{"_id":"daGF4ort8YsAH2CZf","bibbaseid":"acharya-canonne-freitag-sun-tyagi-inferenceunderinformationconstraintsiiilocalprivacyconstraints-2020","authorIDs":[],"author_short":["Acharya, J.","Canonne, C. L.","Freitag, C.","Sun, Z.","Tyagi, H."],"bibdata":{"bibtype":"misc","type":"misc","author":[{"firstnames":["Jayadev"],"propositions":[],"lastnames":["Acharya"],"suffixes":[]},{"firstnames":["Clément","L."],"propositions":[],"lastnames":["Canonne"],"suffixes":[]},{"firstnames":["Cody"],"propositions":[],"lastnames":["Freitag"],"suffixes":[]},{"firstnames":["Ziteng"],"propositions":[],"lastnames":["Sun"],"suffixes":[]},{"firstnames":["Himanshu"],"propositions":[],"lastnames":["Tyagi"],"suffixes":[]}],"title":"Inference under Information Constraints III: Local Privacy Constraints","note":"Accepted to the IEEE Journal on Selected Areas in Information Theory (JSAIT). Preprint available at arXiv:abs/1808.02174; Conference version in AISTATS'19","year":"2020","bibbase_note":"<div class=\"well well-small bibbase\"><span class=\"bluecite\">[ACFST20]</span> Focuses on the local privacy constraints (ρ-LDP), and provides public- and private-coin protocols for identity testing, and private-coin protocols for learning which match the lower bounds from [ACT20a]. Also contains lower bounds for independence testing under LDP.</div>","bibtex":"@misc{ACFST19,\n author = {Jayadev Acharya and\n Cl{\\'{e}}ment L. Canonne and\n Cody Freitag and Ziteng Sun\n and Himanshu Tyagi},\n title = {Inference under Information Constraints {III}: Local Privacy Constraints},\n note = {Accepted to the IEEE Journal on Selected Areas in Information Theory (JSAIT). Preprint available at arXiv:abs/1808.02174; Conference version in {AISTATS'19}},\n year = {2020},\n bibbase_note = {<div class=\"well well-small bibbase\"><span class=\"bluecite\">[ACFST20]</span> Focuses on the local privacy constraints (ρ-LDP), and provides public- and private-coin protocols for identity testing, and private-coin protocols for learning which match the lower bounds from [ACT20a]. Also contains lower bounds for independence testing under LDP.</div>}\n}\n\n","author_short":["Acharya, J.","Canonne, C. L.","Freitag, C.","Sun, Z.","Tyagi, H."],"key":"ACFST19","id":"ACFST19","bibbaseid":"acharya-canonne-freitag-sun-tyagi-inferenceunderinformationconstraintsiiilocalprivacyconstraints-2020","role":"author","urls":{},"metadata":{"authorlinks":{}},"downloads":0,"html":""},"bibtype":"misc","biburl":"http://www.cs.columbia.edu/~ccanonne/tutorial-focs2020/publications-annotated.bib","creationDate":"2020-11-08T21:08:20.189Z","downloads":0,"keywords":[],"search_terms":["inference","under","information","constraints","iii","local","privacy","constraints","acharya","canonne","freitag","sun","tyagi"],"title":"Inference under Information Constraints III: Local Privacy Constraints","year":2020,"dataSources":["EYbwRcMzLdr2qsboR"]}