{"id":"https://openalex.org/W2009611335","doi":"https://doi.org/10.1145/1806689.1806787","title":"Differential privacy under continual observation","display_name":"Differential privacy under continual observation","publication_year":2010,"publication_date":"2010-06-05","ids":{"openalex":"https://openalex.org/W2009611335","doi":"https://doi.org/10.1145/1806689.1806787","mag":"2009611335"},"language":"en","primary_location":{"id":"doi:10.1145/1806689.1806787","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1806689.1806787","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the forty-second ACM symposium on Theory of computing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5011820318","display_name":"Cynthia Dwork","orcid":"https://orcid.org/0000-0001-7177-3738"},"institutions":[{"id":"https://openalex.org/I1290206253","display_name":"Microsoft (United States)","ror":"https://ror.org/00d0nc645","country_code":"US","type":"company","lineage":["https://openalex.org/I1290206253"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Cynthia Dwork","raw_affiliation_strings":["Microsoft Research, Mountain View, CA, USA","Microsoft Research, Mountain View, CA, USA#TAB#"],"affiliations":[{"raw_affiliation_string":"Microsoft Research, Mountain View, CA, USA","institution_ids":["https://openalex.org/I1290206253"]},{"raw_affiliation_string":"Microsoft Research, Mountain View, CA, USA#TAB#","institution_ids":["https://openalex.org/I1290206253"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5002372704","display_name":"Moni Naor","orcid":"https://orcid.org/0000-0003-3381-0221"},"institutions":[{"id":"https://openalex.org/I53964585","display_name":"Weizmann Institute of Science","ror":"https://ror.org/0316ej306","country_code":"IL","type":"education","lineage":["https://openalex.org/I53964585"]}],"countries":["IL"],"is_corresponding":false,"raw_author_name":"Moni Naor","raw_affiliation_strings":["Weizmann Institute of Science, Rehovot, Israel"],"affiliations":[{"raw_affiliation_string":"Weizmann Institute of Science, Rehovot, Israel","institution_ids":["https://openalex.org/I53964585"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003318200","display_name":"Toniann Pitassi","orcid":"https://orcid.org/0000-0002-8668-2174"},"institutions":[{"id":"https://openalex.org/I185261750","display_name":"University of Toronto","ror":"https://ror.org/03dbr7087","country_code":"CA","type":"education","lineage":["https://openalex.org/I185261750"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Toniann Pitassi","raw_affiliation_strings":["University of Toronto, Toronto, Canada"],"affiliations":[{"raw_affiliation_string":"University of Toronto, Toronto, Canada","institution_ids":["https://openalex.org/I185261750"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5057788395","display_name":"Guy N. Rothblum","orcid":"https://orcid.org/0000-0001-5273-6472"},"institutions":[{"id":"https://openalex.org/I20089843","display_name":"Princeton University","ror":"https://ror.org/00hx57361","country_code":"US","type":"education","lineage":["https://openalex.org/I20089843"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Guy N. Rothblum","raw_affiliation_strings":["Princeton University, Princeton, NJ, USA","Princeton University , Princeton, NJ, USA"],"affiliations":[{"raw_affiliation_string":"Princeton University, Princeton, NJ, USA","institution_ids":["https://openalex.org/I20089843"]},{"raw_affiliation_string":"Princeton University , Princeton, NJ, USA","institution_ids":["https://openalex.org/I20089843"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5011820318"],"corresponding_institution_ids":["https://openalex.org/I1290206253"],"apc_list":null,"apc_paid":null,"fwci":26.5327,"has_fulltext":false,"cited_by_count":577,"citation_normalized_percentile":{"value":0.99633595,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"715","last_page":"724"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11612","display_name":"Stochastic Gradient Optimization Techniques","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.8639813661575317},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7657037377357483},{"id":"https://openalex.org/keywords/randomness","display_name":"Randomness","score":0.5388495922088623},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.5091020464897156},{"id":"https://openalex.org/keywords/privacy-software","display_name":"Privacy software","score":0.4955390691757202},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.4910879135131836},{"id":"https://openalex.org/keywords/point","display_name":"Point (geometry)","score":0.4585954248905182},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.454424649477005},{"id":"https://openalex.org/keywords/differential","display_name":"Differential (mechanical device)","score":0.41849082708358765},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3591134548187256},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.34389087557792664},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.17150980234146118},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.11654862761497498}],"concepts":[{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.8639813661575317},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7657037377357483},{"id":"https://openalex.org/C125112378","wikidata":"https://www.wikidata.org/wiki/Q176640","display_name":"Randomness","level":2,"score":0.5388495922088623},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.5091020464897156},{"id":"https://openalex.org/C509729295","wikidata":"https://www.wikidata.org/wiki/Q7246032","display_name":"Privacy