{"id":"https://openalex.org/W4415367811","doi":"https://doi.org/10.1109/isit63088.2025.11195526","title":"Differential Confounding Privacy and Inverse Composition","display_name":"Differential Confounding Privacy and Inverse Composition","publication_year":2025,"publication_date":"2025-06-22","ids":{"openalex":"https://openalex.org/W4415367811","doi":"https://doi.org/10.1109/isit63088.2025.11195526"},"language":null,"primary_location":{"id":"doi:10.1109/isit63088.2025.11195526","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit63088.2025.11195526","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101999100","display_name":"Tao Zhang","orcid":"https://orcid.org/0000-0002-2639-4357"},"institutions":[{"id":"https://openalex.org/I204465549","display_name":"Washington University in St. Louis","ror":"https://ror.org/01yc7t268","country_code":"US","type":"education","lineage":["https://openalex.org/I204465549"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Tao Zhang","raw_affiliation_strings":["Washington University in St. Louis,Computer Science and Engineering,USA"],"affiliations":[{"raw_affiliation_string":"Washington University in St. Louis,Computer Science and Engineering,USA","institution_ids":["https://openalex.org/I204465549"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5090647314","display_name":"Bradley Malin","orcid":"https://orcid.org/0000-0003-3040-5175"},"institutions":[{"id":"https://openalex.org/I200719446","display_name":"Vanderbilt University","ror":"https://ror.org/02vm5rt34","country_code":"US","type":"education","lineage":["https://openalex.org/I200719446"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Bradley A. Malin","raw_affiliation_strings":["Vanderbilt University,Department of Biostatistics,USA"],"affiliations":[{"raw_affiliation_string":"Vanderbilt University,Department of Biostatistics,USA","institution_ids":["https://openalex.org/I200719446"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048888817","display_name":"Netanel Raviv","orcid":"https://orcid.org/0000-0002-1686-1994"},"institutions":[{"id":"https://openalex.org/I204465549","display_name":"Washington University in St. Louis","ror":"https://ror.org/01yc7t268","country_code":"US","type":"education","lineage":["https://openalex.org/I204465549"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Netanel Raviv","raw_affiliation_strings":["Washington University in St. Louis,Computer Science and Engineering,USA"],"affiliations":[{"raw_affiliation_string":"Washington University in St. Louis,Computer Science and Engineering,USA","institution_ids":["https://openalex.org/I204465549"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5038669899","display_name":"Yevgeniy Vorobeychik","orcid":"https://orcid.org/0000-0003-2471-5345"},"institutions":[{"id":"https://openalex.org/I204465549","display_name":"Washington University in St. Louis","ror":"https://ror.org/01yc7t268","country_code":"US","type":"education","lineage":["https://openalex.org/I204465549"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yevgeniy Vorobeychik","raw_affiliation_strings":["Washington University in St. Louis,Computer Science and Engineering,USA"],"affiliations":[{"raw_affiliation_string":"Washington University in St. Louis,Computer Science and Engineering,USA","institution_ids":["https://openalex.org/I204465549"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5101999100"],"corresponding_institution_ids":["https://openalex.org/I204465549"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.4059609,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12892","display_name":"Social Power and Status Dynamics","score":0.44999998807907104,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T12892","display_name":"Social Power and Status Dynamics","score":0.44999998807907104,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10646","display_name":"Experimental Behavioral Economics Studies","score":0.42419999837875366,"subfield":{"id":"https://openalex.org/subfields/3311","display_name":"Safety Research"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.9372000098228455},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.569599986076355},{"id":"https://openalex.org/keywords/information-sensitivity","display_name":"Information sensitivity","score":0.5314000248908997},{"id":"https://openalex.org/keywords/privacy-software","display_name":"Privacy software","score":0.5074999928474426},{"id":"https://openalex.org/keywords/privacy-protection","display_name":"Privacy protection","score":0.5062000155448914},{"id":"https://openalex.org/keywords/sensitivity","display_name":"Sensitivity (control systems)","score":0.4196999967098236},{"id":"https://openalex.org/keywords/differential","display_name":"Differential (mechanical device)","score":0.3928000032901764},{"id":"https://openalex.org/keywords/composition","display_name":"Composition (language)","score":0.3424000144004822}],"concepts":[{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.9372000098228455},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7005000114440918},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.569599986076355},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.5314000248908997},{"id":"https://openalex.org/C509729295","wikidata":"https://www.wikidata.org/wiki/Q7246032","display_name":"Privacy software","level":3,"score":0.5074999928474426},{"id":"https://openalex.org/C3017597292","wikidata":"https://www.wikidata.org/wiki/Q25052250","display_name":"Privacy