{"id":"https://openalex.org/W4405170928","doi":"https://doi.org/10.1145/3658644.3690225","title":"Almost Instance-optimal Clipping for Summation Problems in the Shuffle Model of Differential Privacy","display_name":"Almost Instance-optimal Clipping for Summation Problems in the Shuffle Model of Differential Privacy","publication_year":2024,"publication_date":"2024-12-02","ids":{"openalex":"https://openalex.org/W4405170928","doi":"https://doi.org/10.1145/3658644.3690225"},"language":"en","primary_location":{"id":"doi:10.1145/3658644.3690225","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3658644.3690225","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3658644.3690225","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3658644.3690225","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5023558055","display_name":"Wei Dong","orcid":"https://orcid.org/0000-0002-0394-4125"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":true,"raw_author_name":"Wei Dong","raw_affiliation_strings":["Nanyang Technological University, Singapore, Singapore"],"affiliations":[{"raw_affiliation_string":"Nanyang Technological University, Singapore, Singapore","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5015920115","display_name":"Qiyao Luo","orcid":"https://orcid.org/0000-0003-4167-8670"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Qiyao Luo","raw_affiliation_strings":["OceanBase, Ant Group, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"OceanBase, Ant Group, Shanghai, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076026636","display_name":"Giulia Fanti","orcid":"https://orcid.org/0000-0002-7671-2624"},"institutions":[{"id":"https://openalex.org/I74973139","display_name":"Carnegie Mellon University","ror":"https://ror.org/05x2bcf33","country_code":"US","type":"education","lineage":["https://openalex.org/I74973139"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Giulia Fanti","raw_affiliation_strings":["Carnegie Mellon University, Pittsburgh, USA"],"affiliations":[{"raw_affiliation_string":"Carnegie Mellon University, Pittsburgh, USA","institution_ids":["https://openalex.org/I74973139"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089202539","display_name":"Elaine Shi","orcid":"https://orcid.org/0000-0002-5605-1048"},"institutions":[{"id":"https://openalex.org/I74973139","display_name":"Carnegie Mellon University","ror":"https://ror.org/05x2bcf33","country_code":"US","type":"education","lineage":["https://openalex.org/I74973139"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Elaine Shi","raw_affiliation_strings":["Carnegie Mellon University, Pittsburgh, USA"],"affiliations":[{"raw_affiliation_string":"Carnegie Mellon University, Pittsburgh, USA","institution_ids":["https://openalex.org/I74973139"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5009196125","display_name":"Ke Yi","orcid":"https://orcid.org/0000-0002-2178-3716"},"institutions":[{"id":"https://openalex.org/I200769079","display_name":"Hong Kong University of Science and Technology","ror":"https://ror.org/00q4vv597","country_code":"HK","type":"education","lineage":["https://openalex.org/I200769079"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Ke Yi","raw_affiliation_strings":["Hong Kong University of Science and Technology, Hong Kong, Hong Kong"],"affiliations":[{"raw_affiliation_string":"Hong Kong University of Science and Technology, Hong Kong, Hong Kong","institution_ids":["https://openalex.org/I200769079"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5023558055"],"corresponding_institution_ids":["https://openalex.org/I172675005"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.20164547,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1939","last_page":"1953"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.994700014591217,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.8368290066719055},{"id":"https://openalex.org/keywords/clipping","display_name":"Clipping (morphology)","score":0.7202829718589783},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7167128324508667},{"id":"https://openalex.org/keywords/differential","display_name":"Differential (mechanical device)","score":0.47501835227012634},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.38692405819892883},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.30820345878601074},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.08337420225143433}],"concepts":[{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.8368290066719055},{"id":"https://openalex.org/C2776848632","wikidata":"https://www.wikidata.org/wiki/Q853463","display_name":"Clipping (morphology)","level":2,"score":0.7202829718589783},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7167128324508667},{"id":"https://openalex.org/C93226319","wikidata":"https://www.wikidata.org/wiki/Q193137","display_name":"Differential (mechanical device)","level":2,"score":0.47501835227012634},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.38692405819892883},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.30820345878601074},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.08337420225143433},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3658644.3690225","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3658644.3690225","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3658644.3690225","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},{"id":"pmh:oai:repository.hkust.edu.hk:1783.1-146601","is_oa":false,"landing_page_url":"http://repository.hkust.edu.hk/ir/Record/1783.1-146601","pdf_url":null,"source":{"id":"https://openalex.org/S4306401796","display_name":"Rare & Special e-Zone (The Hong Kong University of Science and Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I200769079","host_organization_name":"Hong Kong University of Science and Technology","host_organization_lineage":["https://openalex.org/I200769079"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Conference paper"}],"best_oa_location":{"id":"doi:10.1145/3658644.3690225","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3658644.3690225","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3658644.3690225","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2901824615","display_name":null,"funder_award_id":"DARPA SIEVE program","funder_id":"https://openalex.org/F4320323817","funder_display_name":"Universitas Brawijaya"},{"id":"https://openalex.org/G7657769850","display_name":null,"funder_award_id":"2128519, 2044679, 2338772, and 2148359","funder_id":"https://openalex.org/F4320323817","funder_display_name":"Universitas Brawijaya"}],"funders":[{"id":"https://openalex.org/F4320323817","display_name":"Universitas Brawijaya","ror":"https://ror.org/01wk3d929"}],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4405170928.pdf"},"referenced_works_count":35,"referenced_works":["https://openalex.org/W1981276685","https://openalex.org/W1982858363","https://openalex.org/W2027595342","https://openalex.org/W2096870293","https://openalex.org/W2466851577","https://openalex.org/W2473418344","https://openalex.org/W2605062226","https://openalex.org/W2761138375","https://openalex.org/W2767079719","https://openalex.org/W2799067024","https://openalex.org/W2902964282","https://openalex.org/W2944525415","https://openalex.org/W2963455764","https://openalex.org/W2996422317","https://openalex.org/W3003615979","https://openalex.org/W3015632420","https://openalex.org/W3031144431","https://openalex.org/W3034535486","https://openalex.org/W3095061623","https://openalex.org/W3099185500","https://openalex.org/W3105622409","https://openalex.org/W3165905670","https://openalex.org/W3191542450","https://openalex.org/W3214167602","https://openalex.org/W4210896998","https://openalex.org/W4281756446","https://openalex.org/W4304697928","https://openalex.org/W4308381126","https://openalex.org/W4379135621","https://openalex.org/W4381328553","https://openalex.org/W6600200453","https://openalex.org/W6600266720","https://openalex.org/W6657138077","https://openalex.org/W6743871296","https://openalex.org/W6764782916"],"related_works":["https://openalex.org/W3038283795","https://openalex.org/W2604501336","https://openalex.org/W2558166297","https://openalex.org/W2734500670","https://openalex.org/W2315671126","https://openalex.org/W798507144","https://openalex.org/W2964481303","https://openalex.org/W1751413323","https://openalex.org/W1970141429","https://openalex.org/W2571704763"],"abstract_inverted_index":{"Differentially":[0],"private":[1],"mechanisms":[2],"achieving":[3],"worst-case":[4,69],"optimal":[5,70],"error":[6,29,71,87,168],"bounds":[7],"(e.g.,":[8],"the":[9,16,25,33,37,44,56,80,97,112,122,129,133,137,166,176],"classical":[10],"Laplace":[11],"mechanism)":[12],"are":[13,22,103],"well-studied":[14],"in":[15,36,111,155],"literature.":[17],"However,":[18],"when":[19],"typical":[20],"data":[21],"far":[23],"from":[24,55],"worst":[26],"case,":[27],"instance-specific":[28],"bounds---which":[30],"depend":[31],"on":[32],"largest":[34],"value":[35],"dataset---are":[38],"more":[39],"meaningful.":[40],"For":[41],"example,":[42],"consider":[43],"sum":[45,135,178],"estimation":[46,179,187],"problem,":[47],"where":[48],"each":[49],"user":[50],"has":[51,67,77],"an":[52,85],"integer":[53],"xi":[54,90],"domain":[57],"{0,1,...,U}":[58],"and":[59,125,131,181],"we":[60,143],"wish":[61],"to":[62,175],"estimate":[63],"\u2211i":[64],"xi.":[65],"This":[66],"a":[68],"of":[72,88,136],"O(U/\u03b5),":[73],"while":[74,164],"recent":[75],"work":[76],"shown":[78],"that":[79],"clipping":[81,107,123,130],"mechanism":[82,108],"can":[83,151],"achieve":[84],"instance-optimal":[86,101,167],"O(maxi":[89],"\u22c5":[91],"log":[92,93],"U":[94],"/\u03b5).":[95],"Under":[96],"shuffle":[98,113],"model,":[99,114],"known":[100],"protocols":[102],"less":[104],"communication-efficient.":[105],"The":[106],"also":[109,171],"works":[110],"but":[115],"requires":[116],"two":[117,127,147],"rounds:":[118],"Round":[119],"one":[120,156],"finds":[121],"threshold,":[124],"round":[126,157],"does":[128],"computes":[132],"noisy":[134],"clipped":[138],"data.":[139],"In":[140],"this":[141],"paper,":[142],"show":[144],"how":[145],"these":[146],"seemingly":[148],"sequential":[149],"steps":[150],"be":[152],"done":[153],"simultaneously":[154],"using":[158],"just":[159],"1+o(1)":[160],"messages":[161],"per":[162],"user,":[163],"maintaining":[165],"bound.":[169],"We":[170],"extend":[172],"our":[173],"technique":[174],"high-dimensional":[177],"problem":[180],"sparse":[182],"vector":[183],"aggregation":[184],"(a.k.a.":[185],"frequency":[186],"under":[188],"user-level":[189],"differential":[190],"privacy).":[191]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
