},{"id":"https://openalex.org/I136199984","display_name":"Harvard University","ror":"https://ror.org/03vek6s52","country_code":"US","type":"education","lineage":["https://openalex.org/I136199984"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Flavio du Pin Calmon","raw_affiliation_strings":["IBM Thomas J. Watson Research Center, Yorktown Heights, NY, USA","John A. Paulson School of Engineering and Applied Sciences, Harvard University, Cambridge, MA, USA"],"affiliations":[{"raw_affiliation_string":"IBM Thomas J. Watson Research Center, Yorktown Heights, NY, USA","institution_ids":["https://openalex.org/I4210114115"]},{"raw_affiliation_string":"John A. Paulson School of Engineering and Applied Sciences, Harvard University, Cambridge, MA, USA","institution_ids":["https://openalex.org/I136199984"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5048397143"],"corresponding_institution_ids":["https://openalex.org/I55732556"],"apc_list":null,"apc_paid":null,"fwci":7.4109,"has_fulltext":false,"cited_by_count":67,"citation_normalized_percentile":{"value":0.97718579,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":100},"biblio":{"volume":"13","issue":"4","first_page":"1058","last_page":"1071"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12879","display_name":"Distributed Sensor Networks and Detection Algorithms","score":0.9947999715805054,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7384803295135498},{"id":"https://openalex.org/keywords/mutual-information","display_name":"Mutual information","score":0.6258320808410645},{"id":"https://openalex.org/keywords/entropy","display_name":"Entropy (arrow of time)","score":0.5956692099571228},{"id":"https://openalex.org/keywords/information-theory","display_name":"Information theory","score":0.5811703205108643},{"id":"https://openalex.org/keywords/metric","display_name":"Metric (unit)","score":0.5151275396347046},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.48171359300613403},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.4726468622684479},{"id":"https://openalex.org/keywords/binary-number","display_name":"Binary number","score":0.4506899118423462},{"id":"https://openalex.org/keywords/statistical-hypothesis-testing","display_name":"Statistical hypothesis testing","score":0.43845903873443604},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.4106122553348541},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3683098554611206},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3632281422615051},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.25257861614227295},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1895383894443512},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.15678691864013672},{"id":"https://openalex.org/keywords/statistics","display_name":"Statistics","score":0.12348002195358276}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7384803295135498},{"id":"https://openalex.org/C152139883","wikidata":"https://www.wikidata.org/wiki/Q252973","display_name":"Mutual information","level":2,"score":0.6258320808410645},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.5956692099571228},{"id":"https://openalex.org/C52622258","wikidata":"https://www.wikidata.org/wiki/Q131222","display_name":"Information theory","level":2,"score":0.5811703205108643},{"id":"https://openalex.org/C176217482","wikidata":"https://www.wikidata.org/wiki/Q860554","display_name":"Metric (unit)","level":2,"score":0.5151275396347046},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.48171359300613403},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.4726468622684479},{"id":"https://openalex.org/C48372109","wikidata":"https://www.wikidata.org/wiki/Q3913","display_name":"Binary number","level":2,"score":0.4506899118423462},{"id":"https://openalex.org/C87007009","wikidata":"https://www.wikidata.org/wiki/Q210832","display_name":"Statistical hypothesis testing","level":2,"score":0.43845903873443604},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.4106122553348541},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3683098554611206},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3632281422615051},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.25257861614227295},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1895383894443512},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.15678691864013672},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.12348002195358276},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.0},{"id":"https://openalex.org/C21547014","wikidata":"https://www.wikidata.org/wiki/Q1423657","display_name":"Operations