protection","level":2,"score":0.5062000155448914},{"id":"https://openalex.org/C21200559","wikidata":"https://www.wikidata.org/wiki/Q7451068","display_name":"Sensitivity (control systems)","level":2,"score":0.4196999967098236},{"id":"https://openalex.org/C93226319","wikidata":"https://www.wikidata.org/wiki/Q193137","display_name":"Differential (mechanical device)","level":2,"score":0.3928000032901764},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3862999975681305},{"id":"https://openalex.org/C40231798","wikidata":"https://www.wikidata.org/wiki/Q1333743","display_name":"Composition (language)","level":2,"score":0.3424000144004822},{"id":"https://openalex.org/C207467116","wikidata":"https://www.wikidata.org/wiki/Q4385666","display_name":"Inverse","level":2,"score":0.34150001406669617},{"id":"https://openalex.org/C77350462","wikidata":"https://www.wikidata.org/wiki/Q1125472","display_name":"Confounding","level":2,"score":0.3222000002861023},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.31690001487731934},{"id":"https://openalex.org/C169093310","wikidata":"https://www.wikidata.org/wiki/Q3702971","display_name":"Personally identifiable information","level":2,"score":0.30079999566078186},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3000999987125397},{"id":"https://openalex.org/C2988416141","wikidata":"https://www.wikidata.org/wiki/Q6031139","display_name":"Information loss","level":2,"score":0.28859999775886536},{"id":"https://openalex.org/C25343380","wikidata":"https://www.wikidata.org/wiki/Q277521","display_name":"Relation (database)","level":2,"score":0.2797999978065491},{"id":"https://openalex.org/C168167062","wikidata":"https://www.wikidata.org/wiki/Q1117970","display_name":"Component (thermodynamics)","level":2,"score":0.27489998936653137},{"id":"https://openalex.org/C136197465","wikidata":"https://www.wikidata.org/wiki/Q1729295","display_name":"Variety (cybernetics)","level":2,"score":0.2687999904155731},{"id":"https://openalex.org/C2780586882","wikidata":"https://www.wikidata.org/wiki/Q7520643","display_name":"Simple (philosophy)","level":2,"score":0.26339998841285706},{"id":"https://openalex.org/C61797465","wikidata":"https://www.wikidata.org/wiki/Q1188986","display_name":"Term (time)","level":2,"score":0.2513999938964844}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isit63088.2025.11195526","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isit63088.2025.11195526","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Symposium on Information Theory (ISIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W1465390462","https://openalex.org/W1557833142","https://openalex.org/W1666623353","https://openalex.org/W1873763122","https://openalex.org/W1998274472","https://openalex.org/W2025720061","https://openalex.org/W2033092546","https://openalex.org/W2097583584","https://openalex.org/W2104549677","https://openalex.org/W2167372639","https://openalex.org/W2473418344","https://openalex.org/W2594311007","https://openalex.org/W2595058628","https://openalex.org/W2777839890","https://openalex.org/W2795435272","https://openalex.org/W2898778923","https://openalex.org/W2963699739","https://openalex.org/W3030902227","https://openalex.org/W3037491300","https://openalex.org/W3084211614","https://openalex.org/W3102994281","https://openalex.org/W3167530662","https://openalex.org/W3204457148","https://openalex.org/W4213278605","https://openalex.org/W4361866211","https://openalex.org/W4384519184","https://openalex.org/W4389775201"],"related_works":[],"abstract_inverted_index":{"Differential":[0],"privacy":[1,35,43,69,78,107,117,130,135],"(DP)":[2],"has":[3],"become":[4],"the":[5,41,61,84],"gold":[6],"standard":[7],"for":[8,51],"privacy-preserving":[9],"data":[10],"analysis,":[11],"but":[12],"its":[13],"applicability":[14],"can":[15],"be":[16],"limited":[17],"in":[18,128],"scenarios":[19],"involving":[20],"complex":[21],"dependencies":[22],"between":[23,54],"sensitive":[24,55],"information":[25,56],"and":[26,57,132],"datasets.":[27,58],"To":[28,90],"address":[29],"this,":[30,92],"we":[31,93],"introduce":[32],"differential":[33],"confounding":[34],"(DCP),":[36],"a":[37,101,106],"specialized":[38],"form":[39],"of":[40,88],"Pufferfish":[42],"(PP)":[44],"framework":[45,66],"that":[46,73],"generalizes":[47],"DP":[48],"by":[49],"accounting":[50],"broader":[52],"relationships":[53],"DCP":[59,75],"adopts":[60],"<tex":[62],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[63],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">$(\\epsilon,":[64],"\\delta)$</tex>-indistinguishability":[65],"to":[67,109],"quantify":[68],"loss.":[70],"We":[71],"show":[72],"while":[74],"mechanisms":[76],"retain":[77],"guarantees":[79,112,136],"under":[80,137],"composition,":[81],"they":[82],"lack":[83],"graceful":[85],"compositional":[86],"properties":[87],"DP.":[89],"overcome":[91],"propose":[94],"an":[95],"Inverse":[96],"Composition":[97],"(IC)":[98],"framework,":[99],"where":[100],"leader-follower":[102],"model":[103],"optimally":[104],"designs":[105],"strategy":[108],"achieve":[110],"target":[111],"without":[113],"relying":[114],"on":[115],"worst-case":[116],"proofs,":[118],"such":[119],"as":[120],"sensitivity":[121],"calculation.":[122],"Experimental":[123],"results":[124],"validate":[125],"IC's":[126],"effectiveness":[127],"managing":[129],"budgets":[131],"ensuring":[133],"rigorous":[134],"composition.":[138]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-10-21T00:00:00"}
