{"id":"https://openalex.org/W4308381126","doi":"https://doi.org/10.1145/3548606.3560567","title":"Shifted Inverse","display_name":"Shifted Inverse","publication_year":2022,"publication_date":"2022-11-07","ids":{"openalex":"https://openalex.org/W4308381126","doi":"https://doi.org/10.1145/3548606.3560567"},"language":"en","primary_location":{"id":"doi:10.1145/3548606.3560567","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3548606.3560567","pdf_url":null,"source":{"id":"https://openalex.org/S4363608815","display_name":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5007370963","display_name":"Juanru Fang","orcid":"https://orcid.org/0000-0001-9038-0585"},"institutions":[{"id":"https://openalex.org/I200769079","display_name":"Hong Kong University of Science and Technology","ror":"https://ror.org/00q4vv597","country_code":"HK","type":"education","lineage":["https://openalex.org/I200769079"]}],"countries":["HK"],"is_corresponding":true,"raw_author_name":"Juanru Fang","raw_affiliation_strings":["Hong Kong University of Science and Technology, Hong Kong, Hong Kong"],"affiliations":[{"raw_affiliation_string":"Hong Kong University of Science and Technology, Hong Kong, Hong Kong","institution_ids":["https://openalex.org/I200769079"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023558055","display_name":"Wei Dong","orcid":"https://orcid.org/0000-0002-0394-4125"},"institutions":[{"id":"https://openalex.org/I200769079","display_name":"Hong Kong University of Science and Technology","ror":"https://ror.org/00q4vv597","country_code":"HK","type":"education","lineage":["https://openalex.org/I200769079"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Wei Dong","raw_affiliation_strings":["Hong Kong University of Science and Technology, Hong Kong, Hong Kong"],"affiliations":[{"raw_affiliation_string":"Hong Kong University of Science and Technology, Hong Kong, Hong Kong","institution_ids":["https://openalex.org/I200769079"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5009196125","display_name":"Ke Yi","orcid":"https://orcid.org/0000-0002-2178-3716"},"institutions":[{"id":"https://openalex.org/I200769079","display_name":"Hong Kong University of Science and Technology","ror":"https://ror.org/00q4vv597","country_code":"HK","type":"education","lineage":["https://openalex.org/I200769079"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Ke Yi","raw_affiliation_strings":["Hong Kong University of Science and Technology, Hong Kong, Hong Kong"],"affiliations":[{"raw_affiliation_string":"Hong Kong University of Science and Technology, Hong Kong, Hong Kong","institution_ids":["https://openalex.org/I200769079"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5007370963"],"corresponding_institution_ids":["https://openalex.org/I200769079"],"apc_list":null,"apc_paid":null,"fwci":1.3566,"has_fulltext":false,"cited_by_count":13,"citation_normalized_percentile":{"value":0.83195548,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1009","last_page":"1022"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9801999926567078,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.958299994468689,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/tuple","display_name":"Tuple","score":0.8131290078163147},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7579523921012878},{"id":"https://openalex.org/keywords/monotonic-function","display_name":"Monotonic function","score":0.7511379718780518},{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.7502059936523438},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.5267552733421326},{"id":"https://openalex.org/keywords/polynomial","display_name":"Polynomial","score":0.4971330463886261},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4637067914009094},{"id":"https://openalex.org/keywords/function","display_name":"Function (biology)","score":0.4512577950954437},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.4355230927467346},{"id":"https://openalex.org/keywords/inverse","display_name":"Inverse","score":0.431056946516037},{"id":"https://openalex.org/keywords/mathematical-optimization","display_name":"Mathematical optimization","score":0.3741625249385834},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3311005234718323},{"id":"https://openalex.org/keywords/discrete-mathematics","display_name":"Discrete mathematics","score":0.219077467918396},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.19347605109214783}],"concepts":[{"id":"https://openalex.org/C118930307","wikidata":"https://www.wikidata.org/wiki/Q600590","display_name":"Tuple","level":2,"score":0.8131290078163147},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7579523921012878},{"id":"https://openalex.org/C72169020","wikidata":"https://www.wikidata.org/wiki/Q194404","display_name":"Monotonic