management","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2017.2779108","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2017.2779108","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.6499999761581421}],"awards":[{"id":"https://openalex.org/G5025276835","display_name":null,"funder_award_id":"CCF-1350914","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G8570589862","display_name":null,"funder_award_id":"CIF-1422358","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":36,"referenced_works":["https://openalex.org/W1176050405","https://openalex.org/W1590772317","https://openalex.org/W1622686296","https://openalex.org/W1883968710","https://openalex.org/W1969310618","https://openalex.org/W1989065278","https://openalex.org/W1997176470","https://openalex.org/W2002603218","https://openalex.org/W2021238795","https://openalex.org/W2034597819","https://openalex.org/W2055309977","https://openalex.org/W2077145963","https://openalex.org/W2122057349","https://openalex.org/W2124988974","https://openalex.org/W2147324825","https://openalex.org/W2147435839","https://openalex.org/W2154752110","https://openalex.org/W2160533339","https://openalex.org/W2163446469","https://openalex.org/W2252420204","https://openalex.org/W2344355863","https://openalex.org/W2478708596","https://openalex.org/W2518143623","https://openalex.org/W2540134115","https://openalex.org/W2583266863","https://openalex.org/W2962793079","https://openalex.org/W2962838582","https://openalex.org/W2963535017","https://openalex.org/W2963966695","https://openalex.org/W3102159535","https://openalex.org/W3121602658","https://openalex.org/W3133603318","https://openalex.org/W4234534407","https://openalex.org/W4300715124","https://openalex.org/W6681909838","https://openalex.org/W6732765934"],"related_works":["https://openalex.org/W2036846997","https://openalex.org/W2112223184","https://openalex.org/W2920676536","https://openalex.org/W3124771927","https://openalex.org/W2347586617","https://openalex.org/W4225940264","https://openalex.org/W2161963661","https://openalex.org/W2125614474","https://openalex.org/W2295845123","https://openalex.org/W2889544313"],"abstract_inverted_index":{"Hypothesis":[0],"testing":[1],"is":[2,84,95],"a":[3,13,19,45],"statistical":[4],"inference":[5],"framework":[6],"for":[7,18,59,109,136],"determining":[8],"the":[9,27,30,33,40,56,66,69,77,81,87,93,98,104,118,126,137,147,150],"true":[10],"distribution":[11],"among":[12],"set":[14],"of":[15,29,74,76,125,149],"possible":[16],"distributions":[17,75],"given":[20],"data":[21,31,38],"set.":[22],"Privacy":[23],"restrictions":[24],"may":[25],"require":[26],"curator":[28],"or":[32],"respondents":[34],"themselves":[35],"to":[36,96,156],"share":[37],"with":[39],"test":[41],"only":[42],"after":[43],"applying":[44],"randomizing":[46],"privacy":[47,57,82,107,120,144,148],"mechanism.":[48],"This":[49],"work":[50],"considers":[51],"mutual":[52],"information":[53],"(MI)":[54],"as":[55,86],"metric":[58,145],"measuring":[60],"leakage.":[61],"In":[62],"addition,":[63],"motivated":[64],"by":[65,80],"Chernoff-Stein":[67],"lemma,":[68],"relative":[70],"entropy":[71],"between":[72],"pairs":[73],"output":[78],"(generated":[79],"mechanism)":[83],"chosen":[85],"utility":[88],"metric.":[89],"For":[90],"these":[91],"metrics,":[92],"goal":[94],"find":[97],"optimal":[99,106],"privacy-utility":[100],"tradeoff":[101],"(PUT)":[102],"and":[103,112,128],"corresponding":[105],"mechanism":[108],"both":[110],"binary":[111,127],"m-ary":[113,129],"hypothesis":[114],"testing.":[115],"Focusing":[116],"on":[117],"high":[119],"regime,":[121],"Euclidean":[122],"information-theoretic":[123],"approximations":[124],"PUT":[130],"problems":[131,139],"are":[132],"developed.":[133],"The":[134],"solutions":[135],"approximation":[138],"clarify":[140],"that":[141],"an":[142],"MI-based":[143],"preserves":[146],"source":[151],"symbols":[152],"in":[153],"inverse":[154],"proportion":[155],"their":[157],"likelihoods.":[158]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":8},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":8},{"year":2020,"cited_by_count":14},{"year":2019,"cited_by_count":7},{"year":2018,"cited_by_count":16},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