software","level":3,"score":0.4955390691757202},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.4910879135131836},{"id":"https://openalex.org/C28719098","wikidata":"https://www.wikidata.org/wiki/Q44946","display_name":"Point (geometry)","level":2,"score":0.4585954248905182},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.454424649477005},{"id":"https://openalex.org/C93226319","wikidata":"https://www.wikidata.org/wiki/Q193137","display_name":"Differential (mechanical device)","level":2,"score":0.41849082708358765},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3591134548187256},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.34389087557792664},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.17150980234146118},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.11654862761497498},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1145/1806689.1806787","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1806689.1806787","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the forty-second ACM symposium on Theory of computing","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.165.5314","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.165.5314","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.wisdom.weizmann.ac.il/%7Enaor/PAPERS/continual_observation.pdf","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.297.6020","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.297.6020","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.mit.edu/~rothblum/papers/continalobs.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.7099999785423279,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W44899178","https://openalex.org/W1446333884","https://openalex.org/W1502953220","https://openalex.org/W1557833142","https://openalex.org/W1592775138","https://openalex.org/W1873763122","https://openalex.org/W1968301997","https://openalex.org/W1993116423","https://openalex.org/W2006355640","https://openalex.org/W2010523825","https://openalex.org/W2012992615","https://openalex.org/W2013823004","https://openalex.org/W2045348180","https://openalex.org/W2047656932","https://openalex.org/W2077217970","https://openalex.org/W2093099348","https://openalex.org/W2097160297","https://openalex.org/W2108744630","https://openalex.org/W2110868467","https://openalex.org/W2120806354","https://openalex.org/W2123147099","https://openalex.org/W2123845384","https://openalex.org/W2124765629","https://openalex.org/W2134167315","https://openalex.org/W2136114025","https://openalex.org/W2159851984","https://openalex.org/W2169401877","https://openalex.org/W2169570643","https://openalex.org/W2276710855","https://openalex.org/W2508573783","https://openalex.org/W2561675875","https://openalex.org/W2911978475","https://openalex.org/W2950343740","https://openalex.org/W6630051280","https://openalex.org/W6674610798"],"related_works":["https://openalex.org/W4304208041","https://openalex.org/W4315488958","https://openalex.org/W4309618081","https://openalex.org/W3176515490","https://openalex.org/W4226426276","https://openalex.org/W3185918024","https://openalex.org/W3138333794","https://openalex.org/W2083287929","https://openalex.org/W2773408865","https://openalex.org/W2735874745"],"abstract_inverted_index":{"Differential":[0],"privacy":[1,7,133,147],"is":[2,42,47,81,99],"a":[3,30,34,43,129,143,146],"recent":[4],"notion":[5],"of":[6,29,70,83,86,93,102,107,122,131,141],"tailored":[8],"to":[9,15,61,109,155],"privacy-preserving":[10],"data":[11,22,37,71,108],"analysis":[12,23,72],"[11].":[13],"Up":[14],"this":[16],"point,":[17],"research":[18],"on":[19,26],"differentially":[20],"private":[21],"has":[24],"focused":[25],"the":[27,55,78,97,116,123,139],"setting":[28],"trusted":[31],"curator":[32],"holding":[33],"large,":[35],"static,":[36],"set;":[38],"thus":[39],"every":[40],"computation":[41],"\"one-shot\"":[44],"object:":[45],"there":[46],"no":[48],"point":[49],"in":[50,145],"computing":[51],"something":[52],"twice,":[53],"since":[54],"result":[56],"will":[57],"be":[58],"unchanged,":[59],"up":[60],"any":[62],"randomness":[63],"introduced":[64],"for":[65],"privacy.":[66],"However,":[67],"many":[68,156],"applications":[69],"involve":[73],"repeated":[74],"computations,":[75],"either":[76],"because":[77,96],"entire":[79],"goal":[80,98],"one":[82],"monitoring,":[84],"e.g.,":[85,105],"traffic":[87],"conditions,":[88],"search":[89],"trends,":[90],"or":[91,95],"incidence":[92],"influenza,":[94],"some":[100],"kind":[101],"adaptive":[103],"optimization,":[104],"placement":[106],"minimize":[110],"access":[111],"costs.":[112],"In":[113],"these":[114],"cases,":[115],"algorithm":[117],"must":[118],"permit":[119],"continual":[120,135],"observation":[121],"system's":[124],"state.":[125],"We":[126,137],"therefore":[127],"initiate":[128],"study":[130],"differential":[132],"under":[134],"observation.":[136],"identify":[138],"problem":[140],"maintaining":[142],"counter":[144],"preserving":[148],"manner":[149],"and":[150],"show":[151],"its":[152],"wide":[153],"applicability":[154],"different":[157],"problems.":[158]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":28},{"year":2024,"cited_by_count":44},{"year":2023,"cited_by_count":34},{"year":2022,"cited_by_count":36},{"year":2021,"cited_by_count":42},{"year":2020,"cited_by_count":75},{"year":2019,"cited_by_count":57},{"year":2018,"cited_by_count":53},{"year":2017,"cited_by_count":45},{"year":2016,"cited_by_count":34},{"year":2015,"cited_by_count":41},{"year":2014,"cited_by_count":30},{"year":2013,"cited_by_count":22},{"year":2012,"cited_by_count":15}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