function","level":2,"score":0.7511379718780518},{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.7502059936523438},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.5267552733421326},{"id":"https://openalex.org/C90119067","wikidata":"https://www.wikidata.org/wiki/Q43260","display_name":"Polynomial","level":2,"score":0.4971330463886261},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4637067914009094},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.4512577950954437},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.4355230927467346},{"id":"https://openalex.org/C207467116","wikidata":"https://www.wikidata.org/wiki/Q4385666","display_name":"Inverse","level":2,"score":0.431056946516037},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.3741625249385834},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3311005234718323},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.219077467918396},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.19347605109214783},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C78458016","wikidata":"https://www.wikidata.org/wiki/Q840400","display_name":"Evolutionary biology","level":1,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3548606.3560567","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3548606.3560567","pdf_url":null,"source":{"id":"https://openalex.org/S4363608815","display_name":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},{"id":"pmh:oai:repository.hkust.edu.hk:1783.1-123776","is_oa":false,"landing_page_url":"http://lbdiscover.ust.hk/uresolver?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rfr_id=info:sid/HKUST:SPI&rft.genre=article&rft.issn=1543-7221&rft.volume=&rft.issue=&rft.date=2022&rft.spage=1009&rft.aulast=Fang&rft.aufirst=&rft.atitle=Shifted+Inverse%3A+A+General+Mechanism+for+Monotonic+Functions+under+User+Differential+Privacy&rft.title=Proceedings+of+the+ACM+Conference+on+Computer+and+Communications+Security","pdf_url":null,"source":{"id":"https://openalex.org/S4306401796","display_name":"Rare & Special e-Zone (The Hong Kong University of Science and Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I200769079","host_organization_name":"Hong Kong University of Science and Technology","host_organization_lineage":["https://openalex.org/I200769079"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Conference paper"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6899999976158142,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W1583837637","https://openalex.org/W2017509273","https://openalex.org/W2031415694","https://openalex.org/W2080745194","https://openalex.org/W2080900058","https://openalex.org/W2340222647","https://openalex.org/W2436309872","https://openalex.org/W2593864877","https://openalex.org/W2605062226","https://openalex.org/W2755088640","https://openalex.org/W3015632420","https://openalex.org/W3031432927","https://openalex.org/W3105622409","https://openalex.org/W4233090147","https://openalex.org/W4248861293","https://openalex.org/W4254372035","https://openalex.org/W4281756446"],"related_works":["https://openalex.org/W3038283795","https://openalex.org/W2604501336","https://openalex.org/W2558166297","https://openalex.org/W2734500670","https://openalex.org/W2315671126","https://openalex.org/W798507144","https://openalex.org/W2964481303","https://openalex.org/W4245395944","https://openalex.org/W1751413323","https://openalex.org/W2143551613"],"abstract_inverted_index":{"While":[0,84],"most":[1],"work":[2,55],"on":[3,8,56,104,121],"differential":[4,35],"privacy":[5,11,36],"has":[6,15,38,58],"focused":[7],"protecting":[9],"the":[10,25,61,126],"of":[12],"tuples,":[13],"it":[14],"been":[16],"realized":[17],"that":[18,129],"such":[19],"a":[20,50,70],"simple":[21],"model":[22],"cannot":[23],"capture":[24],"complex":[26],"user-tuple":[27],"relationships":[28],"in":[29,90,101,139],"many":[30,140],"real-world":[31],"applications.":[32],"Thus,":[33],"user":[34],"(user-DP)":[37],"recently":[39],"gained":[40],"more":[41,133],"attention,":[42],"which":[43],"includes":[44],"node-DP":[45],"for":[46,74],"graph":[47],"data":[48],"as":[49],"special":[51],"case.":[52],"Most":[53],"existing":[54],"user-DP":[57,79],"only":[59],"studied":[60],"sum":[62],"estimation":[63],"problem.":[64],"In":[65],"this":[66],"work,":[67],"we":[68,93,118],"design":[69],"general":[71,86,134],"DP":[72],"mechanism":[73,87],"any":[75],"monotonic":[76,107],"function":[77],"under":[78],"with":[80],"strong":[81],"optimality":[82],"guarantees.":[83],"our":[85,130],"may":[88],"run":[89],"super-polynomial":[91],"time,":[92],"show":[94,128],"how":[95],"to":[96],"instantiate":[97],"an":[98],"approximate":[99],"version":[100],"polynomial":[102],"time":[103],"some":[105],"common":[106],"functions,":[108],"including":[109],"sum,":[110],"k-selection,":[111],"maximum":[112],"frequency,":[113],"and":[114,125,135],"distinct":[115],"count.":[116],"Finally,":[117],"conduct":[119],"experiments":[120],"all":[122],"these":[123],"functions":[124],"results":[127,138],"framework":[131],"is":[132],"obtains":[136],"better":[137],"cases.":[141]},"counts_by_year":[{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":7},{"year":2023,"cited_by_count":1}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2022-11-11T00:00:00"}
